<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="sitemap.xsl"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://www.esentire.com/blog/multi-stage-seo-poisoning-campaign-targets-chinese-speaking-developers-with-kong-rat</loc><lastmod>2026-04-16T20:57:51-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_14.jpg</image:loc><image:title>Blog+14</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-in-the-age-of-ai-driven-threats</loc><lastmod>2026-04-16T18:38:42-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_12.jpg</image:loc><image:title>Blog+12</image:title></image:image></url><url><loc>https://www.esentire.com/blog/stx-rat-a-new-rat-in-2026-with-infostealer-capabilities</loc><lastmod>2026-04-08T19:10:06-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_11.jpg</image:loc><image:title>Blog+11</image:title></image:image></url><url><loc>https://www.esentire.com/blog/examining-the-blast-radius-from-the-axios-npm-supply-chain-compromise</loc><lastmod>2026-04-08T17:32:01-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_10.jpg</image:loc><image:title>Blog+10</image:title></image:image></url><url><loc>https://www.esentire.com/blog/tycoon-2fa-infrastructure-update-threat-actors-adapt-following-global-coalition-takedown</loc><lastmod>2026-04-01T17:04:39-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_09.jpg</image:loc><image:title>Blog+09</image:title></image:image></url><url><loc>https://www.esentire.com/blog/etherrat-sys-info-module-c2-on-ethereum-etherhiding-target-selection-cdn-like-beacons</loc><lastmod>2026-03-25T21:41:23-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_07.jpg</image:loc><image:title>Blog+07</image:title></image:image></url><url><loc>https://www.esentire.com/blog/how-esentire-runs-expert-level-threat-investigations-at-scale-with-claude</loc><lastmod>2026-03-25T22:52:47-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_06.jpg</image:loc><image:title>Blog+06</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-wins-multiple-leader-badges-in-the-g2-spring-2026-grid-reports</loc><lastmod>2026-03-25T22:52:54-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_08.jpg</image:loc><image:title>Blog+08</image:title></image:image></url><url><loc>https://www.esentire.com/blog/muddywater-apt-tsundere-botnet-etherhiding-the-c2</loc><lastmod>2026-03-13T13:34:57-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_05.jpg</image:loc><image:title>Blog+05</image:title></image:image></url><url><loc>https://www.esentire.com/blog/north-korean-apt-malware-analysis-dev-popper-rat-and-omnistealer-everyday-im-shufflin</loc><lastmod>2026-03-18T14:37:42-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_04.jpg</image:loc><image:title>Blog+04</image:title></image:image></url><url><loc>https://www.esentire.com/blog/microsoft-announces-disruption-of-tycoon-2fa-in-coordination-with-industry-partners</loc><lastmod>2026-03-05T12:40:49-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_03.jpg</image:loc><image:title>Blog+03</image:title></image:image></url><url><loc>https://www.esentire.com/blog/how-cybercriminals-customized-attacks-for-five-industries-in-2025</loc><lastmod>2026-02-26T17:57:01-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_02.jpg</image:loc><image:title>Blog+02</image:title></image:image></url><url><loc>https://www.esentire.com/blog/from-classroom-to-soc-how-esentire-cultivates-cybersecurity-excellence</loc><lastmod>2026-02-12T16:29:27-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_01.jpg</image:loc><image:title>Blog+01</image:title></image:image></url><url><loc>https://www.esentire.com/blog/tenant-from-hell-prometeis-unauthorized-stay-in-your-windows-server</loc><lastmod>2026-02-05T23:03:03-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_24.jpg</image:loc><image:title>Blog+24</image:title></image:image></url><url><loc>https://www.esentire.com/blog/weaponized-in-china-deployed-in-india-the-syncfuture-espionage-targeted-campaign</loc><lastmod>2026-01-23T12:19:22-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_23.jpg</image:loc><image:title>Blog+23</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-named-in-2026-waterloo-areas-top-employer-awards-list-for-9th-consecutive-year</loc><lastmod>2026-01-19T15:17:42-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_22.jpg</image:loc><image:title>Blog+22</image:title></image:image></url><url><loc>https://www.esentire.com/blog/key-statistics-esentire-2026-annual-cyber-threat-report</loc><lastmod>2026-01-15T17:35:42-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_21.jpg</image:loc><image:title>Blog+21</image:title></image:image></url><url><loc>https://www.esentire.com/blog/curiosity-a-cats-worst-enemy-but-a-soc-analysts-best-friend</loc><lastmod>2025-12-18T14:23:40-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_20.jpg</image:loc><image:title>Blog+20</image:title></image:image></url><url><loc>https://www.esentire.com/blog/hackers-are-celebrating-holidays-big-this-year</loc><lastmod>2025-12-10T08:12:46-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_19.jpg</image:loc><image:title>Blog+19</image:title></image:image></url><url><loc>https://www.esentire.com/blog/5-evidence-based-priorities-reshaping-australian-cyber-security</loc><lastmod>2025-12-11T16:17:57-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_18.jpg</image:loc><image:title>Blog+18</image:title></image:image></url><url><loc>https://www.esentire.com/blog/evalusion-campaign-delivers-amatera-stealer-and-netsupport-rat</loc><lastmod>2025-11-13T20:13:10-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_17.jpg</image:loc><image:title>Blog+17</image:title></image:image></url><url><loc>https://www.esentire.com/blog/ai-is-reshaping-cyber-heres-why-todays-cisos-are-tomorrows-ai-transformation-leaders</loc><lastmod>2025-10-30T13:34:41-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_16.jpg</image:loc><image:title>Blog+16</image:title></image:image></url><url><loc>https://www.esentire.com/blog/unpacking-netsupport-rat-loaders-delivered-via-clickfix</loc><lastmod>2025-10-23T18:02:57-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_15.jpg</image:loc><image:title>Blog+15</image:title></image:image></url><url><loc>https://www.esentire.com/blog/new-rust-malware-chaosbot-uses-discord-for-command-and-control</loc><lastmod>2025-10-16T17:59:18-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_14.jpg</image:loc><image:title>Blog+14</image:title></image:image></url><url><loc>https://www.esentire.com/blog/beyond-standard-protection-how-esentires-atlas-agent-delivered-critical-npm-breach-defense</loc><lastmod>2025-10-03T13:19:31-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_12.jpg</image:loc><image:title>Blog+12</image:title></image:image></url><url><loc>https://www.esentire.com/blog/eye-of-the-storm-analyzing-darkclouds-latest-capabilities</loc><lastmod>2025-09-25T18:17:16-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_11.jpg</image:loc><image:title>Blog+11</image:title></image:image></url><url><loc>https://www.esentire.com/blog/how-identity-centric-attacks-are-threatening-mid-market-organizations</loc><lastmod>2025-10-09T17:42:21-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_10.jpg</image:loc><image:title>Blog+10</image:title></image:image></url><url><loc>https://www.esentire.com/blog/not-enough-security-staff-how-to-bridge-the-cybersecurity-talent-gap-with-24-7-mdr-services</loc><lastmod>2025-10-09T17:43:50-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_09.jpg</image:loc><image:title>Blog+09</image:title></image:image></url><url><loc>https://www.esentire.com/blog/model-context-protocol-security-critical-vulnerabilities-every-ciso-should-address-in-2025</loc><lastmod>2025-10-09T17:40:27-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_08.jpg</image:loc><image:title>Blog+08</image:title></image:image></url><url><loc>https://www.esentire.com/blog/from-months-to-hours-esentire-accelerates-ai-augmented-threat-investigation-with-anthropics-claude-in-amazon-bedrock</loc><lastmod>2025-09-11T18:34:10-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_07.jpg</image:loc><image:title>Blog+07</image:title></image:image></url><url><loc>https://www.esentire.com/blog/new-botnet-emerges-from-the-shadows-nightshadec2</loc><lastmod>2025-09-18T18:09:08-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_06.jpg</image:loc><image:title>Blog+06</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-named-a-leader-in-the-forrester-wave-mdr-services-in-europe-q3-2025</loc><lastmod>2025-09-04T19:52:38-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_05.jpg</image:loc><image:title>Blog+05</image:title></image:image></url><url><loc>https://www.esentire.com/blog/csiro-finds-esentires-ai-study-demonstrates-importance-of-trust-human-empowerment-in-cybersecurity-services</loc><lastmod>2025-09-04T16:51:37-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_04.jpg</image:loc><image:title>Blog+04</image:title></image:image></url><url><loc>https://www.esentire.com/blog/from-10-000-alerts-to-10-stories-how-correlated-attack-chains-can-help-beat-soc-burnout</loc><lastmod>2025-10-02T15:37:12-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_03.jpg</image:loc><image:title>Blog+03</image:title></image:image></url><url><loc>https://www.esentire.com/blog/threat-actors-deploy-sinobi-ransomware-via-compromised-sonicwall-ssl-vpn-credentials</loc><lastmod>2025-08-27T16:58:14-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_02.jpg</image:loc><image:title>Blog+02</image:title></image:image></url><url><loc>https://www.esentire.com/blog/unmasking-interlock-groups-evolving-malware-arsenal</loc><lastmod>2025-08-14T12:52:24-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_01.jpg</image:loc><image:title>Blog+01</image:title></image:image></url><url><loc>https://www.esentire.com/blog/unpacking-shadowcoils-ransomhub-ex-affiliate-credential-harvesting-tool</loc><lastmod>2025-07-31T15:29:23-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_24.jpg</image:loc><image:title>Blog+24</image:title></image:image></url><url><loc>https://www.esentire.com/blog/cyber-stealer-analysis-when-your-malware-developer-has-fomo-about-features</loc><lastmod>2025-07-24T17:43:27-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_23.jpg</image:loc><image:title>Blog+23</image:title></image:image></url><url><loc>https://www.esentire.com/blog/ghost-crypt-powers-purerat-with-hypnosis</loc><lastmod>2025-07-17T18:51:45-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_22.jpg</image:loc><image:title>Blog+22</image:title></image:image></url><url><loc>https://www.esentire.com/blog/what-to-do-when-your-security-provider-gets-acquired-how-to-spot-the-signals-and-stay-ahead-of-the-spin</loc><lastmod>2025-07-17T17:07:06-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_21.jpg</image:loc><image:title>Blog+21</image:title></image:image></url><url><loc>https://www.esentire.com/blog/secure-your-microsoft-teams-defending-against-helpdesk-impersonation-attacks</loc><lastmod>2025-07-17T16:54:12-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_20.jpg</image:loc><image:title>Blog+20</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-wins-multiple-leader-badges-summer-2025-g2-grid-reports</loc><lastmod>2025-07-03T13:37:46-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_19.jpg</image:loc><image:title>Blog+19</image:title></image:image></url><url><loc>https://www.esentire.com/blog/threat-actors-recompile-sonicwalls-netextender-to-include-silentroute-backdoor</loc><lastmod>2025-07-03T13:34:06-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_18.jpg</image:loc><image:title>Blog+18</image:title></image:image></url><url><loc>https://www.esentire.com/blog/dont-get-caught-in-the-headlights-deerstealer-analysis</loc><lastmod>2025-07-28T14:50:43-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_17.jpg</image:loc><image:title>Blog+17</image:title></image:image></url><url><loc>https://www.esentire.com/blog/operationalizing-threat-intelligence-vs-threat-hunting-what-does-it-really-mean</loc><lastmod>2025-06-25T09:10:32-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_16.jpg</image:loc><image:title>Blog+16</image:title></image:image></url><url><loc>https://www.esentire.com/blog/operation-endgame-disrupts-avcheck-forces-threat-actors-to-seek-alternatives</loc><lastmod>2025-06-05T18:44:56-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_15.jpg</image:loc><image:title>Blog+15</image:title></image:image></url><url><loc>https://www.esentire.com/blog/when-samsungs-magic-turns-tragic-a-tale-of-unauthorized-mining</loc><lastmod>2025-05-29T15:28:18-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_14.jpg</image:loc><image:title>Blog+14</image:title></image:image></url><url><loc>https://www.esentire.com/blog/how-ai-can-reshape-security-operations-through-augmentation-not-automation</loc><lastmod>2025-06-20T16:38:45-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_13.jpg</image:loc><image:title>Blog+13</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-named-tenables-2025-top-mssp-partner-in-north-america</loc><lastmod>2025-05-28T15:21:44-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_12.jpg</image:loc><image:title>Blog+12</image:title></image:image></url><url><loc>https://www.esentire.com/blog/pure-crypter-malware-analysis-99-problems-but-detection-aint-one</loc><lastmod>2025-05-12T12:30:04-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_11.jpg</image:loc><image:title>Blog+11</image:title></image:image></url><url><loc>https://www.esentire.com/blog/identity-is-the-new-attack-surface-why-threat-detection-alone-isnt-enough</loc><lastmod>2025-05-08T13:17:04-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_10.jpg</image