The eSentire Blog

Cybersecurity Strategy

2 M

Cyber Resilience as a Component of Incident Response Planning

“We bend so that we don’t break.” – A Yoga saying I came across this saying earlier this week, and I thought it…

READ NOW →

TRU Positive/Bulletin

3 M

FortiOS - Authentication Bypass CVE-2022-40684

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Third-Party Cyber Risk

4 M

The Rising Threat of Cybersecurity for Retailers

Stores across the country have their holiday lights on display and retailers everywhere are gearing up for the…

READ NOW →

TRU Positive/Bulletin

18 M

eSentire Threat Intelligence Malware Analysis: Redline Stealer

Redline Stealer is one of the most popular stealers being sold and used by cybercriminals. The command and control…

READ NOW →

TRU Positive/Bulletin

5 M

GootLoader Striking with a New Infection Technique

On December 2, 2022, one of our 24/7 SOC Cyber Analysts escalated an incident involving the GootLoader malware at…

READ NOW →
4 M

eSentire Named in

We are thrilled to announce that eSentire has been named to the 2023 Waterloo Area’s Top Employers list for the…

READ NOW →

TRU Positive/Bulletin

8 M

Disrupting an Active Ransomware Attack Over the Course of Hours

Recently, eSentire’s Security Operations Center responded to a ransomware attack in progress. The attack was…

READ NOW →

Cybersecurity Strategy

6 M

Incident Response Plans and Tabletop Exercises May Be a Waste of Time

Suppose you have invested considerable time and money creating an Incident Response Plan (IRP) and delivering…

READ NOW →

AI/ML

3 M

AI’s Role in Cybersecurity

Artificial intelligence (AI) has been seen as having great potential since 1956. Based on computing algorithms…

READ NOW →

Managed Detection and Response

3 M

eSentire MDR for Microsoft Wins CRN 2022 Tech Innovator Award

We are thrilled to announce that CRN®, a brand of The Channel Company, has chosen eSentire, The Authority in…

READ NOW →

TRU Positive/Bulletin

5 M

Intruder Deploys Medusa Unlocker instead of Medusa Locker in Attempted Medusa Ransomwar...

Recently, a hands-on intruder immediately began to attempt lateral movement and gain credential access upon…

READ NOW →

TRU Positive/Bulletin

4 M

BatLoader Facilitates Fraud and Hands-On-Keyboard Attacks

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →
Page
of 48