Glitch effectGlitch effectGlitch effect

Threat Analysis

Dive in and nerd out with us on current and emerging cybersecurity threats. We cover attack vectors, threat actors, and new vulnerabilities, providing insights to help you understand and counteract these risks.

Glitch effectGlitch effectGlitch effect
Teal gradient

ThreatOps Analysis: Keyed Malware

John Hammond
June 15, 2021
ThreatOps Analysis: Keyed Malware

Recap: Lessons Learned During the Kaseya VSA Supply Chain Attack

Team Huntress
July 28, 2021
Recap: Lessons Learned During the Kaseya VSA Supply Chain Attack

Snakes on a Domain: An Analysis of a Python Malware Loader

Matthew Brennan
August 17, 2021
Snakes on a Domain: An Analysis of a Python Malware Loader

Microsoft Exchange Servers Still Vulnerable to ProxyShell Exploit

John Hammond
August 19, 2021
Microsoft Exchange Servers Still Vulnerable to ProxyShell Exploit

Malware Deep Dive: Investigating a Foothold and Uncovering the Payload

John Ferrell
September 7, 2021
Malware Deep Dive: Investigating a Foothold and Uncovering the Payload

Vulnerabilities and Information Disclosure in MSP Survey Software

John Hammond
October 28, 2021
Vulnerabilities and Information Disclosure in MSP Survey Software

Log4Shell: A Tradecraft Tuesday Recap

Sophia Harrison
December 17, 2021
Log4Shell: A Tradecraft Tuesday Recap

Threat Recap: Huntress Managed EDR Trial by Fire

Roger Koehler
January 25, 2022
Threat Recap: Huntress Managed EDR Trial by Fire

Hot Takes and Cyber Predictions for 2022

Lily Lewis
January 18, 2022
Hot Takes and Cyber Predictions for 2022

Evicting the Adversary

Dray Agha
May 10, 2022
Evicting the Adversary

Bring Your Own Command & Control (BYOC2)

John Hammond
April 26, 2022
Bring Your Own Command & Control (BYOC2)

The Mechanics of Defense Evasion

Dray Agha
May 24, 2022
The Mechanics of Defense Evasion

Triangulation

Dray Agha
June 14, 2022
Triangulation

Behind the Scenes: Crushing Cybercriminals with MAV

Matt Anderson
July 21, 2022
Behind the Scenes: Crushing Cybercriminals with MAV

Practical Tips for Conducting Digital Forensics Investigations

Rachel Bishop
July 26, 2022
Practical Tips for Conducting Digital Forensics Investigations
Browse Categories
+ View All
Sign Up for Blog Updates
Subscribe today and you’ll be the first to know when new content hits the blog.
Add Cyber Experts to Your Arsenal
See how the global Huntress SOC can augment your teamwith 24/7 coverage and unmatched human expertise.Start your free trial today.
Share
Huntress News
Huntress News
Cybersecurity Education
Cybersecurity Education
Cybersecurity Trends
Cybersecurity Trends
Business Growth
Business Growth
Response to Incidents
Response to Incidents
Threat Analysis
Threat Analysis