What We Do
How We Do
Resources
Company
Partners
Get Started
Webinar

September 2024 TRU Intelligence Briefing On-Demand

Join eSentire’s Threat Response Unit (TRU) as they share new research-driven observations of malware, notable vulnerabilities, threat actor groups, and cyber activity affecting the threat landscape.

During the September Threat Intelligence Briefing, TRU will review:

  • Unpacking Trends Around Windows Installer Packages: An analysis of recent trends observed among our customers and the broader threat landscape, focusing on the misuse of Windows installer packages for malware infections. This discussion will cover MSI, MISX, and Inno Setup packages, how they are abused, recommendations for analysis, and the underground services fueling this trend.
  • Tactical Threat Response – App Installer Abuse: An overview of how threat actors utilize application installers to distribute malware, along with best practices for mitigating these risks.
  • Updates on Poseidon Stealer, Go Injector, and Play Ransomware.
  • Notable vulnerabilities impacting Versa, SolarWinds, and Apache.
  • A brief update on cyber activity relating to ongoing geopolitical tensions.

This webinar also includes a live Q&A.

Watch the Webinar

By clicking the button above I confirm that I have read and agree to the eSentire privacy policy.

Join eSentire’s Threat Response Unit (TRU) as they share new research-driven observations of malware, notable vulnerabilities, threat actor groups, and cyber activity affecting the threat landscape.

During the September Threat Intelligence Briefing, TRU will review:

  • Unpacking Trends Around Windows Installer Packages: An analysis of recent trends observed among our customers and the broader threat landscape, focusing on the misuse of Windows installer packages for malware infections. This discussion will cover MSI, MISX, and Inno Setup packages, how they are abused, recommendations for analysis, and the underground services fueling this trend.
  • Tactical Threat Response – App Installer Abuse: An overview of how threat actors utilize application installers to distribute malware, along with best practices for mitigating these risks.
  • Updates on Poseidon Stealer, Go Injector, and Play Ransomware.
  • Notable vulnerabilities impacting Versa, SolarWinds, and Apache.
  • A brief update on cyber activity relating to ongoing geopolitical tensions.

This webinar also includes a live Q&A.

Get The Webinar