The eSentire Blog

Sep 09, 2025

From months to hours: eSentire accelerates AI-augmented threat investigation with Anthropic’s Claude in Amazon Bedrock

Originally posted by AWS. Learn how eSentire amplifies elite security expertise with Anthropic’s…

READ NOW →

Posts from TRU Intelligence Center

Generative AI

2 M

CSIRO Finds eSentire’s AI Study Demonstrates Importance of Trust & Human Empowerment in...

Trust and innovation aren’t buzzwords – they’re the backbone of effective cybersecurity in the age of…

READ NOW →

Cybersecurity Strategy

8 M

From 10,000 Alerts to 10 Stories: How Correlated Attack Chains Can Help Beat SOC Burnou...

Security Operations Center (SOC) teams are drowning in a sea of alerts. According to recent research, 61% of…

READ NOW →

TRU Positive/Bulletin

9 M

Threat Actors Deploy Sinobi Ransomware via Compromised SonicWall SSL VPN Credentials

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →

TRU Positive/Bulletin

17 M

Unmasking Interlock Group's Evolving Malware Arsenal

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →

TRU Positive/Bulletin

6 M

Unpacking ShadowCoil’s (RansomHub Ex-affiliate) Credential Harvesting Tool

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →

TRU Positive/Bulletin

19 M

Cyber Stealer Analysis: When Your Malware Developer Has FOMO About Features

Key TakeawaysFirst identified by eSentire's Threat Response Unit (TRU) in May 2025, Cyber Stealer represents a new…

READ NOW →

TRU Positive/Bulletin

10 M

Ghost Crypt Powers PureRAT with Hypnosis

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →

Cybersecurity Strategy

11 M

What to Do When Your Security Provider Gets Acquired: How to Spot the Signals and Stay ...

When it comes to my career in the cybersecurity industry, I’ve been on both sides of the table during an…

READ NOW →

Threat Response Unit

3 M

Secure Your (Microsoft) Teams: Defending Against Helpdesk Impersonation Attacks

In recent months, eSentire's Threat Response Unit (TRU) has observed an increased use of Microsoft Teams…

READ NOW →
Page
of 51