:loc><image:title>Blog+10</image:title></image:image></url><url><loc>https://www.esentire.com/blog/mdr-vendors-complete-guide-to-understanding-managed-detection-response-vendors</loc><lastmod>2025-10-16T20:34:23-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_09.jpg</image:loc><image:title>Blog+09</image:title></image:image></url><url><loc>https://www.esentire.com/blog/unlocking-new-possibilities-for-network-monitoring-and-security-with-microsoft-azure-virtual-network-terminal-access-point-tap</loc><lastmod>2025-04-28T10:51:23-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_08.jpg</image:loc><image:title>Blog+08</image:title></image:image></url><url><loc>https://www.esentire.com/blog/socket-puppet-how-ransomhub-affiliates-pull-the-strings</loc><lastmod>2025-04-24T16:32:02-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_07.jpg</image:loc><image:title>Blog+07</image:title></image:image></url><url><loc>https://www.esentire.com/blog/phish-chips-serving-up-tycoon-2fas-secrets</loc><lastmod>2025-04-24T16:43:24-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_06.jpg</image:loc><image:title>Blog+06</image:title></image:image></url><url><loc>https://www.esentire.com/blog/cybersecurity-investments-cisos-should-make-in-2025</loc><lastmod>2025-04-24T14:13:54-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_05.jpg</image:loc><image:title>Blog+05</image:title></image:image></url><url><loc>https://www.esentire.com/blog/the-long-and-shortcut-of-it-koiloader-analysis</loc><lastmod>2025-03-27T17:22:04-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_04.jpg</image:loc><image:title>Blog+04</image:title></image:image></url><url><loc>https://www.esentire.com/blog/from-access-to-encryption-dissecting-hunters-internationals-latest-ransomware-attack</loc><lastmod>2025-03-20T15:52:43-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_03.jpg</image:loc><image:title>Blog+03</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-and-qylis-form-strategic-partnership-to-deliver-compliant-cybersecurity-solutions-in-india</loc><lastmod>2025-03-18T13:28:32-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_02.jpg</image:loc><image:title>Blog+02</image:title></image:image></url><url><loc>https://www.esentire.com/blog/initial-takeaways-from-the-black-basta-chat-leaks</loc><lastmod>2025-05-22T16:40:11-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_01.jpg</image:loc><image:title>Blog+01</image:title></image:image></url><url><loc>https://www.esentire.com/blog/your-mfa-is-no-match-for-sneaky2fa</loc><lastmod>2025-02-28T09:59:42-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_24.jpg</image:loc><image:title>Blog+24</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-named-a-strong-performer-in-the-forrester-wave-managed-detection-and-response-services-q1-2025-report</loc><lastmod>2025-02-27T15:45:35-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_23.jpg</image:loc><image:title>Blog+23</image:title></image:image></url><url><loc>https://www.esentire.com/blog/fake-deepseek-site-infects-mac-users-with-atomic-stealer</loc><lastmod>2025-07-02T12:11:55-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_22.jpg</image:loc><image:title>Blog+22</image:title></image:image></url><url><loc>https://www.esentire.com/blog/deepseek-ai-what-security-leaders-need-to-know-about-its-security-risks</loc><lastmod>2025-02-19T10:32:39-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_20.jpg</image:loc><image:title>Blog+20</image:title></image:image></url><url><loc>https://www.esentire.com/blog/unraveling-the-many-stages-and-techniques-used-by-redcurl-earthkapre-apt</loc><lastmod>2025-02-20T17:43:00-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_21.jpg</image:loc><image:title>Blog+21</image:title></image:image></url><url><loc>https://www.esentire.com/blog/tia-hopkins-recognized-in-special-influencers-edition-by-security-journal-americas</loc><lastmod>2025-01-30T14:12:44-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_20.jpg</image:loc><image:title>Blog+20</image:title></image:image></url><url><loc>https://www.esentire.com/blog/threat-actors-use-cve-2019-18935-to-deliver-reverse-shells-and-juicypotatong-privilege-escalation-tool</loc><lastmod>2025-01-30T18:40:42-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_19.jpg</image:loc><image:title>Blog+19</image:title></image:image></url><url><loc>https://www.esentire.com/blog/lumma-stealer-malware-updated-to-use-chacha20-cipher-for-config-decryption</loc><lastmod>2025-01-23T16:04:45-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_18.jpg</image:loc><image:title>Blog+18</image:title></image:image></url><url><loc>https://www.esentire.com/blog/mintsloader-stealc-and-boinc-delivery</loc><lastmod>2025-01-23T12:21:16-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_17.jpg</image:loc><image:title>Blog+17</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-named-in-the-2025-waterloo-areas-top-employers-list-for-eighth-consecutive-year</loc><lastmod>2025-01-16T16:24:13-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_16.jpg</image:loc><image:title>Blog+16</image:title></image:image></url><url><loc>https://www.esentire.com/blog/cybersecurity-predictions-for-2025-generative-ai-quantum-computing-zero-trust-and-more</loc><lastmod>2025-01-16T17:49:09-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_15.jpg</image:loc><image:title>Blog+15</image:title></image:image></url><url><loc>https://www.esentire.com/blog/why-the-canadian-government-should-collaborate-with-mdr-providers-to-protect-canadian-businesses</loc><lastmod>2024-12-19T11:13:20-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_14.jpg</image:loc><image:title>Blog+14</image:title></image:image></url><url><loc>https://www.esentire.com/blog/winos4-0-online-module-staging-component-used-in-cleversoar-campaign</loc><lastmod>2025-01-16T14:35:50-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_13.jpg</image:loc><image:title>Blog+13</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-wins-multiple-leader-badges-in-the-winter-2025-g2-grid-reports</loc><lastmod>2024-12-18T16:29:46-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_12.jpg</image:loc><image:title>Blog+12</image:title></image:image></url><url><loc>https://www.esentire.com/blog/unlimited-logs-what-security-leaders-should-know</loc><lastmod>2025-03-25T11:47:25-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_11.jpg</image:loc><image:title>Blog+11</image:title></image:image></url><url><loc>https://www.esentire.com/blog/how-to-create-a-cybersecurity-compliance-program-at-your-organization</loc><lastmod>2025-10-09T17:47:01-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_10.jpg</image:loc><image:title>Blog+10</image:title></image:image></url><url><loc>https://www.esentire.com/blog/choose-proven-esentire-earns-top-score-in-kuppingercole-analysts-mdr-leadership-compass</loc><lastmod>2024-12-19T11:15:30-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_09.jpg</image:loc><image:title>Blog+09</image:title></image:image></url><url><loc>https://www.esentire.com/blog/how-to-cut-through-the-noise-and-understand-mdr-pricing</loc><lastmod>2025-03-17T14:57:27-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_08.jpg</image:loc><image:title>Blog+08</image:title></image:image></url><url><loc>https://www.esentire.com/blog/bored-beavertail-invisibleferret-yacht-club-a-lazarus-lure-pt-2</loc><lastmod>2024-12-04T23:32:33-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_07.jpg</image:loc><image:title>Blog+07</image:title></image:image></url><url><loc>https://www.esentire.com/blog/bored-beavertail-yacht-club-a-lazarus-lure</loc><lastmod>2026-03-03T11:14:33-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_06.jpg</image:loc><image:title>Blog+06</image:title></image:image></url><url><loc>https://www.esentire.com/blog/cybersecurity-spending-where-to-allocate-your-budget-in-2025</loc><lastmod>2024-11-21T17:52:25-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_05.jpg</image:loc><image:title>Blog+05</image:title></image:image></url><url><loc>https://www.esentire.com/blog/how-generative-ai-can-be-used-to-enable-better-security-outcomes</loc><lastmod>2024-10-10T12:01:45-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_04.jpg</image:loc><image:title>Blog+04</image:title></image:image></url><url><loc>https://www.esentire.com/blog/ai-may-be-a-powerful-tool-but-its-no-substitute-for-cyber-experts</loc><lastmod>2024-09-26T17:06:20-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_03.jpg</image:loc><image:title>Blog+03</image:title></image:image></url><url><loc>https://www.esentire.com/blog/go-injector-leading-to-stealers</loc><lastmod>2024-11-07T17:23:56-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_02.jpg</image:loc><image:title>Blog+02</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-recognized-as-crowdstrikes-2024-global-mssp-partner-of-the-year-for-the-third-consecutive-year</loc><lastmod>2024-11-14T19:10:07-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_24.jpg</image:loc><image:title>Blog+24</image:title></image:image></url><url><loc>https://www.esentire.com/blog/hackers-breach-lara-and-tiffany-trumps-x-accounts-in-a-cryptocurrency-scam</loc><lastmod>2024-09-17T10:04:12-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_01.jpg</image:loc><image:title>Blog+01</image:title></image:image></url><url><loc>https://www.esentire.com/blog/poseidon-stealer-uses-sora-ai-lure-to-infect-macos</loc><lastmod>2024-09-19T17:06:05-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_22.jpg</image:loc><image:title>Blog+22</image:title></image:image></url><url><loc>https://www.esentire.com/blog/the-intrusion-case-involving-zloader</loc><lastmod>2024-11-27T16:19:18-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_21.jpg</image:loc><image:title>Blog+21</image:title></image:image></url><url><loc>https://www.esentire.com/blog/balancing-incident-disclosure-and-tactical-response-lessons-from-the-halliburton-breach</loc><lastmod>2024-11-14T14:41:37-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_20.jpg</image:loc><image:title>Blog+20</image:title></image:image></url><url><loc>https://www.esentire.com/blog/lummac2-malware-and-malicious-chrome-extension-delivered-via-dll-side-loading</loc><lastmod>2024-09-05T17:02:30-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_19.jpg</image:loc><image:title>Blog+19</image:title></image:image></url><url><loc>https://www.esentire.com/blog/exploring-asyncrat-and-infostealer-plugin-delivery-through-phishing-emails</loc><lastmod>2024-08-29T15:53:07-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_18.jpg</image:loc><image:title>Blog+18</image:title></image:image></url><url><loc>https://www.esentire.com/blog/zero-trust-best-practices-guidelines-for-successful-adoption</loc><lastmod>2024-08-29T12:26:29-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_17.jpg</image:loc><image:title>Blog+17</image:title></image:image></url><url><loc>https://www.esentire.com/blog/exploring-the-d3f-ck-malware-as-a-service-loader</loc><lastmod>2024-08-15T18:01:45-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_16.jpg</image:loc><image:title>Blog+16</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-joins-the-joint-cyber-defense-collaborative-jcdc-to-boost-cyber-threat-intelligence-for-emerging-threats</loc><lastmod>2024-08-15T16:57:05-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_15.jpg</image:loc><image:title>Blog+15</image:title></image:image></url><url><loc>https://www.esentire.com/blog/understanding-mdr-breach-protection-warranty-key-questions-to-ask-and-what-they-actually-cover</loc><lastmod>2024-08-15T18:03:24-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_14.jpg</image:loc><image:title>Blog+14</image:title></image:image></url><url><loc>https://www.esentire.com/blog/ande-loader-leads-to-0bj3ctivity-stealer-infection</loc><lastmod>2024-08-09T12:01:01-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_13.jpg</image:loc><image:title>Blog+13</image:title></image:image></url><url><loc>https://www.esentire.com/blog/quartet-of-trouble-xworm-asyncrat-venomrat-and-purelogs-stealer-leverage-trycloudflare</loc><lastmod>2024-08-01T16:59:42-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_12.jpg</image:loc><image:title>Blog+12</image:title></image:image></url><url><loc>https://www.esentire.com/blog/hackers-are-stealing-genai-credentials-so-what-sensitive-company-data-are-they-getting-their-hands-on</loc><lastmod>2024-08-01T16:23:00-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_11.jpg</image:loc><image:title>Blog+11</image:title></image:image></url><url><loc>https://www.esentire.com/blog/top-strategies-for-ensuring-ransomware-readiness-in-2024</loc><lastmod>2024-10-17T12:38:35-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_10.jpg</image:loc><image:title>Blog+10</image:title></image:image></url><url><loc>https://www.esentire.com/blog/a-dropper-for-deploying-gh0st-rat</loc><lastmod>2024-11-07T17:07:22-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_09.jpg</image:loc><image:title>Blog+09</image:title></image:image></url><url><loc>https://www.esentire.com/blog/understanding-mdr-security-a-comprehensive-guide</loc><lastmod>2024-07-25T14:38:23-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_08.jpg</image:loc><image:title>Blog+08</image:title></image:image></url><url><loc>https://www.esentire.com/blog/the-gatekeepers-secrets-darkgate-malware-analysis</loc><lastmod>2024-11-07T18:08:26-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_07.jpg</image:loc><image:title>Blog+07</image:title></image:image></url><url><loc>https://www.esentire.com/blog/exploring-the-infection-chain-screenconnects-link-to-asyncrat-deployment</loc><lastmod>2024-07-