Glitch effectGlitch effectGlitch effect

Threat Analysis

Dive in and nerd out with us on current and emerging cybersecurity threats. We cover attack vectors, threat actors, and new vulnerabilities, providing insights to help you understand and counteract these risks.

Glitch effectGlitch effectGlitch effect
Teal gradient

Cleartext Shenanigans: Gifting User Passwords to Adversaries With NPPSPY

Dray Agha
August 16, 2022
Cleartext Shenanigans: Gifting User Passwords to Adversaries With NPPSPY

Don’t Get Schooled: How to Catch a Phish

Rachel Bishop
August 9, 2022
Don’t Get Schooled: How to Catch a Phish

Unraveling a Reverse Shell with Huntress Managed EDR

Team Huntress
September 13, 2022
Unraveling a Reverse Shell with Huntress Managed EDR

Critical Vulnerability Disclosure: ConnectWise/R1Soft Server Backup Manager Remote Code Execution & Supply Chain Risks

John Hammond
Caleb Stewart
October 31, 2022
Critical Vulnerability Disclosure: ConnectWise/R1Soft Server Backup Manager Remote Code Execution & Supply Chain Risks

Creating macOS Ransomware

Molly "PonchoSec" N.
November 8, 2022
Creating macOS Ransomware

Using Shodan Images to Hunt Down Ransomware Groups

Josh Allman
December 20, 2022
Using Shodan Images to Hunt Down Ransomware Groups

OWASSRF Explained: Analyzing the Microsoft Exchange RCE Vulnerability

Team Huntress
December 29, 2022
OWASSRF Explained: Analyzing the Microsoft Exchange RCE Vulnerability

Ave Maria and the Chambers of Warzone RAT

Chad Hudson
January 31, 2023
Ave Maria and the Chambers of Warzone RAT

The Methods Behind a Huntress Managed Antivirus Investigation

Dray Agha
January 19, 2023
The Methods Behind a Huntress Managed Antivirus Investigation

Insistence on Persistence

Stuart Ashenbrenner
January 10, 2023
Insistence on Persistence

Investigating Intrusions From Intriguing Exploits

Joe Slowik
February 8, 2023
Investigating Intrusions From Intriguing Exploits

Addressing Initial Access

Harlan Carvey
Dray Agha
March 16, 2023
Addressing Initial Access

Contextualizing Events & Enabling Defense: What 3CX Means

Joe Slowik
March 31, 2023
Contextualizing Events & Enabling Defense: What 3CX Means

Advanced CyberChef Tips: AsyncRAT Loader

Matthew Brennan
May 9, 2023
Advanced CyberChef Tips: AsyncRAT Loader

Threat Advisory: XMRig Cryptomining By Way Of TeamViewer

Team Huntress
May 30, 2023
Threat Advisory: XMRig Cryptomining By Way Of TeamViewer
Browse Categories
+ View All
Sign Up for Blog Updates
Subscribe today and you’ll be the first to know when new content hits the blog.
Add Cyber Experts to Your Arsenal
See how the global Huntress SOC can augment your teamwith 24/7 coverage and unmatched human expertise.Start your free trial today.
Share
Huntress News
Huntress News
Cybersecurity Education
Cybersecurity Education
Cybersecurity Trends
Cybersecurity Trends
Business Growth
Business Growth
Response to Incidents
Response to Incidents
Threat Analysis
Threat Analysis