Identity Threats Got a Whole Lot Nastier, But So Did We
If identity is the new perimeter, most businesses defend it with a cardboard shield and a prayer. Maybe a mouse is there, too. Over the…
If identity is the new perimeter, most businesses defend it with a cardboard shield and a prayer. Maybe a mouse is there, too. Over the…
Interest in security information and event management (SIEM) has increased over the years because it can do three things that IT and security teams desperately…
Business email compromise (BEC) is a phishing scam where threat actors impersonate a trusted source to convince others to give them sensitive information or take…
Business email compromise (BEC) is a phishing scam where threat actors impersonate a trusted source to convince others to give them sensitive information or take…
Something we often hear within the cybersecurity community, and particularly within digital forensics and incident response (DFIR), is that “threat actors are always changing their…
TL;DR: While reports have indicated the latest version of Samsung MagicINFO 9 Server fixes a high-severity flaw (CVE-2024-7399), Huntress has independently verified that the latest…
Whether responding to incidents or hunting through large and complex data sets, IP addresses usually feature fairly heavily as a key analysis data point. When…
Whether responding to incidents or hunting through large and complex data sets, IP addresses usually feature fairly heavily as a key analysis data point. When…
This week, Huntress observed limited exploitation activity involving the Samsung MagicINFO 9 Server, a content management system used for digital signage displays. As we outlined…
Ransomware actors have one primary goal—bringing in money. But the way that they do it varies from attack to attack. Before they actually trigger the…
At Huntress, we’re obsessed with giving businesses the tools to outsmart hackers. Our Managed Endpoint Detection and Response (EDR) platform combines cutting-edge technology with 24/7…
At Huntress, we’re obsessed with giving businesses the tools to outsmart hackers. Our Managed Endpoint Detection and Response (EDR) platform combines cutting-edge technology with 24/7…