03T17:09:31-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_06.jpg</image:loc><image:title>Blog+06</image:title></image:image></url><url><loc>https://www.esentire.com/blog/bridging-the-security-gap-by-addressing-visibility-challenges-with-generative-ai-usage</loc><lastmod>2024-09-26T17:10:57-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_05.jpg</image:loc><image:title>Blog+05</image:title></image:image></url><url><loc>https://www.esentire.com/blog/securing-passkeys-thwarting-authentication-method-redaction-attacks</loc><lastmod>2024-06-27T09:58:35-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_03.jpg</image:loc><image:title>Blog+03</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-delivers-private-and-secure-generative-ai-interactions-to-customers-with-amazon-sagemaker</loc><lastmod>2024-06-27T17:03:56-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_04.jpg</image:loc><image:title>Blog+04</image:title></image:image></url><url><loc>https://www.esentire.com/blog/adsexhaust-a-newly-discovered-adware-masquerading-oculus-installer</loc><lastmod>2024-06-19T23:23:55-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_02.jpg</image:loc><image:title>Blog+02</image:title></image:image></url><url><loc>https://www.esentire.com/blog/fake-it-support-website-leading-to-vidar-infection</loc><lastmod>2024-06-20T16:06:04-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_01.jpg</image:loc><image:title>Blog+01</image:title></image:image></url><url><loc>https://www.esentire.com/blog/solarmarker-impersonates-job-employment-website-indeed-with-a-team-building-themed-lure</loc><lastmod>2024-06-13T18:32:21-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_24.jpg</image:loc><image:title>Blog+24</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-atlas-mdr-agent-wins-multiple-industry-innovation-awards</loc><lastmod>2025-03-20T16:02:23-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_23.jpg</image:loc><image:title>Blog+23</image:title></image:image></url><url><loc>https://www.esentire.com/blog/what-questions-to-ask-mdr-service-providers</loc><lastmod>2025-10-16T19:52:16-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_01.jpg</image:loc><image:title>Blog+01</image:title></image:image></url><url><loc>https://www.esentire.com/blog/more-eggs-activity-persists-via-fake-job-applicant-lures</loc><lastmod>2024-06-06T17:11:21-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_22.jpg</image:loc><image:title>Blog+22</image:title></image:image></url><url><loc>https://www.esentire.com/blog/autoit-delivering-vidar-stealer-via-drive-by-downloads</loc><lastmod>2024-06-06T16:22:55-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_21.jpg</image:loc><image:title>Blog+21</image:title></image:image></url><url><loc>https://www.esentire.com/blog/fake-browser-updates-delivering-bitrat-and-lumma-stealer</loc><lastmod>2024-05-29T18:40:26-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_20.jpg</image:loc><image:title>Blog+20</image:title></image:image></url><url><loc>https://www.esentire.com/blog/fin7-uses-trusted-brands-and-sponsored-google-ads-to-distribute-msix-payloads</loc><lastmod>2024-05-13T23:40:10-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_19.jpg</image:loc><image:title>Blog+19</image:title></image:image></url><url><loc>https://www.esentire.com/blog/socgholish-sets-sights-on-victim-peers</loc><lastmod>2024-06-18T16:34:27-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_18.jpg</image:loc><image:title>Blog+18</image:title></image:image></url><url><loc>https://www.esentire.com/blog/welding-the-weak-spots-strengthening-manufacturing-cybersecurity-practices</loc><lastmod>2025-03-20T16:15:03-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_17.jpg</image:loc><image:title>Blog+17</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-named-a-leader-in-2024-idc-marketscape-for-managed-detection-and-response</loc><lastmod>2025-03-20T16:16:54-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_16.jpg</image:loc><image:title>Blog+16</image:title></image:image></url><url><loc>https://www.esentire.com/blog/d3f-ck-loader-the-new-maas-loader</loc><lastmod>2024-05-02T17:44:54-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_15.jpg</image:loc><image:title>Blog+15</image:title></image:image></url><url><loc>https://www.esentire.com/blog/fakebat-malware-distributing-via-fake-browser-updates</loc><lastmod>2024-04-25T17:56:37-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_14.jpg</image:loc><image:title>Blog+14</image:title></image:image></url><url><loc>https://www.esentire.com/blog/building-an-effective-threat-hunting-program-for-proactive-cyber-defense</loc><lastmod>2025-03-27T15:53:13-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_13.jpg</image:loc><image:title>Blog+13</image:title></image:image></url><url><loc>https://www.esentire.com/blog/dont-take-the-bait-the-xworm-tax-scam</loc><lastmod>2024-05-08T19:16:12-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_12.jpg</image:loc><image:title>Blog+12</image:title></image:image></url><url><loc>https://www.esentire.com/blog/solarmarkers-shift-to-pyinstaller-tactics</loc><lastmod>2024-04-11T18:16:59-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_10.jpg</image:loc><image:title>Blog+10</image:title></image:image></url><url><loc>https://www.esentire.com/blog/tax-season-alert-beware-of-guloader-and-remcos-rat</loc><lastmod>2024-04-11T18:42:52-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_09.jpg</image:loc><image:title>Blog+09</image:title></image:image></url><url><loc>https://www.esentire.com/blog/the-return-of-the-bat-fakebats-payk-runpe-arsenal</loc><lastmod>2024-04-11T18:29:46-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_11.jpg</image:loc><image:title>Blog+11</image:title></image:image></url><url><loc>https://www.esentire.com/blog/unraveling-not-azorult-but-koi-loader-a-precursor-to-koi-stealer</loc><lastmod>2024-04-09T15:26:18-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_08.jpg</image:loc><image:title>Blog+08</image:title></image:image></url><url><loc>https://www.esentire.com/blog/how-the-biggest-ransomware-as-a-service-raas-operators-gain-initial-access-to-your-environment</loc><lastmod>2024-04-09T15:07:18-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_07.jpg</image:loc><image:title>Blog+07</image:title></image:image></url><url><loc>https://www.esentire.com/blog/leveraging-the-nist-cybersecurity-framework-for-improved-threat-detection-and-response</loc><lastmod>2025-03-27T15:47:09-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_06.jpg</image:loc><image:title>Blog+06</image:title></image:image></url><url><loc>https://www.esentire.com/blog/enhancing-your-security-posture-with-the-new-esentire-threat-intelligence-offering</loc><lastmod>2025-03-27T15:36:28-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_05.jpg</image:loc><image:title>Blog+05</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-named-tenables-2024-top-mssp-partner-in-north-america</loc><lastmod>2025-03-20T16:18:04-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_04.jpg</image:loc><image:title>Blog+04</image:title></image:image></url><url><loc>https://www.esentire.com/blog/ransomware-precursor-activity-traced-to-compromised-vendor-account</loc><lastmod>2024-03-07T16:57:08-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_03.jpg</image:loc><image:title>Blog+03</image:title></image:image></url><url><loc>https://www.esentire.com/blog/voicemail-themed-emails-tycoon-phishing-as-a-service-platform</loc><lastmod>2024-03-07T09:24:06-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_02.jpg</image:loc><image:title>Blog+02</image:title></image:image></url><url><loc>https://www.esentire.com/blog/navigating-nist-compliance-a-guide-for-security-leaders-and-cisos</loc><lastmod>2025-03-27T16:24:57-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_01.jpg</image:loc><image:title>Blog+01</image:title></image:image></url><url><loc>https://www.esentire.com/blog/fenix-botnet-targeting-latam-users</loc><lastmod>2024-03-05T11:35:17-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_24.jpg</image:loc><image:title>Blog+24</image:title></image:image></url><url><loc>https://www.esentire.com/blog/xred-backdoor-the-hidden-threat-in-trojanized-programs</loc><lastmod>2024-02-29T16:09:51-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_23.jpg</image:loc><image:title>Blog+23</image:title></image:image></url><url><loc>https://www.esentire.com/blog/lockbit-ransomware-operations-might-be-down-now-what</loc><lastmod>2024-02-29T16:11:35-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_22.jpg</image:loc><image:title>Blog+22</image:title></image:image></url><url><loc>https://www.esentire.com/blog/beware-the-bait-java-rats-lurking-in-tax-scam-emails</loc><lastmod>2024-02-26T16:57:55-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_21.jpg</image:loc><image:title>Blog+21</image:title></image:image></url><url><loc>https://www.esentire.com/blog/2024-cybersecurity-predictions-navigating-the-evolving-threat-landscape</loc><lastmod>2025-03-20T16:20:44-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_20.jpg</image:loc><image:title>Blog+20</image:title></image:image></url><url><loc>https://www.esentire.com/blog/rhysida-ransomware-group-turns-its-wrath-warns-esentire</loc><lastmod>2024-11-14T19:11:57-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_18.jpg</image:loc><image:title>Blog+18</image:title></image:image></url><url><loc>https://www.esentire.com/blog/blind-eagles-north-american-journey</loc><lastmod>2024-05-29T17:31:42-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_19.jpg</image:loc><image:title>Blog+19</image:title></image:image></url><url><loc>https://www.esentire.com/blog/technical-analysis-of-darkvnc</loc><lastmod>2024-02-23T10:36:36-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_17.jpg</image:loc><image:title>Blog+17</image:title></image:image></url><url><loc>https://www.esentire.com/blog/the-future-of-cloud-security-what-to-expect-in-2024</loc><lastmod>2024-11-14T15:30:36-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_16.jpg</image:loc><image:title>Blog+16</image:title></image:image></url><url><loc>https://www.esentire.com/blog/the-oncoming-wave-of-solarmarker</loc><lastmod>2024-02-08T17:10:01-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_15.jpg</image:loc><image:title>Blog+15</image:title></image:image></url><url><loc>https://www.esentire.com/blog/from-onlydcratfans-to-remcosrat</loc><lastmod>2024-02-08T19:26:03-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_14.jpg</image:loc><image:title>Blog+14</image:title></image:image></url><url><loc>https://www.esentire.com/blog/coinminer-on-a-vulnerable-tomcat-server</loc><lastmod>2024-02-08T15:15:58-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_13.jpg</image:loc><image:title>Blog+13</image:title></image:image></url><url><loc>https://www.esentire.com/blog/understanding-managed-soc-pricing</loc><lastmod>2025-03-27T15:40:03-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_12.jpg</image:loc><image:title>Blog+12</image:title></image:image></url><url><loc>https://www.esentire.com/blog/smartapesg-delivering-netsupport-rat</loc><lastmod>2024-01-18T15:17:38-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_11.jpg</image:loc><image:title>Blog+11</image:title></image:image></url><url><loc>https://www.esentire.com/blog/30-60-90-day-plan-for-new-security-leaders</loc><lastmod>2024-11-14T19:11:13-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_10.jpg</image:loc><image:title>Blog+10</image:title></image:image></url><url><loc>https://www.esentire.com/blog/the-rising-threat-of-pikabot</loc><lastmod>2024-01-11T16:59:59-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_09.jpg</image:loc><image:title>Blog+09</image:title></image:image></url><url><loc>https://www.esentire.com/blog/hayden-nolan-what-i-learned-from-my-soc-analyst-internship-at-esentire</loc><lastmod>2024-07-18T18:41:54-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_08.jpg</image:loc><image:title>Blog+08</image:title></image:image></url><url><loc>https://www.esentire.com/blog/workersdevbackdoor-delivered-via-malvertising</loc><lastmod>2024-01-12T10:35:10-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_07.jpg</image:loc><image:title>Blog+07</image:title></image:image></url><url><loc>https://www.esentire.com/blog/ducktail-and-peeling-the-layers-of-powershell</loc><lastmod>2024-01-04T15:07:08-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_06.jpg</image:loc><image:title>Blog+06</image:title></image:image></url><url><loc>https://www.esentire.com/blog/phantomcontrol-returns-with-ande-loader-and-swaetrat</loc><lastmod>2023-12-21T15:51:05-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_05.jpg</image:loc><image:title>Blog+05</image:title></image:image></url><url><loc>https://www.esentire.com/blog/nextphp-phishing-campaign</loc><lastmod>2024-11-07T17:25:23-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_04.jpg</image:loc><image:title>Blog+04</image:title></image:image></url><url><loc>https://www.esentire.com/blog/danabots-latest-move-deploying-icedid</loc><lastmod>2024-11-14T16:38:52-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_03.jpg</image:loc><image:title>Blog+03</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-named-a-strong-performer-in-the-forrester-wave-managed-detection-and-response-services-in-europe-report</loc><lastmod>2025-03-20T16:22:31-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_02.jpg</image:loc><image:title>Blog+02</image:title></image:image></url><url><loc>https://www.esentire.com/blog/citrix-bleed-vulnerability-a-gateway-to-lockbit-ransomware</loc><lastmod>2023-12-05T18:28:39-