The eSentire Blog

TRU Positive/Bulletin

9 M

Russian-Speaking Attacker Exposes Their Toolbox While Attempting to Deploy the Phobos R...

A Russian-speaking hacker exposed their toolbox while attempting a ransomware intrusion at a U.S. Community…

READ NOW →

TRU Positive/Bulletin

4 M

Popular Info-Stealing Malware, SolarMarker, is Using Watering Hole Attacks and Fake Chr...

For the past three months, eSentire’s security research team, the Threat Response Unit (TRU), has not observed any…

READ NOW →

TRU Positive/Bulletin

3 M

Pirated Windows OS Backdoored with CryptoMiner and Xtreme RAT

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Third-Party Cyber Risk

5 M

Beat the Challenges of Supply Chain Vulnerability

Supply chain disruptions have had a devastating impact on the global economy. Suppliers and consumers feel the…

READ NOW →
2 M

eSentire Named an Interactive Learning Champion for 2022 O’Reilly Awards Program

We are thrilled to be named the Interactive Learning Champion by O’Reilly, the premier source for insight-driven…

READ NOW →

Third-Party Cyber Risk

13 M

What We Must Do To Create Nationally Secure And Resilient Supply Chains

With David Leichner, CMO at Cybellum Anticipate — Be proactive, control the controllables, address the ‘known…

READ NOW →

TRU Positive/Bulletin

4 M

Redline Stealer and Mozilla Thunderbird

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →
1 M

eSentire recognized as CrowdStrike’s 2022 Global MSSP Partner of the Year and named lau...

eSentire is honored to be named CrowdStrike’s 2022 Global MSSP Partner of the Year! This important recognition…

READ NOW →

TRU Positive/Bulletin

4 M

Sorillus RAT Identified in Customer Environment

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

18 M

eSentire Threat Intelligence Malware Analysis: Raccoon Stealer v2.0

Stealer malware is very popular among cybercriminals as they are easily configurable and only requires the victim…

READ NOW →

TRU Positive/Bulletin

5 M

Black Hat SEO Techniques Employed by Gootloader

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

10 M

Hacker Infrastructure Used in Cisco Breach Discovered Attacking a Top Workforce Managem...

eSentire's security research team, the Threat Response Unit (TRU), has discovered that the IT infrastructure used…

READ NOW →
Page
of 47