7 Don’ts of Security Awareness Training | Huntress
Many security awareness training solutions aren’t easy to manage, and worse, they affect knowledge retention.…
Managing Attack Surface | Huntress
Huntress recently detected interesting activity on an endpoint; a threat actor was attempting to establish…
Huntress and Our Culture of BElonging | Huntress
Huntress Chief People Officer Todd Riesterer discusses how we curate a culture of BElonging, built…
Micropatches Released for Microsoft Outlook "MonikerLink" Remote Code Execution Vulnerability (CVE-2024-21413)
Update 7/31/2024: Additional exploitation variants for this vulnerability were subsequently discovered. Consequently, original micropatches were…
Using Backup Utilities for Data Exfiltration | Huntress
“Double extortion” attacks, often perpetrated by ransomware threat actors, include data exfiltration prior to file…
Know your enemies: An approach for CTI teams
VirusTotal’s Threat Landscape can be a valuable source of operational and tactical threat intelligence for…
Full Transparency: Controlling Apple's TCC (Part 2) | Huntress
The primary goal of Apple's Transparency, Consent, and Control (TCC) is to empower users with…
COM Objects Hijacking
The COM Hijacking technique is often utilized by threat actors and various malware families to…
Time Travelers Busted: How to Detect Impossible Travel | Huntress
Impossible Travel is one of the earliest indicators of user compromise, and it works against…
Please Allow Me to (Re)introduce Myself: Huntress Security Awareness Training | Huntress
Huntress has launched Huntress Security Awareness Training (SAT), a new and improved SAT solution tailored…