The eSentire Blog

Generative AI

8 M

Cybersecurity Spending: Where to Allocate Your Budget in 2025

When it comes to budgeting for cybersecurity, one of the most important steps is understanding where to…

READ NOW →

Generative AI

7 M

How Generative AI Can Be Used to Enable Better Security Outcomes

Generative AI (GenAI) technologies have had a transformative impact on businesses, significantly improving…

READ NOW →

Generative AI

3 M

AI May Be A Powerful Tool, But It’s No Substitute for Cyber Experts

Originally posted on the thestar.com on September 14, 2024. This is the year for artificial intelligence (AI)…

READ NOW →

TRU Positive/Bulletin

5 M

Go Injector Leading to Stealers

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →

Managed Detection and Response

2 M

eSentire recognized as CrowdStrike’s 2024 Global MSSP Partner of the Year for the Third...

We are thrilled to be named CrowdStrike’s 2024 Global MSSP Partner of the Year for the third consecutive…

READ NOW →

Threat Response Unit

12 M

Hackers Breach Lara and Tiffany Trump’s X Accounts in a Cryptocurrency Scam, the Latest...

On September 3, 2024, hackers breached the X account of Lara Trump, Donald Trump’s daughter-in-law and…

READ NOW →

TRU Positive/Bulletin

5 M

Poseidon Stealer Uses Sora AI Lure to Infect macOS

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →

TRU Positive/Bulletin

7 M

TRU Malware Analysis: The Intrusion Case Involving Zloader

In December 2023, the Incident Handling Team responded to an intrusion incident. The investigation faced…

READ NOW →

Regulatory Compliance

4 M

Balancing Incident Disclosure and Tactical Response: Lessons from the Halliburton Breac...

On August 22, 2024, global multinational energy firm Halliburton disclosed through an 8-K form filing to the…

READ NOW →

TRU Positive/Bulletin

5 M

LummaC2 Malware and Malicious Chrome Extension Delivered via DLL Side-Loading

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →

TRU Positive/Bulletin

4 M

Exploring AsyncRAT and Infostealer Plugin Delivery Through Phishing Emails

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →

Sensitive Data Protection

9 M

Zero Trust Best Practices: Guidelines for Successful Adoption

Traditional perimeter-based security models are insufficient to protect against today’s sophisticated threat…

READ NOW →
Page
of 49