eSentire Inc.
eSentire Inc.
Blog Post
  • This is the fifth and final blog post in the Living Off the Land blog series. In this edition, the focus is on how adversaries may leverage Living off the Land tools to create Command and Control (C2) communication after successfully completing the previous phases of the Cyber Kill Chain.Executive SummaryCommand and control is the second to final stage of the Cyber Kill Chain, enabling the adversa...

eSentire Inc.
eSentire Inc.
Blog Post
  • The eSentire Threat Intelligence team released their findings and analysis of cybersecurity incidents from the first quarter of 2018. Overall, they saw a dramatic increase in attacks targeting consumer-grade routers, increasing 539% from Q4, 2017. The majority of hostile detections on the eSentire threat detection surface pertain to perimeter threats: Information Gathering, Intrusion Attempts, and...

eSentire Inc.
eSentire Inc.
Blog Post
  • The insurance industry is built on trust. Unfortunately, this trust can easily be lost in the event of a cyber incident. The insurance sector has lagged far behind other financial-sector industries in its adoption of cybersecurity technologies. Although banks and other financial institutions were among the first to come under the attack of cybercriminals, they’re now among the most secure. Cybercr...

eSentire Inc.
eSentire Inc.
Blog Post
  • This is the fourth blog post in a series discussing Living Off the Land tools and techniques. Successful exploitation could allow an adversary to escalate privilege, obtain sensitive information or download additional software.In this blog post we will focus on tools that can be exploited to download additional payloads.SummaryLiving Off the Land tools for exploitation are popular amongst both sop...

eSentire Inc.
eSentire Inc.
Blog Post
  • Building societies offer banking, savings and mortgage lending, and other financial services, all of which makes them privy to their clients’ financial accounts and personal information. As a result, cybercriminals are targeting building societies for this data, as well as trade secrets and other information that could be used to their advantage.Unfortunately—as it stands—many building societies h...

eSentire Inc.
eSentire Inc.
Blog Post
  • The eSentire’s threat intelligence team produced a 2017 threat landscape report. The report focuses on threat specific trends and developments that have been empirically assessed based on eSentire data. We have also provided several forecasting scenarios that are game-changers from a threat landscape perspective.Some interesting observations that we did not expect to see:User passwords are conside...

eSentire Inc.
eSentire Inc.
Blog Post
  • Sheriff Brody said it best when he came face-to-face with the great white shark that was menacing the town of Amity Island in Spielberg’s 1975 blockbuster, Jaws. And the same sentiment holds true for smaller law firms hunting large clients. The risk and responsibilities that come with large clients, such as pharmaceutical companies, disruptor banks, and investment firms, remain the same, regardles...

eSentire Inc.
eSentire Inc.
Blog Post
  • Privacy Awareness Week runs from May 6-12 this year, which makes it a great time to talk about data privacy and protecting our information. Everything we do online leaves a trail of personal data, and that data is often tracked, monitored, and analysed. Some of it remains private and some of it is shared widely, so it is important to be aware of where our data is being stored, and who has access t...

eSentire Inc.
eSentire Inc.
Blog Post
  • This is the third installment of the Living Off the Land blog series. This section will focus on the Delivery and Installation phases of the Cyber Kill Chain.The delivery phase of an attack is focused on how an adversary distributes a weaponized payload. This can include the initial delivery phase (spam email/malicious downloads) or the lateral movement inside the network. Once the delivery stage ...

eSentire Inc.
eSentire Inc.
Blog Post
  • This is the second blog in a series focusing on “Living Off the Land” tools. Each installment of this series focuses on a specific stage of the Cyber Kill Chain framework. The topic of this blog post is the use of tools during the weaponization stage. Part one of this series—the reconnaissance stage—can be found here.1Adversaries take advantage of tools that are pre-installed on systems to execute...

eSentire Inc.
eSentire Inc.
Blog Post
  • In my first day of sessions at RSA Conference 2018, I noticed a recurring theme: associated risk mitigation from protecting the business vs. protecting the consumer. While no organization would publicly state that their primary focus of cybersecurity is to protect shareholder value vs. consumer well-being, the unfortunate truth is that for most organizations, the bottom line is really what drives ...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.