Buzzing on Christmas Eve: Trigona Ransomware in 3 Hours

Key Takeaways In late December 2022, we observed threat actors exploiting a publicly exposed Remote…

Investigating Worldwide SMS Scams, and Tens of Millions of Dollars in Fraud

SMS services remain a critical part of telecommunications; they don't require Internet access, and companies…

Uncovering Hidden Threats with VirusTotal Code Insight

In the constantly changing world of cybersecurity, generative AI is becoming an increasingly valuable tool.…

Stream-Jacking 2.0: Deep fakes power account takeovers on YouTube to maximize crypto-doubling scams

As of October 2023, researchers at Bitdefender Labs have been actively keeping tabs on steam-jacking…

Full Transparency: Controlling Apple's TCC | Huntress

Dive into Apple's TCC framework, decoding its role in user privacy. Explore permissions, challenges, and…

Securing Healthcare: Handling Cyber Threats with Care | Huntress

What’s the key to navigating healthcare cybersecurity? This blog decodes today’s healthcare threat landscape and…

Empowering the Hunt: All Your Security in One Place | Huntress

Huntress unveils a powerful new platform UI for 2024! From SOC insights to triage feeds,…

Navigating Cybersecurity Challenges in Healthcare | Huntress

Discover essential strategies for healthcare cybersecurity in our latest blog. Learn how to navigate challenges,…

Monitoring malware trends with VT Intelligence

Please note that this blogpost is part of our #VTMondays series, check out our collection…

Combating Emerging Microsoft 365 Tradecraft: Initial Access | Huntress

Threats evolve, and so does Huntress. Let’s talk about evolving our approach to hitting the…