The eSentire Blog

TRU Positive/Bulletin

7 M

Unpacking ShadowCoil’s (RansomHub Ex-affiliate) Credential Harvesting Tool

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →

TRU Positive/Bulletin

21 M

Cyber Stealer Analysis: When Your Malware Developer Has FOMO About Features

Key TakeawaysFirst identified by eSentire's Threat Response Unit (TRU) in May 2025, Cyber Stealer represents a new…

READ NOW →

TRU Positive/Bulletin

11 M

Ghost Crypt Powers PureRAT with Hypnosis

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →

Cybersecurity Strategy

12 M

What to Do When Your Security Provider Gets Acquired: How to Spot the Signals and Stay Ahead of the Spin

When it comes to my career in the cybersecurity industry, I’ve been on both sides of the table during an…

READ NOW →

Threat Response Unit

4 M

Secure Your (Microsoft) Teams: Defending Against Helpdesk Impersonation Attacks

In recent months, eSentire's Threat Response Unit (TRU) has observed an increased use of Microsoft Teams…

READ NOW →

Managed Detection and Response

4 M

eSentire Wins Multiple Leader Badges in the Summer 2025 G2 Grid® Reports

We are so excited to share that eSentire has been recognized with multiple MDR leader badges by G2 as part…

READ NOW →

TRU Positive/Bulletin

4 M

Threat Actors Recompile SonicWall's NetExtender to Include SilentRoute Backdoor

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →
15 M

Don't Get Caught in the Headlights - DeerStealer Analysis

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →

Threat Response Unit

8 M

Operationalizing Threat Intelligence vs. Threat Hunting: What Does It Really Mean?

Today’s threat actors are faster, stealthier, and increasingly well-resourced, so your IT/Security team can’t…

READ NOW →

Threat Response Unit

4 M

Operation Endgame Disrupts AvCheck, Forces Threat Actors to Seek Alternatives

Law enforcement agencies recently dismantled avcheck[.]net through Operation Endgame, a major international effort…

READ NOW →

TRU Positive/Bulletin

10 M

When Samsung's Magic Turns Tragic: A Tale of Unauthorized Mining

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →

Generative AI

6 M

How AI Can Reshape Security Operations Through Augmentation, Not Automation

The promise of AI in cybersecurity has stirred excitement and skepticism. There’s no shortage of claims that…

READ NOW →
Page
of 35