Glitch effectGlitch effectGlitch effect

Huntress Blog

Welcome to the Huntress Cybersecurity Blog, your go-to spot for staying ahead of hackers and boosting your cybersecurity savviness. Our blog contributors have focused on making cybersecurity education engaging and accessible for everyone.

Huntress social logo

To MFA or Not to MFA: How Multi-Factor Authentication Saves the SMB

November 18, 2024
Glitch effectGlitch effectGlitch effect
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Best Practices to Reduce Your Attack Surface

Best Practices to Reduce Your Attack Surface

August 23, 2023
Ask the Mac Guy: macOS Security Myths

Ask the Mac Guy: macOS Security Myths

August 22, 2023
Gone Phishing: An Analysis of a Targeted User Attack

Gone Phishing: An Analysis of a Targeted User Attack

August 17, 2023
Traditional Antivirus vs. Managed Antivirus

Traditional Antivirus vs. Managed Antivirus

August 16, 2023
Investigating New INC Ransom Group Activity

Investigating New INC Ransom Group Activity

August 11, 2023
Identity: The Third Phase of Security Operations

Identity: The Third Phase of Security Operations

August 10, 2023
How Security-Centric Procedures and Training Helped Huntress Catch a $100,000 BEC Scam

How Security-Centric Procedures and Training Helped Huntress Catch a $100,000 BEC Scam

August 9, 2023
Beyond Antivirus: How Businesses Should Be Scaling Their Security

Beyond Antivirus: How Businesses Should Be Scaling Their Security

August 8, 2023
Another PaperCut: CVE-2023-39143 Remote Code Execution

Another PaperCut: CVE-2023-39143 Remote Code Execution

August 5, 2023
Legitimate Apps as Traitorware for Persistent Microsoft 365 Compromise

Legitimate Apps as Traitorware for Persistent Microsoft 365 Compromise

August 3, 2023
Breaking Down the Threat Hunting Process

Breaking Down the Threat Hunting Process

August 2, 2023
Why Huntress Trusts Microsoft Defender Antivirus (And You Should Too)

Why Huntress Trusts Microsoft Defender Antivirus (And You Should Too)

August 1, 2023
Business Email Compromise via Azure Administrative Privileges

Business Email Compromise via Azure Administrative Privileges

July 27, 2023
The Power of Cyber Insurance: What Every MSP Should Know

The Power of Cyber Insurance: What Every MSP Should Know

July 25, 2023
Celebrating One Year of Security Awareness Training

Celebrating One Year of Security Awareness Training

July 19, 2023
No items found.
Glitch effect

Sign Up for Blog Updates

Subscribe today and you’ll be the first to know when new content hits the blog.

Oops! Something went wrong while submitting the form.
Huntress at work