The eSentire Blog

TRU Positive/Bulletin

5 M

Go Injector Leading to Stealers

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →

Managed Detection and Response

2 M

eSentire recognized as CrowdStrike’s 2024 Global MSSP Partner of the Year for the Third...

We are thrilled to be named CrowdStrike’s 2024 Global MSSP Partner of the Year for the third consecutive…

READ NOW →

Threat Response Unit

12 M

Hackers Breach Lara and Tiffany Trump’s X Accounts in a Cryptocurrency Scam, the Latest...

On September 3, 2024, hackers breached the X account of Lara Trump, Donald Trump’s daughter-in-law and…

READ NOW →

TRU Positive/Bulletin

5 M

Poseidon Stealer Uses Sora AI Lure to Infect macOS

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →

TRU Positive/Bulletin

7 M

TRU Malware Analysis: The Intrusion Case Involving Zloader

In December 2023, the Incident Handling Team responded to an intrusion incident. The investigation faced…

READ NOW →

Regulatory Compliance

4 M

Balancing Incident Disclosure and Tactical Response: Lessons from the Halliburton Breac...

On August 22, 2024, global multinational energy firm Halliburton disclosed through an 8-K form filing to the…

READ NOW →

TRU Positive/Bulletin

5 M

LummaC2 Malware and Malicious Chrome Extension Delivered via DLL Side-Loading

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →

TRU Positive/Bulletin

4 M

Exploring AsyncRAT and Infostealer Plugin Delivery Through Phishing Emails

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →

Sensitive Data Protection

9 M

Zero Trust Best Practices: Guidelines for Successful Adoption

Traditional perimeter-based security models are insufficient to protect against today’s sophisticated threat…

READ NOW →

TRU Positive/Bulletin

13 M

Exploring the D3F@ck Malware-as-a-Service Loader

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Company News

2 M

eSentire Joins the Joint Cyber Defense Collaborative (JCDC) to Boost Cyber Threat Intel...

We are thrilled to join the Joint Cyber Defense Collaborative (JCDC), a public-private cybersecurity initiative…

READ NOW →

Cybersecurity Strategy

5 M

Understanding MDR Breach Protection Warranties: Key Questions to Ask and What They Actu...

Cyber insurance is commonly used by businesses to mitigate potential losses in the event of a breach. Although…

READ NOW →
Page
of 48