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_01.jpg</image:loc><image:title>Blog+01</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-named-in-2024-waterloo-areas-top-employers-list-for-seventh-consecutive-year</loc><lastmod>2025-03-20T16:23:17-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_24.jpg</image:loc><image:title>Blog+24</image:title></image:image></url><url><loc>https://www.esentire.com/blog/unveiling-parallax-rat-a-journey-from-infection-to-lateral-movement</loc><lastmod>2023-11-23T10:42:04-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_23.jpg</image:loc><image:title>Blog+23</image:title></image:image></url><url><loc>https://www.esentire.com/blog/the-rise-of-qr-code-phishing-attacks-and-best-practices-for-interacting-with-qr-codes</loc><lastmod>2024-11-14T18:23:29-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_22.jpg</image:loc><image:title>Blog+22</image:title></image:image></url><url><loc>https://www.esentire.com/blog/solarmarker-to-jupyter-and-back</loc><lastmod>2023-11-16T19:56:37-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_21.jpg</image:loc><image:title>Blog+21</image:title></image:image></url><url><loc>https://www.esentire.com/blog/why-manufacturing-organizations-need-to-embrace-the-microsoft-security-tools-for-24-7-threat-detection-and-response</loc><lastmod>2023-11-15T10:41:12-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_20.jpg</image:loc><image:title>Blog+20</image:title></image:image></url><url><loc>https://www.esentire.com/blog/what-does-materiality-really-mean-in-a-cyberattack</loc><lastmod>2023-11-16T20:16:11-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_19.jpg</image:loc><image:title>Blog+19</image:title></image:image></url><url><loc>https://www.esentire.com/blog/the-notorious-alphv-blackcat-ransomware-gang-is-attacking-corporations-and-public-entities-using-google-ads-laced-with-malware-warns-esentire</loc><lastmod>2024-05-29T18:15:18-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_18.jpg</image:loc><image:title>Blog+18</image:title></image:image></url><url><loc>https://www.esentire.com/blog/from-darkgate-to-danabot</loc><lastmod>2026-01-20T15:52:25-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_17.jpg</image:loc><image:title>Blog+17</image:title></image:image></url><url><loc>https://www.esentire.com/blog/netwire-rat-the-stealthy-invasion-via-frenchy-shellcode</loc><lastmod>2023-11-02T17:30:21-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_16.jpg</image:loc><image:title>Blog+16</image:title></image:image></url><url><loc>https://www.esentire.com/blog/winsock-file-transfer-protocol-vulnerability-exploited</loc><lastmod>2024-07-15T14:07:43-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_15.jpg</image:loc><image:title>Blog+15</image:title></image:image></url><url><loc>https://www.esentire.com/blog/nitrogen-campaign-2-0-reloads-with-enhanced-capabilities-leading-to-alphv-blackcat-ransomware</loc><lastmod>2024-09-19T15:30:49-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_14.jpg</image:loc><image:title>Blog+14</image:title></image:image></url><url><loc>https://www.esentire.com/blog/the-wiki-slack-attack</loc><lastmod>2023-10-27T07:36:11-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_13.jpg</image:loc><image:title>Blog+13</image:title></image:image></url><url><loc>https://www.esentire.com/blog/plagued-with-cyberattacks-as-pe-firms-buy-up-healthcare-organizations-how-to-protect-against-growing-threats</loc><lastmod>2023-10-26T16:24:51-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_12.jpg</image:loc><image:title>Blog+12</image:title></image:image></url><url><loc>https://www.esentire.com/blog/3-questions-to-help-evaluate-the-right-dark-web-monitoring-tool-for-your-business</loc><lastmod>2023-10-26T16:58:23-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_11.jpg</image:loc><image:title>Blog+11</image:title></image:image></url><url><loc>https://www.esentire.com/blog/exploiting-qr-codes-aitm-phishing-with-dadsec-phaas</loc><lastmod>2023-10-20T13:39:43-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_10.jpg</image:loc><image:title>Blog+10</image:title></image:image></url><url><loc>https://www.esentire.com/blog/stealthbait-evasive-phishing-tactics</loc><lastmod>2024-07-15T14:05:09-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_09.jpg</image:loc><image:title>Blog+09</image:title></image:image></url><url><loc>https://www.esentire.com/blog/investigating-asyncrat-deployment-via-projfud-injector-and-html-smuggling</loc><lastmod>2023-10-20T12:59:14-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_08.jpg</image:loc><image:title>Blog+08</image:title></image:image></url><url><loc>https://www.esentire.com/blog/key-learnings-from-the-tempur-sealy-ransomware-attack</loc><lastmod>2025-03-27T15:57:35-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_07.jpg</image:loc><image:title>Blog+07</image:title></image:image></url><url><loc>https://www.esentire.com/blog/questions-to-ask-a-managed-security-services-provider-mssp</loc><lastmod>2025-03-27T16:02:54-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_06.jpg</image:loc><image:title>Blog+06</image:title></image:image></url><url><loc>https://www.esentire.com/blog/russia-linked-lockbit-ransomware-gang-attacks-an-msp-and-two-manufacturers</loc><lastmod>2025-03-25T16:43:18-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_05.jpg</image:loc><image:title>Blog+05</image:title></image:image></url><url><loc>https://www.esentire.com/blog/the-case-of-lummac2-v4-0</loc><lastmod>2024-11-07T17:27:59-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_04.jpg</image:loc><image:title>Blog+04</image:title></image:image></url><url><loc>https://www.esentire.com/blog/fake-browser-updates-distribute-lummac-stealer-amadey-and-privateloader-malware</loc><lastmod>2024-11-07T17:11:28-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_03.jpg</image:loc><image:title>Blog+03</image:title></image:image></url><url><loc>https://www.esentire.com/blog/what-does-the-nis2-directive-mean-for-your-organization</loc><lastmod>2025-03-27T16:25:40-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_02.jpg</image:loc><image:title>Blog+02</image:title></image:image></url><url><loc>https://www.esentire.com/blog/stealc-delivered-via-deceptive-google-sheets</loc><lastmod>2025-05-22T16:41:28-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_01.jpg</image:loc><image:title>Blog+01</image:title></image:image></url><url><loc>https://www.esentire.com/blog/the-importance-of-network-detection-and-response-ndr-in-safeguarding-cloud-environments</loc><lastmod>2025-03-27T15:37:27-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_24.jpg</image:loc><image:title>Blog+24</image:title></image:image></url><url><loc>https://www.esentire.com/blog/boosting-cybersecurity-rigor-what-the-sec-expects-from-public-companies</loc><lastmod>2023-12-19T10:01:49-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_23.jpg</image:loc><image:title>Blog+23</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-named-an-overall-mdr-leader-in-kuppingercoles-2023-mdr-leadership-compass-report</loc><lastmod>2025-03-20T16:24:08-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_22.jpg</image:loc><image:title>Blog+22</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-threat-intelligence-malware-analysis-raccoon-stealer-v2-part-2</loc><lastmod>2024-11-14T16:42:42-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_21.jpg</image:loc><image:title>Blog+21</image:title></image:image></url><url><loc>https://www.esentire.com/blog/operation-phantomcontrol</loc><lastmod>2023-08-03T19:22:08-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_20.jpg</image:loc><image:title>Blog+20</image:title></image:image></url><url><loc>https://www.esentire.com/blog/fakebat-continues-signed-msix-app-package-abuse</loc><lastmod>2023-10-20T13:25:56-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_19.jpg</image:loc><image:title>Blog+19</image:title></image:image></url><url><loc>https://www.esentire.com/blog/ducktail-and-hawkeyes</loc><lastmod>2023-07-27T17:15:17-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_18.jpg</image:loc><image:title>Blog+18</image:title></image:image></url><url><loc>https://www.esentire.com/blog/google-firebase-hosting-abused-to-deliver-sorillus-rat-phishing-page</loc><lastmod>2024-05-29T17:54:43-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_17.jpg</image:loc><image:title>Blog+17</image:title></image:image></url><url><loc>https://www.esentire.com/blog/how-chatgpt-and-other-generative-ai-tools-impact-risk-for-cyber-insurance-providers-and-security-leaders</loc><lastmod>2025-03-27T15:50:24-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_16.jpg</image:loc><image:title>Blog+16</image:title></image:image></url><url><loc>https://www.esentire.com/blog/key-learnings-from-the-newest-verizon-dbir-and-the-recent-dragos-attack</loc><lastmod>2023-07-06T15:34:12-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_15.jpg</image:loc><image:title>Blog+15</image:title></image:image></url><url><loc>https://www.esentire.com/blog/persistent-connection-established-nitrogen-campaign-leverages-dll-side-loading-technique-for-c2-communication</loc><lastmod>2023-06-22T12:46:53-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_14.jpg</image:loc><image:title>Blog+14</image:title></image:image></url><url><loc>https://www.esentire.com/blog/onlydcratfans-malware-distributed-using-explicit-lures-of-onlyfans-pages-and-other-adult-content</loc><lastmod>2026-01-20T15:34:53-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_13.jpg</image:loc><image:title>Blog+13</image:title></image:image></url><url><loc>https://www.esentire.com/blog/why-critical-infrastructure-remains-a-ransomware-target</loc><lastmod>2023-06-22T10:20:42-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_12.jpg</image:loc><image:title>Blog+12</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-threat-intelligence-malware-analysis-resident-campaign</loc><lastmod>2024-03-13T13:58:44-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_11.jpg</image:loc><image:title>Blog+11</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-threat-intelligence-malware-analysis-aurora-stealer</loc><lastmod>2023-09-14T10:55:52-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_10.jpg</image:loc><image:title>Blog+10</image:title></image:image></url><url><loc>https://www.esentire.com/blog/guloader-vbscript-variant-returns-with-powershell-updates</loc><lastmod>2023-07-04T12:45:06-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_09.jpg</image:loc><image:title>Blog+09</image:title></image:image></url><url><loc>https://www.esentire.com/blog/fakebat-impersonates-midjourney-chatgpt-in-drive-by-cyberattacks</loc><lastmod>2023-09-27T11:06:46-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_08.jpg</image:loc><image:title>Blog+08</image:title></image:image></url><url><loc>https://www.esentire.com/blog/papercut-vulnerability-exploited-to-deliver-cryptocurrency-miner-to-education-sector-customer</loc><lastmod>2024-07-15T14:00:07-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_07.jpg</image:loc><image:title>Blog+07</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-threat-intelligence-malware-analysis-vidar-stealer</loc><lastmod>2025-03-07T11:53:53-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_05.jpg</image:loc><image:title>Blog+05</image:title></image:image></url><url><loc>https://www.esentire.com/blog/threat-actors-using-fake-quickbooks-software-to-scam-organizations</loc><lastmod>2023-05-04T18:32:11-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_04.jpg</image:loc><image:title>Blog+04</image:title></image:image></url><url><loc>https://www.esentire.com/blog/what-is-malware-as-a-service-maas</loc><lastmod>2023-07-02T12:36:53-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_03.jpg</image:loc><image:title>Blog+03</image:title></image:image></url><url><loc>https://www.esentire.com/blog/protecting-end-users-against-the-gootloader-malware-threat-using-the-gootloader-operators-own-tactics</loc><lastmod>2023-04-27T17:33:01-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_02.jpg</image:loc><image:title>Blog+02</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-named-tenables-2023-top-mssp-partner-in-north-america</loc><lastmod>2025-03-20T16:28:04-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_01.jpg</image:loc><image:title>Blog+01</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-achieves-microsoft-verified-managed-xdr-solution-status</loc><lastmod>2023-04-20T16:53:54-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_24.jpg</image:loc><image:title>Blog+24</image:title></image:image></url><url><loc>https://www.esentire.com/blog/poor-cyber-defences-are-damaging-canadas-economy</loc><lastmod>2023-04-20T16:55:26-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_23.jpg</image:loc><image:title>Blog+23</image:title></image:image></url><url><loc>https://www.esentire.com/blog/building-a-cybersecurity-foundation-to-protect-construction-firms-from-ransomware-attacks</loc><lastmod>2023-04-13T16:16:14-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_22.jpg</image:loc><image:title>Blog+22</image:title></image:image></url><url><loc>https://www.esentire.com/blog/building-resiliency-three-core-actions-to-create-stronger-cybersecurity</loc><lastmod>2023-04-13T15:36:16-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_21.jpg</image:loc><image:title>Blog+21</image:title></image:image></url><url><loc>https://www.esentire.com/blog/guloader-targeting-the-financial-sector-using-a-tax-themed-phishing-lure</loc><lastmod>2023-04-12T15:33:44-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_20.jpg</image:loc><image:title>Blog+20</