When a mass-isolation event hit, Key Methods realized they were flying blind. See how Huntress Managed SIEM gave them the visibility they needed.
Principal Security Researcher, turning cyber criminals into examples. The Blue Teamer's Red Teamer. Successfully hiked 2,200 miles of the Appalachian Trail. Former Staff @ MIT LL.
Never Just One Termite: Six Months of Researching OAuth Application Attacks
Oh, Auth 2.0! Device Code Phishing in Google Cloud and Azure
Mommy, Does Santa Like NordVPN?
To MFA or Not to MFA: How Multi-Factor Authentication Saves the SMB
Turning TTPs into CTF Challenges: Huntress CTF 2024 Retro
Unmasking the Central Villain: Inside Adversary-in-the-Middle Attacks
Smuggler’s Gambit: Uncovering HTML Smuggling Adversary in the Middle Tradecraft
RATs! Remote Management Software from the Hacker’s Perspective
Combating Emerging Microsoft 365 Tradecraft: Initial Access
The Hackers in the Arena: The Huntress CTF Retrospective