Sigma rules for Linux and MacOS

TLDR: VT Crowdsourced Sigma rules will now also match suspicious activity for macOS and Linux…

Teach Yourself to Phish: The Strategy Behind Phishing Simulations | Huntress

Get ready for a phishing trip! Learn about the strategy behind phishing simulations and how…

Protecting the perimeter with VT Intelligence – malicious URLs

Please note that this blogpost is part of our #VTMondays series, check out our collection…

Curling for Data: A Dive into a Threat Actor's Malicious TTPs | Huntress

Huntress analysts recently observed a novel set of tactics, techniques, and procedures used by a…

Orienting Intelligence Requirements to the Small Business Space | Huntress

Discover how to streamline small business intelligence for practical decision-making, balance benefits, and explore cost-effective…

Protecting the perimeter with VT Intelligence – Email security

Please note that this blogpost is part of our #VTMondays series, check out our collection…

VTMondays

Welcome to VTMondays! A weekly series of bite-sized educational pills exploring the use of VirusTotal…

Exploring the Value of Indicators In Small Business Defense | Huntress

Discover how leveraging technical indicators can boost cybersecurity effectiveness and empower small business defense. Read…

Huntress MDR for Microsoft 365 Update | Huntress

An update on our MDR for Microsoft 365 product, some recent improvements, and what fixes…

CIS Controls Security Awareness Training | Huntress

Learn more about how Huntress' Managed Security Awareness Program can help your employees follow CIS…