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-awarded-5-star-rating-in-crns-2023-partner-program-guide-for-the-fifth-consecutive-year</loc><lastmod>2025-03-20T16:28:50-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_19.jpg</image:loc><image:title>Blog+19</image:title></image:image></url><url><loc>https://www.esentire.com/blog/pulse-check-on-onenote-for-malware-delivery</loc><lastmod>2023-03-30T18:18:02-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_18.jpg</image:loc><image:title>Blog+18</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-threat-intelligence-malware-analysis-batloader</loc><lastmod>2024-06-13T11:16:26-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_17.jpg</image:loc><image:title>Blog+17</image:title></image:image></url><url><loc>https://www.esentire.com/blog/analysis-of-microsoft-outlook-elevation-of-privilege-vulnerability-cve-2023-23397</loc><lastmod>2023-03-31T16:08:21-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_16.jpg</image:loc><image:title>Blog+16</image:title></image:image></url><url><loc>https://www.esentire.com/blog/how-cybercriminals-can-exploit-silicon-valley-banks-collapse-for-phishing-attacks</loc><lastmod>2025-03-27T16:22:48-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_15.jpg</image:loc><image:title>Blog+15</image:title></image:image></url><url><loc>https://www.esentire.com/blog/best-cybersecurity-practices-for-the-food-supply-sector</loc><lastmod>2023-03-09T16:43:25-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_14.jpg</image:loc><image:title>Blog+14</image:title></image:image></url><url><loc>https://www.esentire.com/blog/batloader-continues-to-abuse-google-search-ads-to-deliver-vidar-stealer-and-ursnif</loc><lastmod>2023-03-09T15:27:55-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_13.jpg</image:loc><image:title>Blog+13</image:title></image:image></url><url><loc>https://www.esentire.com/blog/qakbot-returns-to-iso-delivery-for-now</loc><lastmod>2023-03-08T13:35:59-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_12.jpg</image:loc><image:title>Blog+12</image:title></image:image></url><url><loc>https://www.esentire.com/blog/you-invested-in-microsoft-office-365-e5-now-what</loc><lastmod>2023-03-08T14:30:40-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_07.jpg</image:loc><image:title>Blog+07</image:title></image:image></url><url><loc>https://www.esentire.com/blog/hackers-attack-employees-from-six-law-firms-with-the-gootloader-and-socgholish-malware-using-fake-legal-agreements-and-malicious-watering-hole-s-reports-esentire</loc><lastmod>2023-02-28T09:47:51-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_11.jpg</image:loc><image:title>Blog+11</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-threat-intelligence-malware-analysis-icarus-stealer</loc><lastmod>2023-02-16T11:48:39-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_10.jpg</image:loc><image:title>Blog+10</image:title></image:image></url><url><loc>https://www.esentire.com/blog/netsupport-manager-insecure-by-default</loc><lastmod>2023-02-16T11:50:20-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_09.jpg</image:loc><image:title>Blog+09</image:title></image:image></url><url><loc>https://www.esentire.com/blog/onenote-payload-smuggling-multiple-threats-leverage-onenote-to-deliver-malware</loc><lastmod>2023-02-10T15:53:03-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_08.jpg</image:loc><image:title>Blog+08</image:title></image:image></url><url><loc>https://www.esentire.com/blog/bob-layton-esentires-chief-channel-officer-named-a-2023-crn-channel-chief-for-the-fifth-time</loc><lastmod>2025-03-20T16:29:55-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_07.jpg</image:loc><image:title>Blog+07</image:title></image:image></url><url><loc>https://www.esentire.com/blog/security-capabilities-cisos-should-invest-in-during-a-recession</loc><lastmod>2025-03-27T15:48:22-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_06.jpg</image:loc><image:title>Blog+06</image:title></image:image></url><url><loc>https://www.esentire.com/blog/icedid-malware-shifts-its-delivery-strategy</loc><lastmod>2023-01-31T15:49:07-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_05.jpg</image:loc><image:title>Blog+05</image:title></image:image></url><url><loc>https://www.esentire.com/blog/how-to-obtain-cost-effective-cybersecurity-insurance-in-2023</loc><lastmod>2023-01-27T14:18:56-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_04.jpg</image:loc><image:title>Blog+04</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-threat-intelligence-malware-analysis-raspberry-robin</loc><lastmod>2025-02-06T16:56:19-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_03.jpg</image:loc><image:title>Blog+03</image:title></image:image></url><url><loc>https://www.esentire.com/blog/the-resolution-every-cso-ciso-should-make-this-year</loc><lastmod>2023-01-17T12:07:17-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_02.jpg</image:loc><image:title>Blog+02</image:title></image:image></url><url><loc>https://www.esentire.com/blog/why-you-should-take-advantage-of-microsoft-365-defender-the-microsoft-365-e5-security-suite</loc><lastmod>2025-03-26T11:18:18-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_01.jpg</image:loc><image:title>Blog+01</image:title></image:image></url><url><loc>https://www.esentire.com/blog/gootloader-leads-to-cobalt-strike-and-hand-on-keyboard-activity</loc><lastmod>2023-01-19T15:10:06-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_02.jpg</image:loc><image:title>Blog+02</image:title></image:image></url><url><loc>https://www.esentire.com/blog/how-to-increase-cyber-resilience-at-your-organization</loc><lastmod>2025-03-25T16:35:54-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_03.jpg</image:loc><image:title>Blog+03</image:title></image:image></url><url><loc>https://www.esentire.com/blog/mdir-why-investigation-is-the-invisible-i-in-mdr</loc><lastmod>2025-03-20T16:30:42-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_05.jpg</image:loc><image:title>Blog+05</image:title></image:image></url><url><loc>https://www.esentire.com/blog/5-common-misconceptions-about-cloud-security</loc><lastmod>2025-03-27T15:49:09-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_02.jpg</image:loc><image:title>Blog+02</image:title></image:image></url><url><loc>https://www.esentire.com/blog/2023-predictions-for-cloud-security</loc><lastmod>2023-01-10T09:12:42-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_14.jpg</image:loc><image:title>Blog+14</image:title></image:image></url><url><loc>https://www.esentire.com/blog/tactical-experts-driving-success-for-ransomware-gangs</loc><lastmod>2025-03-20T16:31:23-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_07.jpg</image:loc><image:title>Blog+07</image:title></image:image></url><url><loc>https://www.esentire.com/blog/hackers-exploit-fortinet-devices-to-spread-ransomware-within-corporate-environments-warns-esentire</loc><lastmod>2024-11-14T15:42:13-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_13.jpg</image:loc><image:title>Blog+13</image:title></image:image></url><url><loc>https://www.esentire.com/blog/recent-fakebat-activity-observed-in-december-2022</loc><lastmod>2023-09-26T01:28:04-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_12.jpg</image:loc><image:title>Blog+12</image:title></image:image></url><url><loc>https://www.esentire.com/blog/creating-resilience-against-future-supply-chain-attacks</loc><lastmod>2022-12-22T18:19:50-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_11.jpg</image:loc><image:title>Blog+11</image:title></image:image></url><url><loc>https://www.esentire.com/blog/cyber-resilience-as-a-component-of-incident-response-planning</loc><lastmod>2023-01-04T09:25:25-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_10.jpg</image:loc><image:title>Blog+10</image:title></image:image></url><url><loc>https://www.esentire.com/blog/fortios-authentication-bypass-cve-2022-40684</loc><lastmod>2023-01-16T14:36:29-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_14.jpg</image:loc><image:title>Blog+14</image:title></image:image></url><url><loc>https://www.esentire.com/blog/the-rising-threat-of-cybersecurity-for-retailers</loc><lastmod>2022-12-15T12:56:18-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_09.jpg</image:loc><image:title>Blog+09</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-threat-intelligence-malware-analysis-redline-stealer</loc><lastmod>2024-05-29T17:53:19-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_08.jpg</image:loc><image:title>Blog+08</image:title></image:image></url><url><loc>https://www.esentire.com/blog/gootloader-striking-with-a-new-infection-technique</loc><lastmod>2023-01-16T14:36:48-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_07.jpg</image:loc><image:title>Blog+07</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-named-in-2023-waterloo-areas-top-employers-list-for-sixth-consecutive-year</loc><lastmod>2022-12-01T19:04:18-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_06.jpg</image:loc><image:title>Blog+06</image:title></image:image></url><url><loc>https://www.esentire.com/blog/disrupting-an-active-ransomware-attack</loc><lastmod>2023-01-16T14:34:52-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_07.jpg</image:loc><image:title>Blog+07</image:title></image:image></url><url><loc>https://www.esentire.com/blog/incident-response-plans-and-tabletop-exercises-may-be-a-waste-of-time</loc><lastmod>2022-12-06T13:24:48-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_05.jpg</image:loc><image:title>Blog+05</image:title></image:image></url><url><loc>https://www.esentire.com/blog/ais-role-in-cybersecurity</loc><lastmod>2022-11-24T16:24:16-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_04.jpg</image:loc><image:title>Blog+04</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-mdr-for-microsoft-wins-crn-2022-tech-innovator-award</loc><lastmod>2022-11-23T13:56:14-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_02.jpg</image:loc><image:title>Blog+02</image:title></image:image></url><url><loc>https://www.esentire.com/blog/intruder-deploys-medusa-unlocker-instead-of-medusa-locker-in-attempted-medusa-ransomware-operation-targeting-esentire-legal-customer</loc><lastmod>2023-01-16T14:35:01-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_01.jpg</image:loc><image:title>Blog+01</image:title></image:image></url><url><loc>https://www.esentire.com/blog/batloader-facilitates-fraud-hands-on-keyboard-attacks</loc><lastmod>2023-01-16T14:35:10-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_24.jpg</image:loc><image:title>Blog+24</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-threat-intelligence-malware-analysis-redalert</loc><lastmod>2024-05-29T17:51:11-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_23.jpg</image:loc><image:title>Blog+23</image:title></image:image></url><url><loc>https://www.esentire.com/blog/how-the-new-ftc-safeguards-rule-update-will-impact-auto-dealerships</loc><lastmod>2023-01-27T15:00:40-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_22.jpg</image:loc><image:title>Blog+22</image:title></image:image></url><url><loc>https://www.esentire.com/blog/qakbot-sees-fall-resurgence</loc><lastmod>2025-08-06T09:14:10-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_21.jpg</image:loc><image:title>Blog+21</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-welcomes-cloud-veteran-rahul-bakshi-as-chief-product-officer</loc><lastmod>2022-10-31T16:07:45-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_20.jpg</image:loc><image:title>Blog+20</image:title></image:image></url><url><loc>https://www.esentire.com/blog/secret-cso-greg-crowley-esentire</loc><lastmod>2022-10-31T16:10:37-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_19.jpg</image:loc><image:title>Blog+19</image:title></image:image></url><url><loc>https://www.esentire.com/blog/chromeloader-observations-on-the-rise</loc><lastmod>2023-01-16T14:35:44-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_18.jpg</image:loc><image:title>Blog+18</image:title></image:image></url><url><loc>https://www.esentire.com/blog/qakbot-and-html-smuggling-resurgence</loc><lastmod>2024-03-13T14:06:34-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_17.jpg</image:loc><image:title>Blog+17</image:title></image:image></url><url><loc>https://www.esentire.com/blog/russian-speaking-attacker-exposes-their-toolbox-while-attempting-to-deploy-the-phobos-ransomware-to-community-college</loc><lastmod>2024-05-29T18:13:02-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_16.jpg</image:loc><image:title>Blog+16</image:title></image:image></url><url><loc>https://www.esentire.com/blog/popular-info-stealing-malware-solarmarker-is-using-watering-hole-attacks-and-fake-chrome-browser-updates-to-infect-business-professionals-warns-esentire</loc><lastmod>2022-09-30T16:55:24-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_15.jpg</image:loc><image:title>Blog+15</image:title></image:image></url><url><loc>https://www.esentire.com/blog/pirated-windows-os-backdoored-with-cryptominer-and-xtreme-rat</loc><lastmod>2022-09-29T15:10:05-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_14.jpg</image:loc><image:title>Blog+14</image:title></image:image></url><url><loc>https://www.esentire.com/blog/beat-the-challenges-of-supply-chain-vulnerability</loc><lastmod>2025-03-26T11:20:47-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_13.jpg</image:loc><image:title>Blog+13</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-named-an-interactive-learning-champion-for-2022-oreilly-awards-program</loc><lastmod>2022-09-28T16:10:20-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_12.jpg</image:loc><image:title>Blog+12</image:title></image:image></url