The eSentire Blog

Threat Response Unit

5 M

Curiosity: A Cat’s Worst Enemy, But A SOC Analyst's Best Friend

The toolkit of a Security Operations Center (SOC) Analyst should include a wide variety of tools and resources;…

READ NOW →
23 M

Hackers are Celebrating the Holidays Big this Year Selling ChatGPT, Perplexity and Gemini Subscriptions for 40% to 75% Off!

Visit any news site on the Web and you will be hard pressed not to find numerous stories about Artificial…

READ NOW →

Cybersecurity Strategy

10 M

From Prevention to Cyber Resilience: 5 Evidence-based Priorities Reshaping Australian Cyber Security

Cyber security in Australia has reached a watershed moment. According to new research from Moxie Insights…

READ NOW →

TRU Positive/Bulletin

19 M

EVALUSION Campaign Delivers Amatera Stealer and NetSupport RAT

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →

Generative AI

4 M

AI is Reshaping Cyber – Here's Why Today's CISOs Are Tomorrow's AI Transformation Leaders

Originally posted by Intelligent Enterprise Leaders Alliance (IELA). Traditional SOCs and MSSPs…

READ NOW →

TRU Positive/Bulletin

10 M

Unpacking NetSupport RAT Loaders Delivered via ClickFix

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →

TRU Positive/Bulletin

11 M

New Rust Malware "ChaosBot" Uses Discord for Command and Control

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →

Third-Party Cyber Risk

4 M

Beyond Standard Protection: How eSentire's Atlas Agent Delivered Critical NPM Breach Defense

The recent NPM package repository breach sent shockwaves through the development community, with malicious…

READ NOW →

TRU Positive/Bulletin

11 M

Eye of the Storm: Analyzing DarkCloud's Latest Capabilities

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →

Cybersecurity Strategy

12 M

How Identity-Centric Attacks Are Threatening Mid-Market Organizations

Mid-market organizations face an escalating security crisis that traditional cybersecurity frameworks struggle to…

READ NOW →

Cybersecurity Strategy

14 M

Not Enough Security Staff? How to Bridge the Cybersecurity Talent Gap with 24/7 MDR Services

It's 2 AM on a Sunday, and your security alerts are firing. Your network monitoring system has detected suspicious…

READ NOW →

Generative AI

12 M

Model Context Protocol Security: Critical Vulnerabilities Every CISO Should Address in 2025

The rapid enterprise adoption of Model Context Protocol (MCP) represents a pivotal moment in AI security, one that…

READ NOW →
Page
of 53