Get full endpoint visibility, detection, and response
Protect your Microsoft 365 identities and email environments.
Managed threat response and robust compliance support at a predictable price.
Empower your teams with science-back security awareness training.
Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.
Everything you need to keep your patients safe and your organization running smoothly.
Shape the next big thing in cybersecurity together.
Real people. Real perspectives. Better conversations.
No products, no pitches – just tradecraft.
Huntress and DEFCERT partnered to help with CMMC compliance. Use their Shared Responsibility Matrix and operation plans to streamline your Level 2 assessment
Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs
24/7 Security Operations Center
Why businesses of all sizes trust Huntress to defend their assets
Learn directly from our partners how Huntress has helped them
Get in touch with the Huntress Community team
Login to access top-notch marketing resources, tools, and training.
Learn how MSPs can get up to a year of free Huntress licenses with the Neighborhood Watch Program
We're on a mission to shatter the barriers to enterprise-level security.
Explore press releases, news articles, media interviews and more.
Founded by former NSA Cyber Operators. Backed by security researchers.
Ready to shake up the cybersecurity world? Join the hunt.
Principal Security Researcher, turning cyber criminals into examples. The Blue Teamer's Red Teamer. Successfully hiked 2,200 miles of the Appalachian Trail. Former Staff @ MIT LL.
Not Location, Not Tunnel, but a Secret Third Thing: Datacenter Infrastructure & Identity Attacks
The Case For SigParser
Never Just One Termite: Six Months of Researching OAuth Application Attacks
Oh, Auth 2.0! Device Code Phishing in Google Cloud and Azure
Mommy, Does Santa Like NordVPN?
To MFA or Not to MFA: How Multi-Factor Authentication Saves the SMB
Turning TTPs into CTF Challenges: Huntress CTF 2024 Retro
Unmasking the Central Villain: Inside Adversary-in-the-Middle Attacks
Smuggler’s Gambit: Uncovering HTML Smuggling Adversary in the Middle Tradecraft
RATs! Remote Management Software from the Hacker’s Perspective
Combating Emerging Microsoft 365 Tradecraft: Initial Access
The Hackers in the Arena: The Huntress CTF Retrospective