Huntress Blog

Welcome to the Huntress Cybersecurity Blog, your go-to spot for staying ahead of hackers and boosting your cybersecurity savviness. Our blog contributors have focused on making cybersecurity education engaging and accessible for everyone.

AMOS Stealer Exploits AI Trust: Malware Delivered Through ChatGPT and Grok

Dec 9, 2025
Categories
Down arrow
Search
The Great VM Escape: ESXi Exploitation in the Wild

The Great VM Escape: ESXi Exploitation in the Wild

From Code to Coverage (Part 2): The Whitespace Nightmare: Writing Sigma Rules That Actually Match

From Code to Coverage (Part 2): The Whitespace Nightmare: Writing Sigma Rules That Actually Match

December 30, 2025
The Threats Security Pros Are Now Explaining at the Holiday Dinner Table

The Threats Security Pros Are Now Explaining at the Holiday Dinner Table

December 23, 2025
What Rising Supply Chain Attacks Mean for Cybersecurity Ecosystems

What Rising Supply Chain Attacks Mean for Cybersecurity Ecosystems

December 23, 2025
Trial, Error, and Typos: Why Some Malware Attacks Aren't as 'Sophisticated' as You Think

Trial, Error, and Typos: Why Some Malware Attacks Aren't as 'Sophisticated' as You Think

Securing Your Business: The Vital Role of Cyber Insurance

Securing Your Business: The Vital Role of Cyber Insurance

December 19, 2025
Active Exploitation of Gladinet CentreStack/Triofox Insecure Cryptography Vulnerability

Active Exploitation of Gladinet CentreStack/Triofox Insecure Cryptography Vulnerability

December 18, 2025
From Code to Coverage (Part 1): The OID Transformation That Hinders LDAP Detection

From Code to Coverage (Part 1): The OID Transformation That Hinders LDAP Detection

December 16, 2025
CMMC: The Opportunity ($$) and Challenge for MSPs

CMMC: The Opportunity ($$) and Challenge for MSPs

December 10, 2025
AMOS Stealer Exploits AI Trust: Malware Delivered Through ChatGPT and Grok

AMOS Stealer Exploits AI Trust: Malware Delivered Through ChatGPT and Grok

An Expert’s Review of Huntress Managed SAT

An Expert’s Review of Huntress Managed SAT

December 9, 2025
Hardening the Hypervisor: Practical Defenses Against Ransomware Targeting ESXi

Hardening the Hypervisor: Practical Defenses Against Ransomware Targeting ESXi