Time to Act | Huntress
Since our founding in 2015, Huntress has been leading the charge in Managed Detection and Response (MDR), helping customers and managed security providers (MSPs) worldwide…
Since our founding in 2015, Huntress has been leading the charge in Managed Detection and Response (MDR), helping customers and managed security providers (MSPs) worldwide…
Trisquel GNU/Linux, a free operating system aimed at home users, small enterprises, and educational centers, released version 12.0. The release, codenamed Ecne, is declared production-ready…
Ravie LakshmananApr 06, 2026Cybercrime / Financial Crime Germany’s Federal Criminal Police Office (aka BKA or the Bundeskriminalamt) has unmasked the real identities of two of…
The NDIS Quality and Safeguards Commission is expecting to have the “essential” capabilities of a new risk engine to support its work regulating the $50…
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Thirty-Six Malicious npm Strapi Packages Deploy…
I think there’s a misconception about how AI will break and change things. The Mythos hype has convinced people that AI is about to be…
Ransomware is on a winning streak. And businesses, big and small, are on the verge of losing it all. Over the past year, cybercriminals have…
The FBI Atlanta Field Office and the Indonesian National Police have taken down a global phishing operation tied to more than $20 million in attempted…
Ravie LakshmananApr 07, 2026Artificial Intelligence / Vulnerability Threat actors are exploiting a maximum-severity security flaw in Flowise, an open-source artificial intelligence (AI) platform, according to…
Adobe fixes actively exploited Acrobat Reader flaw CVE-2026-34621 Pierluigi Paganini April 12, 2026 Adobe addressed a critical Acrobat Reader vulnerability, tracked as CVE-2026-34621, which is…
I’ve been experiencing a feeling lately that’s massive and hard to pin down. But here goes. If you remember my piece on Constraints on Creativity,…
tl;dr Huntress uncovered the infrastructure of a mass phishing campaign including potentially novel tradecraft that combines HTML smuggling, injected iframes, and session theft via transparent…