Glitch effectGlitch effectGlitch effect

Threat Analysis

Dive in and nerd out with us on current and emerging cybersecurity threats. We cover attack vectors, threat actors, and new vulnerabilities, providing insights to help you understand and counteract these risks.

Glitch effectGlitch effectGlitch effect
Teal gradient
Threat Analysis
Threat Analysis

The Crown Prince, Nezha: A New Tool Favored by China-Nexus Threat Actors

Jai Minton
James Northey
Alden Schmidt
Oct 8, 2025
The Crown Prince, Nezha: A New Tool Favored by China-Nexus Threat Actors
Threat Analysis
Threat Analysis

Don’t Sweat the *Fix Techniques

Tyler Bohlmann
Sep 29, 2025
Don’t Sweat the *Fix Techniques
Threat Analysis
Threat Analysis

From Custom Scripts to Commodity RATs: A Threat Actor’s Evolution to PureRAT

James Northey
Sep 25, 2025
From Custom Scripts to Commodity RATs: A Threat Actor’s Evolution to PureRAT
Threat Analysis
Threat Analysis

Huntress Threat Advisory: The Dangers of Storing Unencrypted Passwords

Michael Elford
Chad Hudson
Sep 15, 2025
Huntress Threat Advisory: The Dangers of Storing Unencrypted Passwords
Threat Analysis
Threat Analysis

How an Attacker’s Blunder Gave Us a Rare Look Inside Their Day-to-Day Operations

Jamie Levy
Lindsey O'Donnell-Welch
Michael Tigges
Sep 9, 2025
How an Attacker’s Blunder Gave Us a Rare Look Inside Their Day-to-Day Operations
Threat Analysis
Threat Analysis

Obscura, an Obscure New Ransomware Variant

Harlan Carvey
Lindsey O'Donnell-Welch
Alden Schmidt
Anna Pham
Sep 2, 2025
Obscura, an Obscure New Ransomware Variant
Threat Analysis
Threat Analysis

The ClickFix Attack That Wasn’t: From a Fake AnyDesk Installer to MetaStealer

John Hammond
Alden Schmidt
Lindsey O'Donnell-Welch
Aug 29, 2025
The ClickFix Attack That Wasn’t: From a Fake AnyDesk Installer to MetaStealer
Threat Analysis
Threat Analysis

Cephalus Ransomware: Don’t Lose Your Head

Harlan Carvey
Lindsey O'Donnell-Welch
Aug 21, 2025
Cephalus Ransomware: Don’t Lose Your Head
Threat Analysis
Threat Analysis

Exposing Data Exfil: LOLBins, TTPs, and Binaries…Oh, My!

Harlan Carvey
Lindsey O'Donnell-Welch
Aug 19, 2025
Exposing Data Exfil: LOLBins, TTPs, and Binaries…Oh, My!
Threat Analysis
Threat Analysis

Kawabunga, Dude, You’ve Been Ransomed!

Harlan Carvey
Lindsey O'Donnell-Welch
Aug 14, 2025
Kawabunga, Dude, You’ve Been Ransomed!
Threat Analysis
Threat Analysis

The Commented Kill Chain: Why Old Ransomware Playbooks Never Die

Matt Anderson
Dray Agha
Jul 31, 2025
The Commented Kill Chain: Why Old Ransomware Playbooks Never Die
Threat Analysis
Threat Analysis

Getting to the Crux (Ransomware) of the Matter

Huntress Adversary Tactics
Jul 18, 2025
Getting to the Crux (Ransomware) of the Matter
Threat Analysis
Threat Analysis

RMMs: A Gateway for Bulk Attacks on MSP Customers, Pt. II

Huntress Adversary Tactics
Jul 17, 2025
RMMs: A Gateway for Bulk Attacks on MSP Customers, Pt. II
Threat Analysis
Threat Analysis

Wing FTP Server Remote Code Execution (CVE-2025-47812) Exploited in the Wild

John Hammond
Jamie Levy
Lindsey O'Donnell-Welch
Michael Tigges
Jul 10, 2025
Wing FTP Server Remote Code Execution (CVE-2025-47812) Exploited in the Wild
Threat Analysis
Threat Analysis

RMMs: A Gateway for Bulk Attacks on MSP Customers, Pt. I

Huntress Adversary Tactics
Jul 2, 2025
RMMs: A Gateway for Bulk Attacks on MSP Customers, Pt. I
Sign Up for Huntress Updates
Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
By submitting this form, you accept our Terms of Service & Privacy Policy
Oops! Something went wrong while submitting the form.
Add Cyber Experts to Your Arsenal
See how the global Huntress SOC can augment your team with 24/7 coverage and unmatched human expertise. Start your free trial today.
Share