7 Don’ts of Security Awareness Training | Huntress

Many security awareness training solutions aren’t easy to manage, and worse, they affect knowledge retention.…

Managing Attack Surface | Huntress

Huntress recently detected interesting activity on an endpoint; a threat actor was attempting to establish…

Huntress and Our Culture of BElonging | Huntress

Huntress Chief People Officer Todd Riesterer discusses how we curate a culture of BElonging, built…

Micropatches Released for Microsoft Outlook "MonikerLink" Remote Code Execution Vulnerability (CVE-2024-21413)

 Update 7/31/2024: Additional exploitation variants for this vulnerability were subsequently discovered. Consequently, original micropatches were…

Using Backup Utilities for Data Exfiltration | Huntress

“Double extortion” attacks, often perpetrated by ransomware threat actors, include data exfiltration prior to file…

Know your enemies: An approach for CTI teams

VirusTotal’s Threat Landscape can be a valuable source of operational and tactical threat intelligence for…

Full Transparency: Controlling Apple's TCC (Part 2) | Huntress

The primary goal of Apple's Transparency, Consent, and Control (TCC) is to empower users with…

COM Objects Hijacking

The COM Hijacking technique is often utilized by threat actors and various malware families to…

Time Travelers Busted: How to Detect Impossible Travel | Huntress

Impossible Travel is one of the earliest indicators of user compromise, and it works against…

Please Allow Me to (Re)introduce Myself: Huntress Security Awareness Training | Huntress

Huntress has launched Huntress Security Awareness Training (SAT), a new and improved SAT solution tailored…