The eSentire Blog

Managed Detection and Response

3 M

eSentire Named a Strong Performer in The Forrester Wave™

We are thrilled to be named a Strong Performer in The Forrester Wave™: Managed Detection and Response…

READ NOW →

TRU Positive/Bulletin

12 M

Fake DeepSeek Site Infects Mac Users with Atomic (AMOS) Stealer

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →

Generative AI

11 M

DeepSeek AI: What Security Leaders Need to Know About Its Security Risks

Artificial intelligence is evolving at a rapid pace, and organizations are increasingly looking for ways to…

READ NOW →

TRU Positive/Bulletin

13 M

Unraveling the Many Stages and Techniques Used by RedCurl/EarthKapre APT

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →

TRU Positive/Bulletin

4 M

Threat Actors Use CVE-2019-18935 to Deliver Reverse Shells and JuicyPotatoNG Privilege ...

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite…

READ NOW →

Company News

2 M

Tia Hopkins Recognized in Special Influencers Edition by Security Journal Americas

Originally published in securityjournalamericas.com The threat landscape is shifting at a pace…

READ NOW →

TRU Positive/Bulletin

3 M

Lumma Stealer Malware Updated to Use ChaCha20 Cipher for Config Decryption

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →

TRU Positive/Bulletin

9 M

MintsLoader: StealC and BOINC Delivery

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →

Company News

3 M

eSentire Named in the 2025 Waterloo Area's Top Employers List for Eighth Consecutive Ye...

eSentire is thrilled to announce that it has been named to the 2025 Waterloo Area’s Top Employers list for…

READ NOW →

AI/ML

3 M

Cybersecurity Predictions for 2025: Generative AI, Quantum Computing, Zero Trust, and M...

I’ve never been a big fan of annual cybersecurity predictions, but this is the first year that I’ve thought about…

READ NOW →

Cybersecurity Strategy

5 M

Why the Canadian Government Should Collaborate with MDR Providers to Protect Canadian B...

North American organizations are vulnerable to cyberattacks, such as ransomware, from cybercriminals and…

READ NOW →

TRU Positive/Bulletin

5 M

Winos4.0 “Online Module” Staging Component Used in CleverSoar Campaign

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →
Page
of 50