What We Do
How We Do
Resources
Company
Partners
Get Started

The eSentire Blog

Managed Detection and Response

3 M

eSentire Named a Strong Performer in The Forrester Wave™: Managed Detection and Respons...

We are thrilled to be named a Strong Performer with a top 3 placement in The Forrester Wave™: Managed Detection…

READ NOW →
8 M

Citrix Bleed Vulnerability:

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Company News

4 M

eSentire Named in 2024 Waterloo Area's Top Employers List for Seventh Consecutive Year

We are thrilled to be named to the 2024 Waterloo Area’s Top Employers list for the seventh consecutive year. This…

READ NOW →

TRU Positive/Bulletin

5 M

Unveiling Parallax RAT: A Journey from Infection to Lateral Movement

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Managed Risk Programs

5 M

The Rise of QR Code Phishing Attacks and Best Practices for Interacting with QR Codes

Since the onset of the COVID-19 pandemic, most businesses across a wide range of industries have begun using Quick…

READ NOW →

TRU Positive/Bulletin

18 M

eSentire Threat Intelligence Malware Analysis: SolarMarker: To Jupyter and Back

Key Takeaways SolarMarker uses process injection to run the hVNC and data staging payload.The actors behind…

READ NOW →

Third-Party Cyber Risk

9 M

Why Manufacturing Organizations Need to Embrace the Microsoft Security Tools for 24/7 T...

For manufacturing organizations, the introduction of Industry 4.0 and rapid digital transformation have led to…

READ NOW →

Attacks/Breaches

6 M

What Does Materiality Really Mean in a Cyberattack?

For the Mr. Cooper Group, materiality may have reached its “Taylor Swift” moment On October 31, 2023, a mortgage…

READ NOW →

Threat Response Unit

7 M

The Notorious ALPHV/BlackCat Ransomware Gang is Attacking Corporations and Public Entit...

Security researchers with eSentire, a top global cybersecurity solutions provider, are warning that…

READ NOW →
Page
of 44