What Cybersecurity Leaders Must Prioritize in 2026
The challenges of 2025, tight budgets, rising AI anxiety, and increasingly organized cybercrime, didn’t go away. They matured. The threat landscape of 2026 is sharper,…
The challenges of 2025, tight budgets, rising AI anxiety, and increasingly organized cybercrime, didn’t go away. They matured. The threat landscape of 2026 is sharper,…
There was once honor among thieves. When it came to cyber threats, hackers considered the healthcare industry as the “untouchable” sector, shielded by an unspoken…
In a world of many noisy tools, Huntress has always been mindful of how real people are fighting against cyberattacks every day. Our goal is…
In today’s world, IT operations are becoming more and more decentralized. And this shift makes things particularly complicated for those in the healthcare sector, like…
Apple’s commitment to user privacy is well known. One of the key components of their privacy controls is the Transparency Consent and Control (TCC) framework.…
Highlights from March Coming in at number 1 on this month’s top 10 most prevalent threat list is activity related to March 2026’s axios npm…
Key Takeaways RedSun is a critical zero-day vulnerability in Microsoft Defender that allows low-privileged users to gain SYSTEM access No patch is currently available, leaving…
Huntress SOC analysts recently alerted customers regarding two disparate endpoints identified as being minimally impacted by ransomware; that is, only a limited number of ransomware…
Key Takeaways We recently discovered an exposed server that was used for multi-victim exploitation, staging, review, and validation. Claude Code and OpenClaw were used as…
If you missed Tradecraft Tuesday on January 9, you missed out on a banger episode! The tl;dr on what we covered is: RMMs and command…
Acknowledgments: Special thanks to Luke Wilkinson, Joshua Kiriakoff, and Jordan Sexton for their contributions to this investigation and writeup. TL;DR: Huntress has observed threat actors…
Password security is the first defense against cyber threats, and with billions of credentials stolen each year, it’s important to practice good password hygiene. If…