Buzzing on Christmas Eve: Trigona Ransomware in 3 Hours
Key Takeaways In late December 2022, we observed threat actors exploiting a publicly exposed Remote…
Investigating Worldwide SMS Scams, and Tens of Millions of Dollars in Fraud
SMS services remain a critical part of telecommunications; they don't require Internet access, and companies…
Uncovering Hidden Threats with VirusTotal Code Insight
In the constantly changing world of cybersecurity, generative AI is becoming an increasingly valuable tool.…
Stream-Jacking 2.0: Deep fakes power account takeovers on YouTube to maximize crypto-doubling scams
As of October 2023, researchers at Bitdefender Labs have been actively keeping tabs on steam-jacking…
Full Transparency: Controlling Apple's TCC | Huntress
Dive into Apple's TCC framework, decoding its role in user privacy. Explore permissions, challenges, and…
Securing Healthcare: Handling Cyber Threats with Care | Huntress
What’s the key to navigating healthcare cybersecurity? This blog decodes today’s healthcare threat landscape and…
Empowering the Hunt: All Your Security in One Place | Huntress
Huntress unveils a powerful new platform UI for 2024! From SOC insights to triage feeds,…
Navigating Cybersecurity Challenges in Healthcare | Huntress
Discover essential strategies for healthcare cybersecurity in our latest blog. Learn how to navigate challenges,…
Monitoring malware trends with VT Intelligence
Please note that this blogpost is part of our #VTMondays series, check out our collection…
Combating Emerging Microsoft 365 Tradecraft: Initial Access | Huntress
Threats evolve, and so does Huntress. Let’s talk about evolving our approach to hitting the…