><url><loc>https://www.esentire.com/blog/what-we-must-do-to-create-nationally-secure-and-resilient-supply-chains</loc><lastmod>2022-09-29T18:16:10-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_10.jpg</image:loc><image:title>Blog+10</image:title></image:image></url><url><loc>https://www.esentire.com/blog/redline-stealer-and-mozilla-thunderbird</loc><lastmod>2022-09-21T17:03:45-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_09.jpg</image:loc><image:title>Blog+09</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-recognized-as-crowdstrikes-2022-global-mssp-partner-of-the-year-and-named-launch-partner-in-crowdstrike-powered-service-provider-program</loc><lastmod>2022-09-19T22:36:06-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_08.jpg</image:loc><image:title>Blog+08</image:title></image:image></url><url><loc>https://www.esentire.com/blog/sorillus-rat</loc><lastmod>2023-07-06T17:26:14-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_07.jpg</image:loc><image:title>Blog+07</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-threat-intelligence-malware-analysis-raccoon-stealer-v2-0</loc><lastmod>2022-08-31T20:34:58-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_06.jpg</image:loc><image:title>Blog+06</image:title></image:image></url><url><loc>https://www.esentire.com/blog/black-hat-seo-techniques-employed-by-gootloader</loc><lastmod>2025-07-02T14:34:46-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_05.jpg</image:loc><image:title>Blog+05</image:title></image:image></url><url><loc>https://www.esentire.com/blog/hacker-infrastructure-used-in-cisco-breach-discovered-attacking-a-top-workforce-management-corporation-russias-evil-corp-gang-suspected-reports-esentire</loc><lastmod>2022-09-01T18:03:20-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_04.jpg</image:loc><image:title>Blog+04</image:title></image:image></url><url><loc>https://www.esentire.com/blog/june-2022-qakbot-campaign</loc><lastmod>2024-09-19T15:26:35-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_03.jpg</image:loc><image:title>Blog+03</image:title></image:image></url><url><loc>https://www.esentire.com/blog/njrat-comes-disguised-as-video-streaming-software</loc><lastmod>2022-08-16T09:27:10-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_02.jpg</image:loc><image:title>Blog+02</image:title></image:image></url><url><loc>https://www.esentire.com/blog/the-impending-business-risk-of-nation-state-adversaries</loc><lastmod>2022-09-29T18:15:32-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_01.jpg</image:loc><image:title>Blog+01</image:title></image:image></url><url><loc>https://www.esentire.com/blog/redline-stealer-disguised-as-anydesk-software</loc><lastmod>2022-08-08T15:43:04-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_24.jpg</image:loc><image:title>Blog+24</image:title></image:image></url><url><loc>https://www.esentire.com/blog/the-7-golden-rules-for-choosing-ecosystem-partners</loc><lastmod>2022-07-27T16:31:54-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_22.jpg</image:loc><image:title>Blog+22</image:title></image:image></url><url><loc>https://www.esentire.com/blog/html-smuggling-and-async-rat</loc><lastmod>2022-07-27T13:41:25-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_21.jpg</image:loc><image:title>Blog+21</image:title></image:image></url><url><loc>https://www.esentire.com/blog/redefining-prevention</loc><lastmod>2022-09-29T18:15:04-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_20.jpg</image:loc><image:title>Blog+20</image:title></image:image></url><url><loc>https://www.esentire.com/blog/cracked-software-leads-to-information-stealing-malware</loc><lastmod>2022-07-22T08:04:23-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_19.jpg</image:loc><image:title>Blog+19</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-threat-intelligence-malware-analysis-gootloader-and-icedid</loc><lastmod>2022-07-18T14:58:35-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_18.jpg</image:loc><image:title>Blog+18</image:title></image:image></url><url><loc>https://www.esentire.com/blog/resurgence-in-qakbot-malware-activity</loc><lastmod>2022-07-05T16:03:46-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_17.jpg</image:loc><image:title>Blog+17</image:title></image:image></url><url><loc>https://www.esentire.com/blog/how-is-the-cybersecurity-industry-shifting-gears-three-experts-weigh-in</loc><lastmod>2024-08-09T14:19:38-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_16.jpg</image:loc><image:title>Blog+16</image:title></image:image></url><url><loc>https://www.esentire.com/blog/socgholish-to-cobalt-strike-in-10-minutes</loc><lastmod>2024-09-13T12:38:07-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_15.jpg</image:loc><image:title>Blog+15</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-threat-intelligence-malware-analysis-pingpull-rat</loc><lastmod>2022-06-20T11:41:00-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_14.jpg</image:loc><image:title>Blog+14</image:title></image:image></url><url><loc>https://www.esentire.com/blog/manage-your-cyber-risk-by-conducting-a-cybersecurity-maturity-assessment</loc><lastmod>2025-05-20T14:30:49-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_13.jpg</image:loc><image:title>Blog+13</image:title></image:image></url><url><loc>https://www.esentire.com/blog/emotet-malware-detected-through-a-phishing-campaign</loc><lastmod>2022-07-05T16:04:00-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_12.jpg</image:loc><image:title>Blog+12</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-threat-intelligence-malware-analysis-purple-fox</loc><lastmod>2022-06-09T11:06:37-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_11.jpg</image:loc><image:title>Blog+11</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-wins-editors-choice-for-top-mdr-and-ir-provider-in-2022-global-infosec-awards-from-cyber-defense-magazine</loc><lastmod>2022-06-07T22:20:19-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_10.jpg</image:loc><image:title>Blog+10</image:title></image:image></url><url><loc>https://www.esentire.com/blog/gootkit-loader-returns-to-deliver-cobalt-strike</loc><lastmod>2022-07-05T16:05:13-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_09.jpg</image:loc><image:title>Blog+09</image:title></image:image></url><url><loc>https://www.esentire.com/blog/gootloader-initial-access-as-a-service-malware-expands-its-payloads-yet-again-infecting-law-firm-with-icedid</loc><lastmod>2024-06-07T15:23:06-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_08.jpg</image:loc><image:title>Blog+08</image:title></image:image></url><url><loc>https://www.esentire.com/blog/xdr-separating-truth-from-we-do-that-too</loc><lastmod>2022-09-29T18:13:35-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_07.jpg</image:loc><image:title>Blog+07</image:title></image:image></url><url><loc>https://www.esentire.com/blog/the-four-horsemen-of-software-supply-chain-attacks</loc><lastmod>2022-09-29T18:13:02-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_06.jpg</image:loc><image:title>Blog+06</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-threat-intelligence-malware-analysis-mars-stealer</loc><lastmod>2024-07-15T13:14:55-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_05.jpg</image:loc><image:title>Blog+05</image:title></image:image></url><url><loc>https://www.esentire.com/blog/attackers-use-third-party-contractor-account-to-infiltrate-network</loc><lastmod>2022-05-18T09:01:28-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_04.jpg</image:loc><image:title>Blog+04</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-named-tenables-2022-top-mssp-partner-in-north-america</loc><lastmod>2022-09-29T18:12:25-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_03.jpg</image:loc><image:title>Blog+03</image:title></image:image></url><url><loc>https://www.esentire.com/blog/redline-stealer-masquerades-as-photo-editing-software</loc><lastmod>2023-08-29T14:03:20-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_02.jpg</image:loc><image:title>Blog+02</image:title></image:image></url><url><loc>https://www.esentire.com/blog/will-counterattacks-stop-cybercriminals</loc><lastmod>2025-01-24T14:16:44-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_01.jpg</image:loc><image:title>Blog+01</image:title></image:image></url><url><loc>https://www.esentire.com/blog/channel-veteran-ashlyn-mclean-earns-spot-on-crns-2022-women-of-the-channel-list</loc><lastmod>2022-05-16T15:15:38-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_24.jpg</image:loc><image:title>Blog+24</image:title></image:image></url><url><loc>https://www.esentire.com/blog/policies-prevention-and-promises-how-to-protect-your-organization-from-third-party-and-supply-chain-risks</loc><lastmod>2022-09-29T18:11:18-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_23.jpg</image:loc><image:title>Blog+23</image:title></image:image></url><url><loc>https://www.esentire.com/blog/asyncrat-activity</loc><lastmod>2023-08-29T14:02:45-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_22.jpg</image:loc><image:title>Blog+22</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-is-part-of-the-gartner-peer-insights-customer-first-program-for-managed-detection-and-response</loc><lastmod>2022-09-29T18:10:41-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_21.jpg</image:loc><image:title>Blog+21</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-threat-intelligence-malware-analysis-solarmarker</loc><lastmod>2022-05-16T15:22:15-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_20.jpg</image:loc><image:title>Blog+20</image:title></image:image></url><url><loc>https://www.esentire.com/blog/hackers-spearphish-corporate-hiring-managers-with-poisoned-resumes-infecting-them-with-the-more-eggs-malware</loc><lastmod>2022-05-16T15:23:50-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_19.jpg</image:loc><image:title>Blog+19</image:title></image:image></url><url><loc>https://www.esentire.com/blog/microsoft-rescues-acronym-weary-cisos</loc><lastmod>2022-09-29T18:10:03-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_18.jpg</image:loc><image:title>Blog+18</image:title></image:image></url><url><loc>https://www.esentire.com/blog/become-hipaa-compliant-without-losing-focus-from-cybersecurity</loc><lastmod>2024-01-25T17:01:43-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_17.jpg</image:loc><image:title>Blog+17</image:title></image:image></url><url><loc>https://www.esentire.com/blog/fake-chrome-setup-leads-to-netsupportmanager-rat-and-mars-stealer</loc><lastmod>2023-08-23T11:07:38-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_16.jpg</image:loc><image:title>Blog+16</image:title></image:image></url><url><loc>https://www.esentire.com/blog/expect-aftershocks-from-the-ongoing-russian-allied-cyber-threats</loc><lastmod>2022-05-16T15:28:43-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_15.jpg</image:loc><image:title>Blog+15</image:title></image:image></url><url><loc>https://www.esentire.com/blog/updateagent-macos-malware</loc><lastmod>2023-08-29T14:01:33-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_14.jpg</image:loc><image:title>Blog+14</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-threat-intelligence-malware-analysis-headertip</loc><lastmod>2023-08-23T11:00:52-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_13.jpg</image:loc><image:title>Blog+13</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-threat-intelligence-malware-analysis-doublezero</loc><lastmod>2025-03-12T14:42:20-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_12.jpg</image:loc><image:title>Blog+12</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-named-on-the-2022-canadas-top-small-medium-employers-list</loc><lastmod>2022-05-16T15:42:40-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_11.jpg</image:loc><image:title>Blog+11</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-threat-intelligence-malware-analysis-caddywiper</loc><lastmod>2022-05-16T15:45:08-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_10.jpg</image:loc><image:title>Blog+10</image:title></image:image></url><url><loc>https://www.esentire.com/blog/suspected-asyncrat-delivered-via-iso-files-using-html-smuggling-technique</loc><lastmod>2023-08-29T14:05:03-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_09.jpg</image:loc><image:title>Blog+09</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-threat-intelligence-malware-analysis-hermeticwiper-partyticket</loc><lastmod>2022-05-16T15:48:20-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_08.jpg</image:loc><image:title>Blog+08</image:title></image:image></url><url><loc>https://www.esentire.com/blog/conti-affiliate-exposed-new-domain-names-ip-addresses-and-email-addresses-uncovered-by-esentire</loc><lastmod>2025-02-27T12:26:19-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_05.jpg</image:loc><image:title>Blog+05</image:title></image:image></url><url><loc>https://www.esentire.com/blog/analysis-of-leaked-conti-intrusion-procedures-by-esentires-threat-response-unit-tru</loc><lastmod>2025-02-27T15:44:28-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_06.jpg</image:loc><image:title>Blog+06</image:title></image:image></url><url><loc>https://www.esentire.com/blog/what-to-know-before-you-pay-the-ransom</loc><lastmod>2022-09-29T18:07:35-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_04.jpg</image:loc><image:title>Blog+04</image:title></image:image></url><url><loc>https://www.esentire.com/blog/test-your-cybersecurity-defenses-with-penetration-testing-and-red-team-exercises</loc><lastmod>2022-09-29T18:06:56-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_03.jpg</image:loc><image:title>Blog+03</image:title></image:image