The eSentire Blog

TRU Positive/Bulletin

4 M

UpdateAgent macOS Malware

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters…

READ NOW →

Threat Response Unit

9 M

eSentire Threat Intelligence Malware Analysis: HeaderTip

Since humans are still the weakest link in cybersecurity, threat actor(s) continue to prey on fallible human…

READ NOW →

Threat Response Unit

7 M

eSentire Threat Intelligence Malware Analysis: DoubleZero

DoubleZero is a newly emerging destructive malware targeting Ukrainian enterprises. The initial access vector is…

READ NOW →

Company News

4 M

eSentire named to the 2022 Canada’s Top Small & Medium Employers List

We are thrilled to announce that eSentire has been named to Mediacorp Canada Inc.’s 2022 Canada’s Top Small &…

READ NOW →

Threat Response Unit

6 M

eSentire Threat Intelligence Malware Analysis: CaddyWiper

First discovered by ESET researchers in March 2022, CaddyWiper malware is a new type of wiper malware used by…

READ NOW →

TRU Positive/Bulletin

4 M

Suspected AsyncRAT Delivered via ISO Files Using HTML Smuggling Technique

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters…

READ NOW →

Threat Response Unit

14 M

eSentire Threat Intelligence Malware Analysis: HermeticWiper & PartyTicket

Recently, there have been multiple reports of new wiper malware observed targeting Ukrainian organizations as part…

READ NOW →

Threat Response Unit

14 M

Conti Affiliate Exposed: New Domain Names, IP Addresses and Email Addresses Uncovered

A Cobalt Strike Cybercrime Syndicate and the Ransomware Hackers’ Favorite Weapon On March 9, the Cybersecurity…

READ NOW →

Threat Response Unit

12 M

Analysis of Leaked Conti Intrusion Procedures by eSentire’s Threat Response Unit (TRU)

As defenders, often our only insight into an adversary’s tradecraft is gleaned through an analysis of intrusion…

READ NOW →

Cybersecurity Strategy

6 M

What to Know Before You Pay the Ransom

There’s no doubt that the thought of having their company featured in national headlines as a victim of yet…

READ NOW →

Cybersecurity Strategy

3 M

Test Your Cybersecurity Defenses with Penetration Testing and Red Team Exercises

Today’s cyberattacks are unlike those from twenty, thirty years ago. When ransomware attacks were first…

READ NOW →

TRU Positive/Bulletin

3 M

Exploitation of VMware Horizon Servers by TunnelVision Threat Actor

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →
Page
of 47