What We Do
How We Do
Resources
Company
Partners
Get Started

The eSentire Blog

Sep 05, 2024

LummaC2 Malware and Malicious Chrome Extension Delivered via DLL Side-Loading

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →

Posts from TRU Intelligence Center

TRU Positive/Bulletin

13 M

Exploring the D3F@ck Malware-as-a-Service Loader

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Company News

2 M

eSentire Joins the Joint Cyber Defense Collaborative (JCDC) to Boost Cyber Threat Intel...

We are thrilled to join the Joint Cyber Defense Collaborative (JCDC), a public-private cybersecurity initiative…

READ NOW →

Cybersecurity Strategy

5 M

Understanding MDR Breach Protection Warranties: Key Questions to Ask and What They Actu...

Cyber insurance is commonly used by businesses to mitigate potential losses in the event of a breach. Although…

READ NOW →

TRU Positive/Bulletin

7 M

Ande Loader Leads to 0bj3ctivity Stealer Infection

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →

TRU Positive/Bulletin

7 M

Quartet of Trouble: XWorm, AsyncRAT, VenomRAT, and PureLogs Stealer Leverage TryCloudfl...

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →

AI/ML

9 M

Hackers Are Stealing GenAI Credentials, So What Sensitive Company Data Are They Getting...

On the Underground Hacker Markets, a criminal can purchase any number of illegal goods. They can get…

READ NOW →

Ransomware

7 M

Top Strategies for Ensuring Ransomware Readiness in 2024

Ransomware continues to evolve with attackers employing sophisticated tactics to infiltrate systems…

READ NOW →

TRU Positive/Bulletin

13 M

Introducing Gh0stGambit: A Dropper for Deploying Gh0st RAT

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →
9 M

Understanding MDR Security: A Comprehensive Guide

Managed Detection and Response (MDR) is a critical layer in a proactive, adaptive security strategy. By…

READ NOW →
Page
of 47