></url><url><loc>https://www.esentire.com/blog/exploitation-of-vmware-horizon-servers-by-tunnelvision-threat-actor</loc><lastmod>2022-05-18T09:22:56-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_02.jpg</image:loc><image:title>Blog+02</image:title></image:image></url><url><loc>https://www.esentire.com/blog/understanding-sensitive-data-risks-and-securing-your-crown-jewels</loc><lastmod>2022-09-29T18:06:18-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_01.jpg</image:loc><image:title>Blog+01</image:title></image:image></url><url><loc>https://www.esentire.com/blog/know-better-do-better-how-esentire-is-breaking-the-bias-for-international-womens-day-2022</loc><lastmod>2022-05-16T15:58:49-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_24.jpg</image:loc><image:title>Blog+24</image:title></image:image></url><url><loc>https://www.esentire.com/blog/how-to-measure-the-success-of-your-phishing-and-security-awareness-training-psat-program</loc><lastmod>2022-09-29T18:05:43-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_23.jpg</image:loc><image:title>Blog+23</image:title></image:image></url><url><loc>https://www.esentire.com/blog/how-to-prepare-for-cyberattacks-in-the-healthcare-industry</loc><lastmod>2022-05-16T16:04:46-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_22.jpg</image:loc><image:title>Blog+22</image:title></image:image></url><url><loc>https://www.esentire.com/blog/icedid-to-cobalt-strike-in-under-20-minutes</loc><lastmod>2022-05-18T09:22:31-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_21.jpg</image:loc><image:title>Blog+21</image:title></image:image></url><url><loc>https://www.esentire.com/blog/increase-in-emotet-activity-and-cobalt-strike-deployment</loc><lastmod>2022-05-18T09:22:05-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_20.jpg</image:loc><image:title>Blog+20</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-introduces-the-sean-hennessy-bursary-to-help-address-the-cybersecurity-skills-gap</loc><lastmod>2022-05-16T16:08:07-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_19.jpg</image:loc><image:title>Blog+19</image:title></image:image></url><url><loc>https://www.esentire.com/blog/why-hipaa-security-rule-compliance-is-challenging-for-healthcare-providers</loc><lastmod>2026-01-20T15:50:05-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_18.jpg</image:loc><image:title>Blog+18</image:title></image:image></url><url><loc>https://www.esentire.com/blog/machine-learning-powered-powershell-classifier-identifies-persistent-solarmarker-infection</loc><lastmod>2023-08-29T14:04:33-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_17.jpg</image:loc><image:title>Blog+17</image:title></image:image></url><url><loc>https://www.esentire.com/blog/remcos-rat</loc><lastmod>2022-06-08T14:10:08-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_16.jpg</image:loc><image:title>Blog+16</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-named-in-2022-waterloo-areas-top-employers-list-for-fifth-consecutive-year</loc><lastmod>2022-05-16T16:12:19-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_15.jpg</image:loc><image:title>Blog+15</image:title></image:image></url><url><loc>https://www.esentire.com/blog/dont-gamble-with-your-cybersecurity-budget</loc><lastmod>2022-05-16T16:13:16-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_14.jpg</image:loc><image:title>Blog+14</image:title></image:image></url><url><loc>https://www.esentire.com/blog/gootloader-identified-at-legal-services-firms-in-drive-by-attacks</loc><lastmod>2024-05-29T17:56:20-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_13.jpg</image:loc><image:title>Blog+13</image:title></image:image></url><url><loc>https://www.esentire.com/blog/what-you-need-to-know-about-log4j</loc><lastmod>2024-09-13T12:49:03-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_11.jpg</image:loc><image:title>Blog+11</image:title></image:image></url><url><loc>https://www.esentire.com/blog/why-the-healthcare-industry-is-a-growing-target-for-cybercriminals</loc><lastmod>2022-05-16T16:20:39-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_10.jpg</image:loc><image:title>Blog+10</image:title></image:image></url><url><loc>https://www.esentire.com/blog/making-the-case-for-extended-detection-and-response-xdr-for-cybersecurity-and-it-operations</loc><lastmod>2022-09-29T18:04:31-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_07.jpg</image:loc><image:title>Blog+07</image:title></image:image></url><url><loc>https://www.esentire.com/blog/ongoing-exploitation-of-the-log4j-vulnerabilities</loc><lastmod>2024-09-19T15:41:29-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_06.jpg</image:loc><image:title>Blog+06</image:title></image:image></url><url><loc>https://www.esentire.com/blog/cybersecurity-best-practices-to-implement-before-the-holidays</loc><lastmod>2022-09-29T18:03:55-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_05.jpg</image:loc><image:title>Blog+05</image:title></image:image></url><url><loc>https://www.esentire.com/blog/machine-learning-powered-bluesteel-and-mdr-for-endpoint-prevent-takeover-by-coinmining-botnet</loc><lastmod>2024-07-15T13:33:03-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_04.jpg</image:loc><image:title>Blog+04</image:title></image:image></url><url><loc>https://www.esentire.com/blog/security-operations-center-soc-build-or-buy</loc><lastmod>2024-07-15T16:06:15-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_03.jpg</image:loc><image:title>Blog+03</image:title></image:image></url><url><loc>https://www.esentire.com/blog/5-elements-of-an-effective-psat-program</loc><lastmod>2022-09-29T18:01:07-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_01.jpg</image:loc><image:title>Blog+01</image:title></image:image></url><url><loc>https://www.esentire.com/blog/dridex-excel-spam-feature</loc><lastmod>2024-07-15T13:03:40-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_23.jpg</image:loc><image:title>Blog+23</image:title></image:image></url><url><loc>https://www.esentire.com/blog/solarmarker-delivered-via-google-groups-pages</loc><lastmod>2024-07-15T14:01:45-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_22.jpg</image:loc><image:title>Blog+22</image:title></image:image></url><url><loc>https://www.esentire.com/blog/microsoft-grows-big-in-security-with-partners</loc><lastmod>2025-02-27T13:01:43-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_24.jpg</image:loc><image:title>Blog+24</image:title></image:image></url><url><loc>https://www.esentire.com/blog/mdr-for-endpoint-identifies-exploitation-of-sitecore-experience-platform-rce-cve-2021-42237</loc><lastmod>2024-07-15T13:55:17-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_21.jpg</image:loc><image:title>Blog+21</image:title></image:image></url><url><loc>https://www.esentire.com/blog/make-security-your-star-striker-not-your-goalie</loc><lastmod>2022-05-16T16:41:01-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_20.jpg</image:loc><image:title>Blog+20</image:title></image:image></url><url><loc>https://www.esentire.com/blog/adopting-a-cybersecurity-first-mindset-why-organizations-should-build-cybersecurity-into-their-processes-systems</loc><lastmod>2022-05-16T16:43:06-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_18.jpg</image:loc><image:title>Blog+18</image:title></image:image></url><url><loc>https://www.esentire.com/blog/squirrelwaffle-malware</loc><lastmod>2024-07-15T14:04:01-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_17.jpg</image:loc><image:title>Blog+17</image:title></image:image></url><url><loc>https://www.esentire.com/blog/years-old-infection-discovered-after-installing-the-esentire-mdr-for-endpoint-agent</loc><lastmod>2024-07-15T14:09:46-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_16.jpg</image:loc><image:title>Blog+16</image:title></image:image></url><url><loc>https://www.esentire.com/blog/hughes-hubbard-and-reed-cio-esentire-mdr-is-so-much-more-than-mdr</loc><lastmod>2022-09-29T17:57:59-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_14.jpg</image:loc><image:title>Blog+14</image:title></image:image></url><url><loc>https://www.esentire.com/blog/6-reasons-why-phishing-and-security-awareness-training-programs-fail</loc><lastmod>2022-09-29T17:57:16-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_13.jpg</image:loc><image:title>Blog+13</image:title></image:image></url><url><loc>https://www.esentire.com/blog/misconfigurations-are-the-biggest-threat-to-cloud-security-period</loc><lastmod>2025-03-27T14:27:54-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_12.jpg</image:loc><image:title>Blog+12</image:title></image:image></url><url><loc>https://www.esentire.com/blog/how-to-secure-your-multi-cloud-environment</loc><lastmod>2022-09-29T17:41:16-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_08.jpg</image:loc><image:title>Blog+08</image:title></image:image></url><url><loc>https://www.esentire.com/blog/streamlining-security-with-esentire-mdr-and-microsoft-365-defender</loc><lastmod>2022-09-29T17:40:43-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_09.jpg</image:loc><image:title>Blog+09</image:title></image:image></url><url><loc>https://www.esentire.com/blog/new-solarmarker-infection-discovered</loc><lastmod>2024-07-09T13:31:22-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_10.jpg</image:loc><image:title>Blog+10</image:title></image:image></url><url><loc>https://www.esentire.com/blog/security-buyers-need-to-start-reading-the-small-print</loc><lastmod>2024-05-28T09:46:45-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_07.jpg</image:loc><image:title>Blog+07</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-security-teams-respond-to-interactive-intrusion</loc><lastmod>2024-07-09T13:17:26-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_06.jpg</image:loc><image:title>Blog+06</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-named-10-and-top-mdr-provider-on-the-top-250-mssps-list-by-mssp-alert</loc><lastmod>2022-09-29T17:40:09-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_05.jpg</image:loc><image:title>Blog+05</image:title></image:image></url><url><loc>https://www.esentire.com/blog/texas-united-ciso-esentire-is-the-best-decision-i-ever-made</loc><lastmod>2025-03-26T11:28:33-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_04.jpg</image:loc><image:title>Blog+04</image:title></image:image></url><url><loc>https://www.esentire.com/blog/resurgence-of-zloader-malware-infections</loc><lastmod>2024-07-09T13:38:42-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_03.jpg</image:loc><image:title>Blog+03</image:title></image:image></url><url><loc>https://www.esentire.com/blog/as-ransomware-threats-rise-the-cyber-insurance-market-is-shifting-gears</loc><lastmod>2024-05-27T14:30:07-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_01.jpg</image:loc><image:title>Blog+01</image:title></image:image></url><url><loc>https://www.esentire.com/blog/the-insurance-sector-another-ripe-target-for-ransomware-attacks</loc><lastmod>2024-06-21T15:12:51-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_24.jpg</image:loc><image:title>Blog+24</image:title></image:image></url><url><loc>https://www.esentire.com/blog/solarmarker-drive-by-social-engineering-threat</loc><lastmod>2024-07-15T14:03:04-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_22.jpg</image:loc><image:title>Blog+22</image:title></image:image></url><url><loc>https://www.esentire.com/blog/dont-get-reeled-into-a-phishing-scam</loc><lastmod>2025-01-21T13:05:19-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_21.jpg</image:loc><image:title>Blog+21</image:title></image:image></url><url><loc>https://www.esentire.com/blog/using-a-machine-learning-threat-detection-model-to-extract-and-classify-malicious-macros</loc><lastmod>2023-07-19T15:14:02-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_20.jpg</image:loc><image:title>Blog+20</image:title></image:image></url><url><loc>https://www.esentire.com/blog/proxyshell-microsoft-exchange-vulnerabilities-exploited</loc><lastmod>2024-07-09T13:37:34-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_19.jpg</image:loc><image:title>Blog+19</image:title></image:image></url><url><loc>https://www.esentire.com/blog/maturity-based-approach-vs-risk-based-approach-whats-the-right-answer</loc><lastmod>2022-05-17T13:50:57-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_18.jpg</image:loc><image:title>Blog+18</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-mdr-for-endpoint-prevents-purple-fox-exploit-targeting-windows-machine</loc><lastmod>2024-07-15T13:05:03-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_12.jpg</image:loc><image:title>Blog+12</image:title></image:image></url><url><loc>https://www.esentire.com/blog/gootkit-identified-via-lead-driven-threat-hunt</loc><lastmod>2022-09-29T17:35:25-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_10.jpg</image:loc><image:title>Blog+10</image:title></image:image></url><url><loc>https://www.esentire.com/blog/petitpotam-ntlm-relay-attack</loc><lastmod>2024-07-09T13:36:22-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_08.jpg</image:loc><image:title>Blog+08</image:title></image:image></url><url><loc>https://www.esentire.com/blog/how-to-reduce-the-impact-of-a-ransomware-attack</loc><lastmod>2022-09-29T17:33:45-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_06.jpg</image:loc><image:title>Blog+06</image:title></image:image></url><url><loc>https://www.esentire.com/blog/how-your-organization-can-prevent-a-ransomware-attack</loc><lastmod>2022-09-29T17:33:11-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_04.jpg</image:loc><image:title>Blog+04</image:title></image:image></url><url><loc>https://www.esentire.com/blog/printnightmare-zero-day-vulnerability-leaked</