Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.
Get Feederhuntress.com
Get the latest updates from Huntress Blog directly as they happen.
Follow now 133 followers
Last updated 3 days ago
3 days ago
See how Huntress EDR/ITDR Correlations stop infostealer-driven attacks before stolen credentials can...
8 days ago
The threat landscape has shifted. Here's what cybersecurity leaders need to know...
8 days ago
A developer used OpenAI’s Codex to handle suspicious activity, leading to unexpected...
9 days ago
A few weeks after the major axios npm supply chain attack, a...
10 days ago
Huntress observed in-the-wild use of Nightmare-Eclipse tooling, including BlueHammer, RedSun, and UnDefend...
13 days ago
The Huntress SOC has seen a recent uptick in incidents involving compromised...
13 days ago
A Linux user recently tried to respond to potentially malicious behavior on...
13 days ago
VPN misconfiguration is behind 70% of intrusions. See real Huntress SOC incidents...
16 days ago
Huntress uncovered a malware operation using signed PUP to deploy AV killers...
17 days ago
Security programs are failing against modern identity threats. See new Huntress data...
20 days ago
Don’t forget to secure your side doors. Attackers look for the systems...