What We Do
How We Do
Resources
Company
Partners
Get Started

The eSentire Blog

Sensitive Data Protection

9 M

Zero Trust Best Practices: Guidelines for Successful Adoption

Traditional perimeter-based security models are insufficient to protect against today’s sophisticated threat…

READ NOW →

TRU Positive/Bulletin

13 M

Exploring the D3F@ck Malware-as-a-Service Loader

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Company News

2 M

eSentire Joins the Joint Cyber Defense Collaborative (JCDC) to Boost Cyber Threat Intel...

We are thrilled to join the Joint Cyber Defense Collaborative (JCDC), a public-private cybersecurity initiative…

READ NOW →

Cybersecurity Strategy

5 M

Understanding MDR Breach Protection Warranties: Key Questions to Ask and What They Actu...

Cyber insurance is commonly used by businesses to mitigate potential losses in the event of a breach. Although…

READ NOW →

TRU Positive/Bulletin

7 M

Ande Loader Leads to 0bj3ctivity Stealer Infection

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →

TRU Positive/Bulletin

7 M

Quartet of Trouble: XWorm, AsyncRAT, VenomRAT, and PureLogs Stealer Leverage TryCloudfl...

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →

AI/ML

9 M

Hackers Are Stealing GenAI Credentials, So What Sensitive Company Data Are They Getting...

On the Underground Hacker Markets, a criminal can purchase any number of illegal goods. They can get…

READ NOW →

Ransomware

7 M

Top Strategies for Ensuring Ransomware Readiness in 2024

Ransomware continues to evolve with attackers employing sophisticated tactics to infiltrate systems and…

READ NOW →

TRU Positive/Bulletin

13 M

Introducing Gh0stGambit: A Dropper for Deploying Gh0st RAT

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →
9 M

Understanding MDR Security: A Comprehensive Guide

Managed Detection and Response (MDR) is a critical layer in a proactive, adaptive security strategy. By…

READ NOW →

TRU Positive/Bulletin

12 M

The Gatekeeper's Secrets: DarkGate Malware Analysis

Introduction In the beginning of 2024, eSentire's Threat Response Unit (TRU) observed an increase…

READ NOW →

TRU Positive/Bulletin

5 M

Exploring the Infection Chain: ScreenConnect’s Link to AsyncRAT Deployment

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →
Page
of 47