Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Solarmarker, Part II: A Security Analyst’s Perspective and Live Analysis Adam Boretos and Nick Cavalancia Join Rapid7 for this on-demand webcast focused on Solarmarker malware. In this webcast, Rapid7 Detection & Response Analyst, Adam Boretos and UIS' Ni... 2 years ago | 88 mins A Security Analyst’s Deep Dive Analysis of the Solarmarker Malware Dropper Willow Shipperley and Nick Cavalancia Solarmarker is a modular, multistage, heavily obfuscated PowerShell loader, which leads to a .NET compiled backdoor being executed. Solarmarker is fle... 2 years ago | 85 mins A Security Analyst’s Deep Dive Analysis of the Solarmarker Malware Dropper Willow Shipperley and Nick Cavalancia Solarmarker is a modular, multistage, heavily obfuscated PowerShell loader, which leads to a .NET compiled backdoor being executed. Solarmarker is fle... 1 year ago | 85 mins Solarmarker, Part II: A Security Analyst’s Perspective and Live Analysis Adam Boretos and Nick Cavalancia Join Rapid7 for this on-demand webcast focused on Solarmarker malware. In this webcast, Rapid7 Detection & Response Analyst, Adam Boretos and UIS' Ni... 1 year ago | 88 mins October 2021 Threat Intelligence Observations Paul Aitken, Keegan Keplinger Join eSentire’s Threat Intelligence (TI) team as they discuss the latest cyber attacks observed by our Security Operations Center (SOC) in October 202... 1 year ago | 41 mins December 2021 Threat Intelligence Observations Paul Aitken, Spence Hutchinson, Keegan Keplinger, Ryan Westman Join eSentire’s Threat Intelligence (TI) team as they discuss the latest cyberattacks observed by our Security Operations Center (SOC) in December 202... 1 year ago | 58 mins Securing Law Firms Against The Top Web and Email-Borne Cyber Threats Spence Hutchinson, Principal Threat Researcher, eSentire Safeguarding your legal firm from cyberattacks and threats caused by user execution takes an understanding of the threats, a robust cybersecurity prog... 6 months ago | 32 mins