The eSentire Blog

AI/ML

7 M

eSentire in the Age of AI-Driven Threats

Last month, Anthropic disclosed that its Claude Mythos model had autonomously discovered thousands of zero-day…

READ NOW →

Generative AI

6 M

How AI Can Reshape Security Operations Through Augmentation, Not Automation

The promise of AI in cybersecurity has stirred excitement and skepticism. There’s no shortage of claims that…

READ NOW →

AI/ML

4 M

Cybersecurity Predictions for 2025: Generative AI, Quantum Computing, Zero Trust, and More

I’ve never been a big fan of annual cybersecurity predictions, but this is the first year that I’ve thought about…

READ NOW →

Generative AI

8 M

How Generative AI Can Be Used to Enable Better Security Outcomes

Generative AI (GenAI) technologies have had a transformative impact on businesses, significantly improving…

READ NOW →

Generative AI

4 M

AI May Be A Powerful Tool, But It’s No Substitute for Cyber Experts

Originally posted on the thestar.com on September 14, 2024. This is the year for artificial intelligence (AI)…

READ NOW →

AI/ML

10 M

Hackers Are Stealing GenAI Credentials, So What Sensitive Company Data Are They Getting their Hands On?

On the Underground Hacker Markets, a criminal can purchase any number of illegal goods. They can get…

READ NOW →

AI/ML

10 M

How ChatGPT and Other Generative AI Tools Impact Risk for Cyber Insurance Providers and Security Leaders

Enterprise organizations and cyber insurance providers can't ignore generative AI technologies like ChatGPT.…

READ NOW →

AI/ML

8 M

FakeBat Impersonates Midjourney, ChatGPT in Drive-by Cyberattacks

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

AI/ML

4 M

AI’s Role in Cybersecurity

Artificial intelligence (AI) has been seen as having great potential since 1956. Based on computing algorithms…

READ NOW →

AI/ML

3 M

Using a Machine Learning Threat Detection Model to Extract and Classify Malicious Macros

Threat actors have long relied on the use of macros to create malicious documents that are emailed to unknowing…

READ NOW →