huntress logo
Glitch effectGlitch effectGlitch effect

Threat Analysis

Dive in and nerd out with us on current and emerging cybersecurity threats. We cover attack vectors, threat actors, and new vulnerabilities, providing insights to help you understand and counteract these risks.

Glitch effectGlitch effectGlitch effect
Teal gradient
Threat Analysis
Threat Analysis

Getting to the Crux (Ransomware) of the Matter

Huntress Adversary Tactics
Jul 18, 2025
Getting to the Crux (Ransomware) of the Matter
Threat Analysis
Threat Analysis

RMMs: A Gateway for Bulk Attacks on MSP Customers, Pt. II

Huntress Adversary Tactics
Jul 17, 2025
RMMs: A Gateway for Bulk Attacks on MSP Customers, Pt. II
Threat Analysis
Threat Analysis

Wing FTP Server Remote Code Execution (CVE-2025-47812) Exploited in the Wild

John Hammond
Jamie Levy
Lindsey O'Donnell-Welch
Michael Tigges
Jul 10, 2025
Wing FTP Server Remote Code Execution (CVE-2025-47812) Exploited in the Wild
Threat Analysis
Threat Analysis

RMMs: A Gateway for Bulk Attacks on MSP Customers, Pt. I

Huntress Adversary Tactics
Jul 2, 2025
RMMs: A Gateway for Bulk Attacks on MSP Customers, Pt. I
Threat Analysis
Threat Analysis

Recutting the Kerberos Diamond Ticket

Andrew Schwartz
Jun 25, 2025
Recutting the Kerberos Diamond Ticket
Threat Analysis
Threat Analysis

Feeling Blue(Noroff): Inside a Sophisticated DPRK Web3 Intrusion

Alden Schmidt
Stuart Ashenbrenner
Jonathan Semon
Jun 18, 2025
Feeling Blue(Noroff): Inside a Sophisticated DPRK Web3 Intrusion
Threat Analysis
Threat Analysis

“Advanced” Intrusion Targeting Executive at Critical Marketing Research Company

Craig Sweeney
May 27, 2025
“Advanced” Intrusion Targeting Executive at Critical Marketing Research Company
Threat Analysis
Threat Analysis

defendnot? Defend YES! Detecting Malicious Security Product Bypass Techniques

Andrew Schwartz
Matt Anderson
Tyler Bohlmann
Anton Ovrutsky
Greg Ake
May 23, 2025
defendnot? Defend YES! Detecting Malicious Security Product Bypass Techniques
Threat Analysis
Threat Analysis

The Case For SigParser

Matt Kiely
May 22, 2025
The Case For SigParser
Threat Analysis
Threat Analysis

Utilizing ASNs for Hunting & Response

Anton Ovrutsky
Dray Agha
Josh Allman
May 8, 2025
Utilizing ASNs for Hunting & Response
Threat Analysis
Threat Analysis

Do Tigers Really Change Their Stripes?

Huntress Adversary Tactics
May 6, 2025
Do Tigers Really Change Their Stripes?
Response to Incidents
Response to Incidents
Threat Analysis
Threat Analysis

SlashAndGrab: The ConnectWise ScreenConnect Vulnerability Explained

Team Huntress
Feb 14, 2025
SlashAndGrab: The ConnectWise ScreenConnect Vulnerability Explained
Threat Analysis
Threat Analysis

The Hunt for RedCurl

Greg Linares
Matt Anderson
Alden Schmidt
Jan 9, 2025
The Hunt for RedCurl
Threat Analysis
Threat Analysis

Know Thy Enemy: A Novel November Case on Persistent Remote Access

Faith Stratton
Josh Allman
Nov 25, 2024
Know Thy Enemy: A Novel November Case on Persistent Remote Access
Threat Analysis
Threat Analysis

You Can Run, but You Can’t Hide: Defender Exclusions

Jonathan Johnson
Nov 21, 2024
You Can Run, but You Can’t Hide: Defender Exclusions
Sign Up for Huntress Updates
Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
By submitting this form, you accept our Terms of Service & Privacy Policy
Oops! Something went wrong while submitting the form.
Add Cyber Experts to Your Arsenal
See how the global Huntress SOC can augment your team with 24/7 coverage and unmatched human expertise. Start your free trial today.
Share