The eSentire Blog

Jan 20, 2026

eSentire Named in 2026 Waterloo Area's Top Employer Awards List for 9th Consecutive Year

We are so proud to be named on the 2026 Waterloo Area’s Top Employers list. This is the ninth consecutive year…

READ NOW →

Posts from TRU Intelligence Center

22 M

Hackers are Celebrating the Holidays Big this Year Selling ChatGPT, Perplexity and Gemi...

Visit any news site on the Web and you will be hard pressed not to find numerous stories about Artificial…

READ NOW →

Cybersecurity Strategy

9 M

From Prevention to Cyber Resilience: 5 Evidence-based Priorities Reshaping Australian C...

Cyber security in Australia has reached a watershed moment. According to new research from Moxie Insights…

READ NOW →

TRU Positive/Bulletin

17 M

EVALUSION Campaign Delivers Amatera Stealer and NetSupport RAT

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →

Generative AI

3 M

AI is Reshaping Cyber – Here's Why Today's CISOs Are Tomorrow's AI Transformation Leade...

Originally posted by Intelligent Enterprise Leaders Alliance (IELA). Traditional SOCs and MSSPs…

READ NOW →

TRU Positive/Bulletin

8 M

Unpacking NetSupport RAT Loaders Delivered via ClickFix

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →

TRU Positive/Bulletin

10 M

New Rust Malware "ChaosBot" Uses Discord for Command and Control

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →

Third-Party Cyber Risk

3 M

Beyond Standard Protection: How eSentire's Atlas Agent Delivered Critical NPM Breach De...

The recent NPM package repository breach sent shockwaves through the development community, with malicious…

READ NOW →

TRU Positive/Bulletin

10 M

Eye of the Storm: Analyzing DarkCloud's Latest Capabilities

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →

Cybersecurity Strategy

11 M

How Identity-Centric Attacks Are Threatening Mid-Market Organizations

Mid-market organizations face an escalating security crisis that traditional cybersecurity frameworks struggle to…

READ NOW →
Page
of 53