Why cybersecurity matters for your business.
Running a business, big or small, isn’t easy. Some challenges you’ll see coming, while others will catch you completely off guard. One day, everything’s running…
Running a business, big or small, isn’t easy. Some challenges you’ll see coming, while others will catch you completely off guard. One day, everything’s running…
Get started with Elastic Security from your AI agent Elastic Agent Skills are open source packages that give your AI coding agent native Elastic expertise.…
Those familiar with the cybersecurity space are well acquainted with the information security triad of confidentiality, integrity, and availability (the “CIA triad”). Confidentiality and integrity…
Explore key cybersecurity requirements and implementation deadlines for electric power utilities included in the NERC CIP-003-9 standard for Low-Impact BES (Bulk Electric System) Cyber Systems,…
Most everyone who’s been involved in incident response or read publicly available incident write-ups is aware that threat actors will often compromise user accounts through…
Cyber hygiene: Hackers love a mess Good cyber hygiene isn’t a suggestion—it’s a must. Just like you wouldn’t skip brushing your teeth for weeks (we…
What is credential theft? At its core, credential theft is the unauthorized acquisition of login credentials such as usernames, passwords, or session tokens by a…
In cybersecurity, we talk about attack vectors like they operate in silos—endpoint threats over here, identity-based attacks over there. But the truth is attackers don’t…
Every intrusion that we comb over here at Huntress is different in its own way. Although there are definitely discernible patterns when it comes to…
Special thanks to Craig Sweeney, Hayden Drummond, Michael Tigges, Tanner Filip, Jevon Ang, Jamie Dumas, Stephanie Fairless, and Lindsey Welch for their contributions and support…
A layered security approach isn’t just a nice-to-have—it’s a necessity. Many organizations are adopting “allowlisting” or “zero trust for endpoint” strategies, which, in theory, sound…
As a follow-on to our previous blog post of the same title, sans the “Pt. II,” we wanted to illustrate the myriad of techniques behind…