Glitch effectGlitch effectGlitch effect

Threat Analysis

Dive in and nerd out with us on current and emerging cybersecurity threats. We cover attack vectors, threat actors, and new vulnerabilities, providing insights to help you understand and counteract these risks.

Glitch effectGlitch effectGlitch effect
Teal gradient

Threat Hunting for Business Email Compromise Through User Agents

Dray Agha
July 6, 2023
Threat Hunting for Business Email Compromise Through User Agents

Business Email Compromise via Azure Administrative Privileges

Team Huntress
July 27, 2023
Business Email Compromise via Azure Administrative Privileges

Thwarting Financial Fraud: Shutting Down Hackers in Microsoft 365

Team Huntress
July 13, 2023
Thwarting Financial Fraud: Shutting Down Hackers in Microsoft 365

Move It on Over: Reflecting on the MOVEit Exploitation

Joe Slowik
July 7, 2023
Move It on Over: Reflecting on the MOVEit Exploitation

Legitimate Apps as Traitorware for Persistent Microsoft 365 Compromise

Sharon Martin
August 3, 2023
Legitimate Apps as Traitorware for Persistent Microsoft 365 Compromise

How Security-Centric Procedures and Training Helped Huntress Catch a $100,000 BEC Scam

Team Huntress
August 9, 2023
How Security-Centric Procedures and Training Helped Huntress Catch a $100,000 BEC Scam

Investigating New INC Ransom Group Activity

Team Huntress
August 11, 2023
Investigating New INC Ransom Group Activity

Gone Phishing: An Analysis of a Targeted User Attack

Harlan Carvey
August 17, 2023
Gone Phishing: An Analysis of a Targeted User Attack

Traditional Antivirus vs. Managed Antivirus

Topher Lyons
August 16, 2023
Traditional Antivirus vs. Managed Antivirus

Best Practices to Reduce Your Attack Surface

Harlan Carvey
August 23, 2023
Best Practices to Reduce Your Attack Surface

Qakbot Malware Takedown and Defending Forward

John Hammond
August 30, 2023
Qakbot Malware Takedown and Defending Forward

Evolution of USB-Borne Malware, Raspberry Robin

Harlan Carvey
September 7, 2023
Evolution of USB-Borne Malware, Raspberry Robin

Spidering Through Identity for Profit and Disruption

Joe Slowik
September 14, 2023
Spidering Through Identity for Profit and Disruption

Netscaler Exploitation to Social Engineering: Mapping Convergence of Adversary Tradecraft Across Victims

Team Huntress
September 26, 2023
Netscaler Exploitation to Social Engineering: Mapping Convergence of Adversary Tradecraft Across Victims

Bitter Pill: Third-Party Pharmaceutical Vendor Linked to Pharmacy and Health Clinic Cyberattack

Team Huntress
November 9, 2023
Bitter Pill: Third-Party Pharmaceutical Vendor Linked to Pharmacy and Health Clinic Cyberattack
Browse Categories
+ View All
Sign Up for Blog Updates
Subscribe today and you’ll be the first to know when new content hits the blog.
Add Cyber Experts to Your Arsenal
See how the global Huntress SOC can augment your teamwith 24/7 coverage and unmatched human expertise.Start your free trial today.
Share
Huntress News
Huntress News
Cybersecurity Education
Cybersecurity Education
Cybersecurity Trends
Cybersecurity Trends
Business Growth
Business Growth
Response to Incidents
Response to Incidents
Threat Analysis
Threat Analysis