Breaking Down Ransomware Attacks | Learn How To Stay Protected
No endpoints are immune from the threat of ransomware anymore, from businesses on shoestring security budgets to behemoth government agencies wrapped in layers of security…
No endpoints are immune from the threat of ransomware anymore, from businesses on shoestring security budgets to behemoth government agencies wrapped in layers of security…
Cybersecurity has hit a turning point—and it’s centered on identity. The Huntress 2025 Managed ITDR Report makes one thing painfully clear: identity isn’t just an…
It’s a usual Tuesday morning, maybe you’re sipping some coffee or tea, when you get lit up with alerts. Systems go down. Your internal comms…
Are you using the same password you came up with on your very first login, however many years ago? You’re not alone. About 23% of…
Figure 11: Sysmon Event ID 10 – Process Access defendnot-loader Figure 12: Sysmon Event ID 10 – Process Access Taskmgr AV evasion registration Register fake…
Every beep, ding, and red flag screams, “You’ve been compromised!” If you’re a security professional drowning in an endless sea of alerts, this probably sounds…
If a threat actor launches a ransomware, extortion, or identity theft attack, the odds are that infostealers—and the credentials they’ve compromised—are behind it. Infostealers have…
Cyberattacks are constantly evolving. Does your security awareness training keep up? Most businesses have some form of security awareness training (SAT), but traditional SAT hasn’t…
As Macs keep growing in popularity with businesses of all types and sizes, they’ve also started catching the eye of hackers. An increased focus by…
Lateral movement is one of the most common attack tactics that attackers use once they’re inside an organization. Leveraging lateral movement techniques allows attackers to…
In 2023, Huntress Managed Endpoint Detection and Response (EDR) conducted an assessment to detect exposed passwords across all of our managed endpoints and found that…
As a TAM (Technical Account Manager), I’m always looking at my partners’ Huntress portals. I look for misconfigurations, opportunities to align settings with best practices,…