huntress logo
Glitch effectGlitch effectGlitch effect

Threat Analysis

Dive in and nerd out with us on current and emerging cybersecurity threats. We cover attack vectors, threat actors, and new vulnerabilities, providing insights to help you understand and counteract these risks.

Glitch effectGlitch effectGlitch effect
Teal gradient
Threat Analysis
Threat Analysis

The ClickFix Attack That Wasn’t: From a Fake AnyDesk Installer to MetaStealer

John Hammond
Alden Schmidt
Lindsey O'Donnell-Welch
Aug 29, 2025
The ClickFix Attack That Wasn’t: From a Fake AnyDesk Installer to MetaStealer
Threat Analysis
Threat Analysis

Cephalus Ransomware: Don’t Lose Your Head

Harlan Carvey
Lindsey O'Donnell-Welch
Aug 21, 2025
Cephalus Ransomware: Don’t Lose Your Head
Threat Analysis
Threat Analysis

Exposing Data Exfil: LOLBins, TTPs, and Binaries…Oh, My!

Harlan Carvey
Lindsey O'Donnell-Welch
Aug 19, 2025
Exposing Data Exfil: LOLBins, TTPs, and Binaries…Oh, My!
Threat Analysis
Threat Analysis

Kawabunga, Dude, You’ve Been Ransomed!

Harlan Carvey
Lindsey O'Donnell-Welch
Aug 14, 2025
Kawabunga, Dude, You’ve Been Ransomed!
Threat Analysis
Threat Analysis

The Commented Kill Chain: Why Old Ransomware Playbooks Never Die

Matt Anderson
Dray Agha
Jul 31, 2025
The Commented Kill Chain: Why Old Ransomware Playbooks Never Die
Threat Analysis
Threat Analysis

Getting to the Crux (Ransomware) of the Matter

Huntress Adversary Tactics
Jul 18, 2025
Getting to the Crux (Ransomware) of the Matter
Threat Analysis
Threat Analysis

RMMs: A Gateway for Bulk Attacks on MSP Customers, Pt. II

Huntress Adversary Tactics
Jul 17, 2025
RMMs: A Gateway for Bulk Attacks on MSP Customers, Pt. II
Threat Analysis
Threat Analysis

Wing FTP Server Remote Code Execution (CVE-2025-47812) Exploited in the Wild

John Hammond
Jamie Levy
Lindsey O'Donnell-Welch
Michael Tigges
Jul 10, 2025
Wing FTP Server Remote Code Execution (CVE-2025-47812) Exploited in the Wild
Threat Analysis
Threat Analysis

RMMs: A Gateway for Bulk Attacks on MSP Customers, Pt. I

Huntress Adversary Tactics
Jul 2, 2025
RMMs: A Gateway for Bulk Attacks on MSP Customers, Pt. I
Threat Analysis
Threat Analysis

Recutting the Kerberos Diamond Ticket

Andrew Schwartz
Jun 25, 2025
Recutting the Kerberos Diamond Ticket
Threat Analysis
Threat Analysis

Feeling Blue(Noroff): Inside a Sophisticated DPRK Web3 Intrusion

Alden Schmidt
Stuart Ashenbrenner
Jonathan Semon
Jun 18, 2025
Feeling Blue(Noroff): Inside a Sophisticated DPRK Web3 Intrusion
Threat Analysis
Threat Analysis

“Advanced” Intrusion Targeting Executive at Critical Marketing Research Company

Craig Sweeney
May 27, 2025
“Advanced” Intrusion Targeting Executive at Critical Marketing Research Company
Threat Analysis
Threat Analysis

defendnot? Defend YES! Detecting Malicious Security Product Bypass Techniques

Andrew Schwartz
Matt Anderson
Tyler Bohlmann
Anton Ovrutsky
Greg Ake
May 23, 2025
defendnot? Defend YES! Detecting Malicious Security Product Bypass Techniques
Threat Analysis
Threat Analysis

The Case For SigParser

Matt Kiely
May 22, 2025
The Case For SigParser
Threat Analysis
Threat Analysis

Utilizing ASNs for Hunting & Response

Anton Ovrutsky
Dray Agha
Josh Allman
May 8, 2025
Utilizing ASNs for Hunting & Response
Sign Up for Huntress Updates
Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
By submitting this form, you accept our Terms of Service & Privacy Policy
Oops! Something went wrong while submitting the form.
Add Cyber Experts to Your Arsenal
See how the global Huntress SOC can augment your team with 24/7 coverage and unmatched human expertise. Start your free trial today.
Share