Glitch effect

Huntress Resource Center

Welcome to your go-to destination for cybersecurity resources and education. Dig in and find a range of materials made to empower users of all levels with the knowledge and tools to defend against evolving cyber threats.

Huntress social logo
Featured |
Report

Huntress 2025 Cyber Threat Report

Report
February 11, 2025
Huntress 2025 Cyber Threat Report
Glitch effectBlue ellipse
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Glitch effect
Teal gradient Glitch effect
Showing
Showing
of
Showing
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Huntress social logo
Video

ITDR Product Overview

Video
March 19, 2025

Hackers are targeting user identities more aggressively than ever, using session hijacking, credential abuse, stolen tokens, business email compromise, and rogue applications to infiltrate organizations. Traditional monitoring isn’t enough - you need real-time detection and rapid response. Powered by our 24/7 Security Operations Center (SOC), Huntress Managed ITDR goes beyond alerts, identifying and stopping identity-based threats in Microsoft 365 before they spread.

Text Link
Huntress social logo
Datasheet

Managed ITDR Datasheet

Datasheet
March 19, 2025

Let’s face it: a username and password shouldn’t be all that stands between hackers and your business-critical assets. But with organizations using Microsoft 365 more than ever, that’s exactly the risk you’re running. Hackers aren’t knocking on your door - they’re walking straight in. A stolen session renders multi-factor authentication and conditional access useless. Identity-focused threats like account takeovers (ATO) and business email compromise (BEC) are running rampant, costing businesses over $2.9 billion in losses last year alone.

It’s time for an identity security solution that doesn’t just check boxes - it fights back. Learn more about Huntress Managed ITDR in this datasheet.

Text Link
Huntress social logo
On-Demand Webinar

From Curricula to Huntress: The Past, Present, and Future of Managed SAT

On-Demand Webinar
March 18, 2025

Now, it’s time to roll out the red carpet. Join us for an exclusive webinar where we’ll showcase all the game-changing features we’ve launched and give you a sneak peek at what’s next. This is your chance to ask the questions you’ve been holding on to, snag valuable pro tips, and discover how Huntress is shaping the tools you need to stay ahead of threats.

Here’s the game plan:

  • The Past: A quick look down memory lane to see how Curricula morphed into Huntress Managed SAT, with some of the same faces you know and love.
  • The Present: Unleash the full potential of your Managed SAT. Let’s show you how to use our best features to amp up your security game.
  • The Future: Look into our crystal ball for a preview of the exciting Huntress horizon.
  • The Cherry on Top: Hear from someone who’s been in your shoes! Larry Kinkaid from BARR Advisory, a long-time Curricula partner, joins us to share his insights and experiences.
Text Link
Huntress social logo
On-Demand Webinar

Cybersecurity as Patient Care: Protecting Health in the Digital Age

On-Demand Webinar
March 13, 2025

You’ll learn:

  • How to prevent patient info breaches 
  • How to use cybersecurity as patient care 
  • How to lock down your environment’s vulnerabilities
Text Link
Huntress social logo
Video

Lifecycle of an Incident - Evilginx

Video
March 13, 2025

Evilginx is a powerful adversary-in-the-middle (AiTM) attack that lets threat actors bypass MFA and hijack user identities. With just a single command, attackers can clone legitimate login pages, steal session tokens, and gain full access—no passwords or MFA codes required. But with Huntress Managed ITDR (Identity Threat Detection and Response), we fight back. Our SOC swiftly detects and shuts down these attacks in Microsoft 365, revoking stolen sessions and locking out threat actors before they can cause damage.

Text Link
Huntress social logo
On-Demand Webinar

Phishing Defense Coaching: From Compromise to Crushing It

On-Demand Webinar
March 6, 2025

Phishing happens, and it’s not a matter of “if,” it’s “when.” And when the fun ends, the work lands on you, usually on your weekend. But these slip-ups can actually be goldmines for learning. With the right recovery training, you flip the script on phishing recovery training.

Here’s what makes Huntress different and why you’ll want to watch:

  • Fake CAPTCHA Lure Demo: We are pulling back the curtain on our latest phishing scheme—one so clever, even savvy users won’t know what phished them.
  • Phishing Defense Coaching: Clicked the link? Made a mistake? No shame. We’re humans, not bots. We are here to help educate and rewrite user behavior.
  • Redefining Recovery Training: Boredom is the real enemy. Our approach hooks learners with hands-on, impactful lessons that actually stick.

Intrigued? Maybe just a little scared? Good. Check out the On-Demand Webinar.

