Dispelling Ransomware Deployment Myths | Huntress
When a ransomware attack occurs, the focus is most often on the encryption of files. Initial access is often glossed over or simply assumed. In…
When a ransomware attack occurs, the focus is most often on the encryption of files. Initial access is often glossed over or simply assumed. In…
Another year and yet another RSAC Conference looms. While there are a few invite-only events on Sunday, this year’s conference starts in earnest on Monday,…
Key Takeaways AI security demands a paradigm shift, treating models, endpoints, and integrations as dynamic attack surfaces requiring continuous governance. Inventory-driven visibility is foundational to…
We’ve all seen threat reports and intrusion write-ups that look deeply polished, with a cohesive timeline that highlights incredible telemetry and analysis skills. Cool diagrams…
A big part of a security analyst’s everyday role is figuring out what actually happened during an incident. We can do that by piecing together…
What we built Our team at DEFCERT collaborated with the team at Huntress to build resources that partners and “Organizations Seeking Assessment” (OSAs) can use…
Imagine this: you’re a hacker, and you’re working through an executable file made up of a compiled AutoIT script. You’ve decompiled the script (thanks to…
When it comes to cybersecurity, there will never be a silver bullet, but multi-factor authentication (MFA) might be one of the closest contenders for that…
As a managed endpoint detection and response (EDR) company, we see attacks hitting all kinds of sectors. But cyberattacks hitting the education sector can be…
Big news! Huntress products are now available on the Microsoft Marketplace. Whether you’re looking to level up endpoint security, increase identity resilience, or just simplify how…
Identity-based cyberattacks are becoming more pervasive, leaving businesses grappling with increasingly sophisticated threats. With 40% of security incidents now connected to identity vulnerabilities, organizations are…
Acknowledgments: Special thanks to Ben Folland for his contributions to this investigation and writeup. In November, Huntress analysts detected an incident where threat actors likely…