loc><lastmod>2022-09-29T17:32:31-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_03.jpg</image:loc><image:title>Blog+03</image:title></image:image></url><url><loc>https://www.esentire.com/blog/vulnerable-supply-chain-software-and-george-santayana</loc><lastmod>2022-09-29T17:31:01-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_24.jpg</image:loc><image:title>Blog+24</image:title></image:image></url><url><loc>https://www.esentire.com/blog/hooked-by-phisherman-quarterbacking-breach-response-with-law-enforcement</loc><lastmod>2022-05-17T14:57:14-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_22.jpg</image:loc><image:title>Blog+22</image:title></image:image></url><url><loc>https://www.esentire.com/blog/is-history-repeating-itself-with-the-latest-kaseya-vsa-compromise</loc><lastmod>2022-09-29T17:29:24-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_21.jpg</image:loc><image:title>Blog+21</image:title></image:image></url><url><loc>https://www.esentire.com/blog/solarmarker-shifts-infrastructure-in-recent-drive-by-attacks</loc><lastmod>2022-05-18T09:10:15-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_19.jpg</image:loc><image:title>Blog+19</image:title></image:image></url><url><loc>https://www.esentire.com/blog/better-together-how-combining-mdr-and-ir-create-stronger-cyber-resilience</loc><lastmod>2022-09-29T17:28:58-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_18.jpg</image:loc><image:title>Blog+18</image:title></image:image></url><url><loc>https://www.esentire.com/blog/agent-tesla-identified-using-machine-learning-powershell-classifier</loc><lastmod>2024-08-09T12:27:08-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_17.jpg</image:loc><image:title>Blog+17</image:title></image:image></url><url><loc>https://www.esentire.com/blog/7-actionable-steps-to-reducing-cyber-vulnerabilities</loc><lastmod>2024-08-06T11:39:35-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_12.jpg</image:loc><image:title>Blog+12</image:title></image:image></url><url><loc>https://www.esentire.com/blog/popular-remote-access-trojan-identified-through-threat-hunting-activities</loc><lastmod>2022-05-18T09:09:08-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_14.jpg</image:loc><image:title>Blog+14</image:title></image:image></url><url><loc>https://www.esentire.com/blog/icedid-malware</loc><lastmod>2022-06-08T13:39:53-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_11.jpg</image:loc><image:title>Blog+11</image:title></image:image></url><url><loc>https://www.esentire.com/blog/qakbot-and-cobalt-strike</loc><lastmod>2022-05-18T09:07:30-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_10.jpg</image:loc><image:title>Blog+10</image:title></image:image></url><url><loc>https://www.esentire.com/blog/purple-fox-exploit-kit</loc><lastmod>2022-05-18T09:24:55-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_09.jpg</image:loc><image:title>Blog+09</image:title></image:image></url><url><loc>https://www.esentire.com/blog/doubledrop-global-phishing-campaign</loc><lastmod>2022-05-18T09:25:47-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_08.jpg</image:loc><image:title>Blog+08</image:title></image:image></url><url><loc>https://www.esentire.com/blog/the-dark-side-of-the-darkside-ransomware-group</loc><lastmod>2022-05-18T09:26:50-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_07.jpg</image:loc><image:title>Blog+07</image:title></image:image></url><url><loc>https://www.esentire.com/blog/dltminer-campaign-targeting-on-premise-microsoft-exchange-servers-using-common-iocs</loc><lastmod>2022-05-18T09:27:50-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_06.jpg</image:loc><image:title>Blog+06</image:title></image:image></url><url><loc>https://www.esentire.com/blog/incident-response-digital-forensics-5-mistakes</loc><lastmod>2022-09-29T17:22:33-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_05.jpg</image:loc><image:title>Blog+05</image:title></image:image></url><url><loc>https://www.esentire.com/blog/tenable-the-premiere-vulnerability-management-solution-provider-names-esentire-its-2021-top-mssp-partner-in-north-america</loc><lastmod>2022-09-29T17:21:46-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_04.jpg</image:loc><image:title>Blog+04</image:title></image:image></url><url><loc>https://www.esentire.com/blog/what-is-digital-forensics-and-incident-response</loc><lastmod>2022-09-29T17:21:09-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_03.jpg</image:loc><image:title>Blog+03</image:title></image:image></url><url><loc>https://www.esentire.com/blog/planning-through-recovery-five-things-to-keep-in-mind</loc><lastmod>2022-09-29T17:20:38-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_02.jpg</image:loc><image:title>Blog+02</image:title></image:image></url><url><loc>https://www.esentire.com/blog/what-matters-in-a-managed-detection-and-response-provider</loc><lastmod>2025-03-20T13:46:37-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assetsV3/Blog/blog_01.jpg</image:loc><image:title>Blog+01</image:title></image:image></url><url><loc>https://www.esentire.com/blog/esentire-mdr-is-now-integrated-with-microsoft-defender-for-endpoint</loc><lastmod>2022-09-29T17:19:16-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assets/blog/2020-esentire-blog-3clouds.jpg</image:loc><image:title>2020+esentire+blog+3clouds</image:title></image:image></url><url><loc>https://www.esentire.com/blog/forrester-report-mdr-providers-and-xdr</loc><lastmod>2022-09-29T17:18:26-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assets/blog/2020-eSentire-blog-cloud-with-screens.jpg</image:loc><image:title>2020+e+Sentire+blog+cloud+with+screens</image:title></image:image></url><url><loc>https://www.esentire.com/blog/a-day-in-the-life-of-our-irish-security-operations-center-soc</loc><lastmod>2022-09-29T17:17:50-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assets/blog/2020-esentire-blog-healthcare-cloud-desktop.jpg</image:loc><image:title>2020+esentire+blog+cloud+desktop</image:title></image:image></url><url><loc>https://www.esentire.com/blog/the-solarwinds-supply-chain-compromise-part-2</loc><lastmod>2022-09-29T17:17:18-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assets/blog/2020-eSentire-blog-checklist.jpg</image:loc><image:title>2020+e+Sentire+blog+checklist</image:title></image:image></url><url><loc>https://www.esentire.com/blog/threat-intelligence-the-solarwinds-compromise</loc><lastmod>2022-09-29T17:16:55-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assets/blog/2020-eSentire-blog-cloud-with-checklist.jpg</image:loc><image:title>2020+e+Sentire+blog+cloud+with+checklist</image:title></image:image></url><url><loc>https://www.esentire.com/blog/understanding-modern-ransomware</loc><lastmod>2022-09-29T17:15:59-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assets/blog/2020-esentire-blog-remote-safe-house.jpg</image:loc><image:title>2020+esentire+blog+remote+safe+house</image:title></image:image></url><url><loc>https://www.esentire.com/blog/ccpa-update-with-cpra</loc><lastmod>2022-09-29T17:15:19-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assets/blog/2020-esentire-blog-legal-paper.jpg</image:loc><image:title>2020+esentire+blog+legal+paper</image:title></image:image></url><url><loc>https://www.esentire.com/blog/hands-on-threat-research-leads-to-resilient-zerologon-detection</loc><lastmod>2022-05-18T09:44:41-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assets/blog/2020-esentire-blog-bad-laptop-remote.jpg</image:loc><image:title>2020+esentire+blog+bad+laptop+remote</image:title></image:image></url><url><loc>https://www.esentire.com/blog/endpoints-are-the-new-cybersecurity-front-lines-of-defense</loc><lastmod>2022-09-29T17:12:42-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assets/blog/2020-esentire-blog-cloud-database.jpg</image:loc><image:title>2020+esentire+blog+cloud+database</image:title></image:image><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assets/blog/blog-images/MPolly_Headshot-250x250.jpg</image:loc><image:title>M+Polly+Headshot+250x250</image:title></image:image></url><url><loc>https://www.esentire.com/blog/the-sunwalker-incident-netwalker-and-suncrypt-ransomware-double-double-exploitation</loc><lastmod>2022-09-29T17:11:29-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assets/blog/2020-esentire-blog-bad-cloud-server.jpg</image:loc><image:title>2020+esentire+blog+bad+cloud+server</image:title></image:image></url><url><loc>https://www.esentire.com/blog/why-a-cloud-native-platform-is-a-requirement-for-modern-cybersecurity</loc><lastmod>2022-09-29T17:07:37-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assets/blog/2020-esentire-blog-3clouds.jpg</image:loc><image:title>2020+esentire+blog+3clouds</image:title></image:image></url><url><loc>https://www.esentire.com/blog/how-current-ransomware-tactics-look-a-lot-like-smoking-a-brisket</loc><lastmod>2022-09-29T17:05:37-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assets/blog/2020-eSentire-brisket-gear.jpg</image:loc><image:title>2020+e+Sentire+brisket+gear</image:title></image:image></url><url><loc>https://www.esentire.com/blog/manufacturing-cybersecurity-must-adapt-to-emerging-technology-and-threats-1</loc><lastmod>2025-06-23T09:53:25-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assets/blog/2020-eSentire-blog-Manufacturing-shield.jpg</image:loc><image:title>2020+e+Sentire+blog+Manufacturing+shield</image:title></image:image></url><url><loc>https://www.esentire.com/blog/crisis-communications-for-the-modern-business-landscape</loc><lastmod>2022-09-29T17:05:02-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assets/blog/2020-eSentire-blog-Cloud-shield-phone.jpg</image:loc><image:title>2020+e+Sentire+blog+Cloud+shield+phone</image:title></image:image></url><url><loc>https://www.esentire.com/blog/celebrating-women-in-cybersecurity</loc><lastmod>2024-07-09T13:08:07-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assets/blog/2019-ESENTIRE-blog-win2.jpg</image:loc><image:title>2019+ESENTIRE+blog+win2</image:title></image:image></url><url><loc>https://www.esentire.com/blog/think-about-cybersecurity-the-way-executives-think-about-business</loc><lastmod>2022-05-18T10:03:40-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assets/blog/2020-esentire-blog-finance-graph.jpg</image:loc><image:title>2020+esentire+blog+finance+graph</image:title></image:image></url><url><loc>https://www.esentire.com/blog/cybersecurity-strategy-is-risk-management</loc><lastmod>2024-08-22T16:25:56-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assets/blog/2020-esentire-blog-finance-desktop.jpg</image:loc><image:title>2020+esentire+blog+finance+desktop</image:title></image:image></url><url><loc>https://www.esentire.com/blog/its-time-to-think-about-cybersecurity-the-way-executives-think-about-business</loc><lastmod>2022-09-29T17:04:17-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assets/blog/2020-esentire-blog-finance-graph-coins.jpg</image:loc><image:title>2020+esentire+blog+finance+graph+coins</image:title></image:image></url><url><loc>https://www.esentire.com/blog/how-msps-can-serve-customers-security-needs</loc><lastmod>2026-04-14T13:22:45-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assets/blog/2020-esentire-blog-cloud-database.jpg</image:loc><image:title>2020+esentire+blog+cloud+database</image:title></image:image></url><url><loc>https://www.esentire.com/blog/updating-your-incident-response-playbook-during-a-crisis</loc><lastmod>2026-04-14T13:22:45-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assets/blog/2019-ESENTIRE-blog-generic-files.jpg</image:loc><image:title>2019+ESENTIRE+blog+generic+files</image:title></image:image></url><url><loc>https://www.esentire.com/blog/operating-a-world-class-soc-no-matter-the-circumstances</loc><lastmod>2026-04-14T13:22:45-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assets/blog/2020-eSentire-blog-continents-connected.jpg</image:loc><image:title>2020+esentire+blog+continents+connected</image:title></image:image></url><url><loc>https://www.esentire.com/blog/new-bolo-phishing-attacks-that-customize-o365-pages-with-your-branding</loc><lastmod>2026-01-22T16:38:27-05:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assets/blog/2020-esentire-blog-bad-laptop-remote.jpg</image:loc><image:title>2020+esentire+blog+bad+laptop+remote</image:title></image:image></url><url><loc>https://www.esentire.com/blog/quantifying-risk-making-the-case-for-greater-endpoint-protection</loc><lastmod>2022-09-29T17:01:44-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assets/blog/2019-ESENTIRE-blog-laptop.jpg</image:loc><image:title>2019+ESENTIRE+blog+laptop</image:title></image:image></url><url><loc>https://www.esentire.com/blog/bringing-managed-detection-and-response-to-modern-cloud-environments-with-escloud</loc><lastmod>2022-09-29T16:59:10-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assets/blog/2019-ESENTIRE-blog-cloud.jpg</image:loc><image:title>2019+ESENTIRE+blog+cloud</image:title></image:image></url><url><loc>https://www.esentire.com/blog/a-perfect-match-how-msps-and-mdrs-can-work-together</loc><lastmod>2026-04-14T12:34:08-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assets/blog/2019-ESENTIRE-blog-manufacturing.jpg</image:loc><image:title>2019+ESENTIRE+blog+manufacturing</image:title></image:image></url><url><loc>https://www.esentire.com/blog/what-you-need-to-know-about-the-california-consumer-privacy-act</loc><lastmod>2026-04-14T12:34:08-04:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority><image:image><image:loc>https://esentire-dot-com-assets.s3.amazonaws.com/assets/blog/2019-ESENTIRE-blog-generic-files.jpg</image:loc><image:title>2019+ESENTIRE+blog+generic+files</image:title></image:image></url></urlset>