Tenable Hexa AI a use case: Axios npm supply chain attack
See how you can use Tenable Hexa AI to determine in minutes if you’re impacted by the Axios npm supply chain attack. Learn how easy…
See how you can use Tenable Hexa AI to determine in minutes if you’re impacted by the Axios npm supply chain attack. Learn how easy…
For medical professionals, data saves lives. For hackers, data drives profits. When one has the data, however, the other does not. This ongoing battle for…
In the past year, hackers have started trading in the proverbial black hoodie and are opting instead for a “cloak of invisibility.” The result? Cybercriminals…
It’s not exactly breaking news that cyber threats to critical infrastructure have become a major concern for state and local governments. But if it feels…
Hackers love to target endpoints. They are, after all, the gateway to your organization’s digital infrastructure. According to IDC, a staggering 70% of breaches originate…
In recent years, cybersecurity threats have increasingly targeted healthcare organizations, and now it seems hackers may be turning their attention to a more specific group…
Imagine you’re trying to install a trusted program, like a medical image viewer, and everything seems fine. But there’s a twist: hackers have tricked you…
We’re only midway through the year, and the Huntress trophy case is filling up quickly. For Summer 2024, Huntress Managed EDR was featured in 50…
Huntress has been authorized by the Common Vulnerabilities and Exposures (CVE) Program as a CVE Numbering Authority (CNA). This sounds fancy (and it is), but…
The “exploit” is trivial and embarrassingly easy. These are words you never want to hear when talking about vulnerabilities in a widely used product, but…
Imagine you’re playing in the big game. With only a minute left in the fourth quarter your team is one yard away from sealing the…
Cybercrime isn’t the chaotic mess of random attacks people still imagine. It’s a booming global economy, projected to cost the world $12.2 trillion annually by…