Text Link
Huntress social logo
On-Demand Webinar

Breaking Down the Huntress 2025 Cyber Threat Report (APAC)

On-Demand Webinar
March 5, 2025

Text Link
Huntress social logo
On-Demand Webinar

Breaking Down the Huntress 2025 Cyber Threat Report

On-Demand Webinar
March 3, 2025

The Huntress 2025 Cyber Threat Report analyzes the key adversarial behaviors, techniques, and trends we saw in 2024, focusing on the threats that non-enterprise businesses and MSPs need to be aware of.

Join us for an in-depth webinar where you’ll learn about:

  • The state of today’s threat landscape
  • Ransomware’s new adversary groups and tactics
  • New hacker tools and techniques 
  • How threats target different industries

Text Link
Huntress social logo
Datasheet

Top 5 Identity Threats You Can’t Afford to Ignore

Datasheet
February 26, 2025

Huntress Managed ITDR is designed to lock down identities and stop attackers in their tracks.

Text Link
Huntress social logo
On-Demand Webinar

Lateral Movement to Credential Theft: How Endpoint and Identities are Interconnected

On-Demand Webinar
February 25, 2025

Are these endpoint or identity attacks? Or are they both?

Untangling endpoint attacks from identity breaches isn’t always simple: as attackers pivot from targeting devices to exploiting the identities driving your business, understanding how the two are interconnected is non-negotiable. 

That’s why you’re invited to join our webinar, where you’ll learn about:

  • The endpoint and identity attack surfaces: what they are, their unique risks, and why they matter
  • Real-world tradecraft used to exploit endpoints and identities
  • Why pairing endpoint and identity protection is critical for a rock-solid security posture

Text Link
Huntress social logo
Datasheet

Huntress + Microsoft: Better Together

Datasheet
February 20, 2025
Text Link
Huntress social logo
On-Demand Webinar

The Huntress Product Showcase: Q1 2025 (APAC)

On-Demand Webinar
February 18, 2025

Fully managed Huntress products we’ll cover include:

  • Huntress Managed EDR
  • Huntress Managed ITDR
  • Huntress Managed Security Awareness Training (SAT) 
  • Huntress Managed SIEM—our newest release
Text Link
Huntress social logo
Datasheet

Your Business Needs Expert-Level Endpoint Protection

Datasheet
February 12, 2025
Text Link
Huntress social logo
Report

Huntress 2025 Cyber Threat Report

Report
February 11, 2025

Get details on the cyberattacks we saw most last year, learn key industry insights, and build strategies to outsmart the most malicious hackers. It's all in the Huntress 2025 Cyber Threat Report, and it's more than just a recap of last year's cyberattacks. It's packed with real-world tactics to stay ahead of hackers.

Here's a glimpse of what's inside


The top cyber threats of 2024

Infostealers thrived, accounting for a staggering 24% of incidents. Right behind them were malicious scripts at 22%, mainly due to their ability to dodge detection and automate attacks.




Healthcare and education are preferred targets.

These industries faced the brunt of attacks, accounting for 38% of all incidents.
Add tech, manufacturing, and government as well, and that’s another 32% of cyberattacks aimed at our most important sectors.



And that’s only the beginning. Download the 2025 Cyber Threat Report now and arm yourself with the knowledge to defend against whatever 2025 throws your way.

Text Link
Huntress social logo
On-Demand Webinar

Battling Business Email Compromise

On-Demand Webinar
February 3, 2025

Mesh will cover techniques for detecting, blocking, and deleting impersonation emails, and we’ll go over the ways to detect compromised Microsoft 365 accounts before they do any damage. Plus, we’ll be getting into the details of all the ways payment redirection scams can play out.

Sound like a good time? Watch now.

Text Link
Healthcare
Healthcare
Security Awareness Training
Security Awareness Training
Threat Detection
Threat Detection
Selling Cybersecurity
Selling Cybersecurity
Ransomware
Ransomware
Phishing
Phishing
Persistence
Persistence
Mastering Cybersecurity
Mastering Cybersecurity
Incident Response
Incident Response
Endpoint Detection and Response
Endpoint Detection and Response
Cyber Hygiene
Cyber Hygiene
Business Email Compromise
Business Email Compromise
Attacker Tradecraft
Attacker Tradecraft
Neighborhood Watch
Neighborhood Watch
No items found.
Glitch effect

See Huntress in Action

Book a personalized demo to look at Huntress under the hood, explore the dashboard, and ask questions to our experts.

Book A Demo
Huntress SOC