The eSentire Blog

TRU Positive/Bulletin

8 M

WorkersDevBackdoor Delivered via Malvertising

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

7 M

Ducktail and Peeling the Layers of PowerShell

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

8 M

PhantomControl returns with Ande Loader and SwaetRAT

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

5 M

"NextPHP" Phishing Campaign

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

7 M

DanaBot's Latest Move: Deploying Latrodectus

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Managed Detection and Response

3 M

eSentire Named a Strong Performer in The Forrester Wave™: Managed Detection and Respons...

We are thrilled to be named a Strong Performer with a top 3 placement in The Forrester Wave™: Managed Detection…

READ NOW →
8 M

Citrix Bleed Vulnerability:

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Company News

4 M

eSentire Named in 2024 Waterloo Area's Top Employers List for Seventh Consecutive Year

We are thrilled to be named to the 2024 Waterloo Area’s Top Employers list for the seventh consecutive year. This…

READ NOW →

TRU Positive/Bulletin

5 M

Unveiling Parallax RAT: A Journey from Infection to Lateral Movement

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Managed Risk Programs

5 M

The Rise of QR Code Phishing Attacks and Best Practices for Interacting with QR Codes

Since the onset of the COVID-19 pandemic, most businesses across a wide range of industries have begun using Quick…

READ NOW →

TRU Positive/Bulletin

18 M

eSentire Threat Intelligence Malware Analysis: SolarMarker: To Jupyter and Back

Key Takeaways SolarMarker uses process injection to run the hVNC and data staging payload.The actors behind…

READ NOW →

Third-Party Cyber Risk

9 M

Why Manufacturing Organizations Need to Embrace the Microsoft Security Tools for 24/7 T...

For manufacturing organizations, the introduction of Industry 4.0 and rapid digital transformation have led to…

READ NOW →
Page
of 47