What Is Business Email Compromise? BEC Defined
Business email compromise (BEC) is a phishing scam where threat actors impersonate a trusted source to convince others to give them sensitive information or take…
Business email compromise (BEC) is a phishing scam where threat actors impersonate a trusted source to convince others to give them sensitive information or take…
Something we often hear within the cybersecurity community, and particularly within digital forensics and incident response (DFIR), is that “threat actors are always changing their…
TL;DR: While reports have indicated the latest version of Samsung MagicINFO 9 Server fixes a high-severity flaw (CVE-2024-7399), Huntress has independently verified that the latest…
Whether responding to incidents or hunting through large and complex data sets, IP addresses usually feature fairly heavily as a key analysis data point. When…
Whether responding to incidents or hunting through large and complex data sets, IP addresses usually feature fairly heavily as a key analysis data point. When…
This week, Huntress observed limited exploitation activity involving the Samsung MagicINFO 9 Server, a content management system used for digital signage displays. As we outlined…
Ransomware actors have one primary goal—bringing in money. But the way that they do it varies from attack to attack. Before they actually trigger the…
At Huntress, we’re obsessed with giving businesses the tools to outsmart hackers. Our Managed Endpoint Detection and Response (EDR) platform combines cutting-edge technology with 24/7…
At Huntress, we’re obsessed with giving businesses the tools to outsmart hackers. Our Managed Endpoint Detection and Response (EDR) platform combines cutting-edge technology with 24/7…
No endpoints are immune from the threat of ransomware anymore, from businesses on shoestring security budgets to behemoth government agencies wrapped in layers of security…
Cybersecurity has hit a turning point—and it’s centered on identity. The Huntress 2025 Managed ITDR Report makes one thing painfully clear: identity isn’t just an…
It’s a usual Tuesday morning, maybe you’re sipping some coffee or tea, when you get lit up with alerts. Systems go down. Your internal comms…