Huntress for CMMC Compliance | Huntress
TL;DR: Visit huntress.com/cmmc for the latest information on how Huntress helps support our customers and partners on their CMMC journey In our Huntress Hub, you’ll find…
TL;DR: Visit huntress.com/cmmc for the latest information on how Huntress helps support our customers and partners on their CMMC journey In our Huntress Hub, you’ll find…
Huntress analysts recently observed an incident where a newer ransomware variant, KawaLocker (also known as KAWA4096) ransomware, was deployed. It’s not unusual for new ransomware…
Huntress frequently sees data staging and exfiltration activity, particularly with ransomware threat actors. These threat actors will collect, stage, and exfiltrate data prior to file…
In mid-August, we came across a ransomware variant called Cephalus in two separate incidents. Recently, we’ve seen a slew of newer ransomware families (like Crux…
Welcome to the dark web. Maybe you’re a threat actor looking to cash in on the latest data swiped in a breach. Maybe you’re a…
ClickFix attacks have been ticking up for over a year now, as attackers find success in tricking users into executing malicious code on their computers…
When it comes to identity security in Microsoft 365, the forecast is often cloudy, especially when some vendors lean into half-truths or conveniently cropped facts…
On 29 August 2025, Huntress analysts encountered a previously unseen ransomware variant called “Obscura.” This name was taken from the ransom note (README_Obscura.txt), which also…
Many common passwords can take a threat actor only minutes or even seconds to hack. That’s why having multiple layers of protection, including a strong…
Many common passwords can take a threat actor only minutes or even seconds to hack. That’s why having multiple layers of protection, including a strong…
Quick answer: Single sign-on, or SSO, is a user authentication method that lets an individual sign in to a single account and get access across…
Figure 8: Threat actor starts to rely on automated workflows The threat actor also appeared to be interested in other AI tools to help with…