Task-specific Atlas Agents investigate threats at machine speed with full transparency, expert validation, and explainable outcomes you can trust.
Atlas Extended Detection and ResponseOpen XDR with Agentic AI & machine learning that eliminates noise, enables real-time detection and response, and automatically blocks threats.
Atlas User ExperienceSee what our SOC sees, review investigations, and see how we are protecting your business.
Atlas Platform IntegrationsSeamless integrations and threat investigation that adapts to your tools and evolves with your business.
24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.
Threat Response Unit (TRU)Proactive threat intelligence, original threat research and a world-class team of seasoned industry veterans.
Cyber Resilience TeamExtend your team capabilities and prevent business disruption with expertise from eSentire.
Response and RemediationWe balance automated blocks with rapid human-led investigations to manage threats.
Combine AI-driven security operations, multi-signal attack surface coverage and 24/7 Elite Threat Hunters to help you take your security program to the next level.
Get unlimited Incident Response with threat suppression guarantee - anytime, anywhere.
CTEM and advisory programs that identify security gaps and build proactive strategies to address them.
Flexible MDR pricing and packages that fit your unique security requirements.
Entry level foundational MDR coverage
Comprehensive Next Level eSentire MDR
Next Level eSentire MDR with Cyber Risk Advisors to continuously advance your security program
Stop ransomware before it spreads.
Identity ResponseStop identity-based cyberattacks.
Zero Day AttacksDetect and respond to zero-day exploits.
Cybersecurity ComplianceMeet regulatory compliance mandates.
Third-Party RiskDefend third-party and supply chain risk.
Cloud MisconfigurationEnd misconfigurations and policy violations.
Cyber RiskAdopt a risk-based security approach.
Mid-Market SecurityMid-market security essentials to prioritize.
Sensitive Data SecurityProtect your most sensitive data.
Cyber InsuranceMeet insurability requirements with MDR.
Cyber Threat IntelligenceOperationalize cyber threat intelligence.
Security LeadershipBuild a proven security program.
On February 25th, 2026, Cisco disclosed a critical zero-day vulnerability within the Cisco Catalyst SD-WAN Controller (formerly SD-WAN vSmart) and Cisco Catalyst SD-WAN Manager (formerly…
On February 17th, 2026, Dell disclosed a maximum severity zero-day vulnerability in Dell RecoverPoint for Virtual Machines. The vulnerability, tracked as CVE-2026-22769 (CVSS: 10), is due…
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 2000+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
About Us Leadership Careers Event Calendar → Newsroom → Aston Villa Football Club →We provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.
Search our site
Multi-Signal MDR with 300+ technology integrations to support your existing investments.
24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.
We offer three flexible MDR pricing packages that can be customized to your unique needs.
The latest security advisories, blogs, reports, industry publications and webinars published by TRU.
Compare eSentire to other Managed Detection and Response vendors to see how we stack up against the competition.
See why 2000+ organizations globally have chosen eSentire for their MDR Solution.
In 2025, identity-related cybercrime scaled rapidly with the expansion of "as-a-Service" models. Offering subscription-based access to an underground marketplace trading in digital identities, Phishing-as-a-Service (PhaaS) platforms enabled easier and more convenient account compromise than ever before. Unsurprisingly, account compromise attacks accounted for 50% of all threat cases investigated by the eSentire Threat Response Unit (TRU) against our global customer base.
In tandem, social engineering techniques hit new heights: according to the latest threat and incident data compiled in TRU's 2025 Year in Review Report, email bombing and IT impersonation surged 14x year-over-year.
TRU's analysis revealed five industries bore the brunt of this onslaught: Software, Manufacturing, Business Services, Legal, and Construction. These sectors faced the highest concentration of sophisticated attacks throughout 2025.
The new reality is clear: for most organizations, the speed and number of cyberattacks drastically exceed the capabilities of traditional defense. Therefore, your organization's 24/7 threat detection and response capabilities must adapt accordingly to the rapid escalation and industrialization of cyberattacks.
This blog features critical insights from TRU's 2025 Year in Review report, highlighting why these five industries became prime targets and the specialized tactics malicious operators deployed against each sector.

The Software industry emerged as the most frequently targeted sector among eSentire's customer base in 2025, experiencing a nearly 15% year-over-year increase in threat cases. This significant uptick can be attributed to several factors that make Software companies particularly attractive targets:
The continued targeting of software companies underscores the strategic value threat actors place on compromising organizations that serve as distribution points for malicious code or access to broader networks.
Manufacturing faces significant cybersecurity challenges, recording a 33% year-over-year increase in security incidents and ranking second among all industries for threat frequency. TRU's research identified two critical vulnerabilities driving this concentrated attention:
Manufacturing's growing digitalization has expanded the attack surface, thereby creating more entry points for threat actors, while older systems often remain in place without adequate security controls.
Organizations in the Business Services industry experienced the third-highest number of cases investigated and resolved by TRU in 2025, with an 8% year-over-year increase. Managed Service Providers (MSPs) in particular have become priority targets for sophisticated threat actors who recognize their value as a centralized attack vector due to the following factors:
This targeting pattern aligns with the broader trend of threat actors seeking operational efficiency by maximizing impact through strategic target selection.
TRU reported that Construction industry customers experienced a 27% decrease in cyber incidents. However, when threat actors did target this sector, they primarily chose to do so through identity-related threats, including:
The significant reduction in incidents can be attributed to a broader decline in BEC attacks across the construction industry, providing a much-needed reprieve for many companies in this sector.
Customers in the Legal industry saw a 20% rise in threat cases year-over-year, and they also experienced a notable shift in attack methodology.
The most significant trend observed was a dramatic increase in multi-stage attacks beginning with Email Bombing, followed by IT Help Desk Impersonation, a tactic which involves threat actors flooding email inboxes with spam before posing as IT support staff to "resolve" the manufactured crisis. In response, the victim grants remote access, which is then used to deploy ransomware or conduct other malicious actions.
In 2025, this tactic was responsible for 60 security incidents investigated and resolved by TRU. This evolution demonstrates how threat actors continuously refine their techniques, using initial email bombing to overwhelm targets' inboxes before following up with convincing IT support impersonation to exploit the resulting confusion.
The 2025 threat landscape revealed the full industrialization of cybercrime, with PhaaS platforms and sophisticated social engineering creating new challenges across industries. While each sector faced unique threats, organizations that prioritized identity security and enhanced detection capabilities demonstrated significantly better outcomes. As attack sophistication continues to outpace traditional defenses, security teams must pivot toward more proactive, intelligence-driven approaches tailored to their specific industry risks.
For a deeper analysis of these trends and strategic guidance on strengthening your organization's security posture, access the complete 2025 Year in Review, 2026 Threat Landscape Outlook Report.
To learn how your organization can build cyber resilience and prevent business disruption with eSentire’s Next Level MDR, connect with an eSentire Security Specialist now.
GET STARTED
As Content Marketing Specialist at eSentire, Diana strategizes, researches, and writes content across marketing channels. She has a degree in English Literature from McGill University, over 5 years of experience in content marketing through a variety of industries, and a keen ability to write engaging technical content.