The Three-Finger Test | Huntress
Three fingers. That’s not just a perfect volume for a glass of scotch, it’s also all it took to expose a deepfake. Jim Browning is…
Three fingers. That’s not just a perfect volume for a glass of scotch, it’s also all it took to expose a deepfake. Jim Browning is…
Acknowledgements: Special thanks to the Huntress Adversary Tactics and Product teams for their work building out identity telemetry, Rogue Applications, and SIEM detections that made…
Our industry has a ransomware actor categorization problem. News articles will frequently feature splashy headlines like “Akira ransomware group targets critical infrastructure.” However, the reality…
Key Takeaways Identity and permissions now determine what is reachable, making them the primary drivers of cloud risk. Runtime exposure, not individual findings, determines how…
Cybercriminals are constantly refining their tactics and attack methodologies. With growing threats like session hijacking and credential theft, these aren’t just buzzwords—they’re real threats that…
Phishing continues to be a hot-button issue and a prevalent worry for many, so let’s keep this conversation alive. In a recent installment of Tradecraft…
The Origin Story This is a hero’s journey, just not the kind you think. No caped crusaders or radioactive spiders here. It’s about a real-life…
Exploitation has been observed for CVE-2026-35616, a critical improper access control zero-day vulnerability affecting Fortinet FortiClientEMS devices. Key takeaways: CVE-2026-35616, an improper access control vulnerability,…
When it comes to getting your security right, you shouldn’t have to go about it alone. It can take way more time and resources than…
Let’s talk about something that’s been making waves in everything from passports to smartwatches: biometrics. As of June 2024, 172 out of 195 countries use…
As technology continues to advance at an exponential pace, so does the ever-present threat of cyberattacks. In the digital landscape of 2023, mid-sized businesses find…
On September 14, Huntress discovered an emerging threat involving FOUNDATION Accounting Software, which is commonly used by contractors in the construction industry. Attackers have been…