Glitch effectGlitch effectGlitch effect

Threat Analysis

Glitch effectGlitch effectGlitch effect
Teal gradient

Hunting for M365 Password Spraying

Anton Ovrutsky
Faith Stratton
October 3, 2024
Hunting for M365 Password Spraying

Akira Ransomware Indicators

Harlan Carvey
September 20, 2024
Akira Ransomware Indicators

ReadText34 Ransomware Incident

Harlan Carvey
September 19, 2024
ReadText34 Ransomware Incident

Advanced Persistent Threat Targeting Vietnamese Human Rights Defenders

Jai Minton
Craig Sweeney
August 28, 2024
Advanced Persistent Threat Targeting Vietnamese Human Rights Defenders

When Trust Becomes a Trap: How Huntress Foiled a Medical Software Update Hack

Team Huntress
July 23, 2024
When Trust Becomes a Trap: How Huntress Foiled a Medical Software Update Hack

Fake Browser Updates Lead to BOINC Volunteer Computing Software

Matt Anderson
Alden Schmidt
Greg Linares
July 17, 2024
Fake Browser Updates Lead to BOINC Volunteer Computing Software

Healthcare in the Crosshairs: Insights from Our 2024 Cyber Threat Report

Team Huntress
June 6, 2024
Healthcare in the Crosshairs: Insights from Our 2024 Cyber Threat Report

Attack Behaviors

Harlan Carvey
May 30, 2024
Attack Behaviors

Smuggler’s Gambit: Uncovering HTML Smuggling Adversary in the Middle Tradecraft

Matt Kiely
May 23, 2024
Smuggler’s Gambit: Uncovering HTML Smuggling Adversary in the Middle Tradecraft

LOLBin to INC Ransomware

Harlan Carvey
May 1, 2024
LOLBin to INC Ransomware

LightSpy Malware Variant Targeting macOS

Stuart Ashenbrenner
Alden Schmidt
April 25, 2024
LightSpy Malware Variant Targeting macOS

Analyzing a Malicious Advanced IP Scanner Google Ad Redirection

Izzy Spering
April 1, 2024
Analyzing a Malicious Advanced IP Scanner Google Ad Redirection

MSSQL to ScreenConnect

Jai Minton
Harlan Carvey
March 28, 2024
MSSQL to ScreenConnect

Managing Attack Surface

Harlan Carvey
March 20, 2024
Managing Attack Surface

Using Backup Utilities for Data Exfiltration

Faith Stratton
Harlan Carvey
March 13, 2024
Using Backup Utilities for Data Exfiltration
Browse Categories
+ View All
Sign Up for Blog Updates
Subscribe today and you’ll be the first to know when new content hits the blog.
Add Cyber Experts to Your Arsenal
See how the global Huntress SOC can augment your teamwith 24/7 coverage and unmatched human expertise.Start your free trial today.
Share
Huntress News
Huntress News
Cybersecurity Education
Cybersecurity Education
Cybersecurity Trends
Cybersecurity Trends
Business Growth
Business Growth
Response to Incidents
Response to Incidents
Threat Analysis
Threat Analysis