Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

huntress.com

Huntress Blog

Get the latest updates from Huntress Blog directly as they happen.

Follow now 133 followers

Latest posts

Last updated 3 days ago

Unified EDR + ITDR: Closing the Identity Gap Before Attacks Spread

3 days ago

See how Huntress EDR/ITDR Correlations stop infostealer-driven attacks before stolen credentials can...

What Cybersecurity Leaders Must Prioritize in 2026

8 days ago

The threat landscape has shifted. Here's what cybersecurity leaders need to know...

Untangling a Linux Incident With an OpenAI Twist (Part 2)

8 days ago

A developer used OpenAI’s Codex to handle suspicious activity, leading to unexpected...

Tradecraft Tuesday Recap: axios npm Supply Chain Compromise

9 days ago

A few weeks after the major axios npm supply chain attack, a...

Nightmare-Eclipse Tooling Seen in Real-World Intrusion

10 days ago

Huntress observed in-the-wild use of Nightmare-Eclipse tooling, including BlueHammer, RedSun, and UnDefend...

Uptick in Bomgar RMM Exploitation

13 days ago

The Huntress SOC has seen a recent uptick in incidents involving compromised...

Untangling a Linux Incident With an OpenAI Twist

13 days ago

A Linux user recently tried to respond to potentially malicious behavior on...

Attackers Love Your VPN To-Do List

13 days ago

VPN misconfiguration is behind 70% of intrusions. See real Huntress SOC incidents...

When PUPs Grow Fangs: Dragon Boss Solutions' $10 Supply Chain Risk

16 days ago

Huntress uncovered a malware operation using signed PUP to deploy AV killers...

Your Security Program Was Built for a Threat Landscape That No Longer Exists

17 days ago

Security programs are failing against modern identity threats. See new Huntress data...

Your Staging Site Is More Important than You Think

20 days ago

Don’t forget to secure your side doors. Attackers look for the systems...