Exploring the Value of Indicators In Small Business Defense | Huntress

Discover how leveraging technical indicators can boost cybersecurity effectiveness and empower small business defense. Read…

Huntress MDR for Microsoft 365 Update | Huntress

An update on our MDR for Microsoft 365 product, some recent improvements, and what fixes…

CIS Controls Security Awareness Training | Huntress

Learn more about how Huntress' Managed Security Awareness Program can help your employees follow CIS…

macOS Terms and Trends You Should Know About | Huntress

A look inside the evolving landscape of macOS malware. Dive into the current state of…

How AI is shaping malware analysis

We just released our “Empowering Defenders: How AI is shaping malware analysis” report, where we…

MFT Exploitation and Adversary Operations | Huntress

Dive into our analysis of the CVE-2023-43117 threat in CrushFTP and the growing popularity of…

Can’t Touch This: Data Exfiltration via Finger | Huntress

Threat actors frequently make use of native utilities during incidents. However, this blog post discusses…

Free Micropatches For Microsoft Access Forced Authentication Through Firewall (0day)

 Update 2/14/2024: Either January 30 or February 1 Office update brought a fix for this…

Actionable Threat Intel (VI) – A day in a Threat Hunter’s life

Kaspersky's CTI analysts recently released their Asian APT groups report, including details on behavior by…

HrServ – Previously unknown web shell used in APT attack

Introduction In the course of our routine investigation, we discovered a DLL file, identified as…