Glitch effectGlitch effectGlitch effect

Huntress Blog

Welcome to the Huntress Cybersecurity Blog, your go-to spot for staying ahead of hackers and boosting your cybersecurity savviness. Our blog contributors have focused on making cybersecurity education engaging and accessible for everyone.

Huntress social logo

To MFA or Not to MFA: How Multi-Factor Authentication Saves the SMB

November 18, 2024
Glitch effectGlitch effectGlitch effect
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
SlashAndGrab: ScreenConnect Post-Exploitation in the Wild (CVE-2024-1709 & CVE-2024-1708)

SlashAndGrab: ScreenConnect Post-Exploitation in the Wild (CVE-2024-1709 & CVE-2024-1708)

February 23, 2024
Think Your ScreenConnect Server Is Hacked? Here’s What To Look For.

Think Your ScreenConnect Server Is Hacked? Here’s What To Look For.

February 23, 2024
A Catastrophe For Control: Understanding the ScreenConnect Authentication Bypass (CVE-2024-1709 & CVE-2024-1708)

A Catastrophe For Control: Understanding the ScreenConnect Authentication Bypass (CVE-2024-1709 & CVE-2024-1708)

February 21, 2024
Detection Guidance for ConnectWise CVE-2024-1709

Detection Guidance for ConnectWise CVE-2024-1709

February 20, 2024
Vulnerability Reproduced: Immediately Patch ScreenConnect 23.9.8

Vulnerability Reproduced: Immediately Patch ScreenConnect 23.9.8

February 19, 2024
Solving Endpoint Security Challenges with a Managed EDR

Solving Endpoint Security Challenges with a Managed EDR

February 16, 2024
The Health Sector is Under Attack. But You Can Fight Back.

The Health Sector is Under Attack. But You Can Fight Back.

February 15, 2024
Threat Intel Accelerates Detection & Response

Threat Intel Accelerates Detection & Response

February 14, 2024
RATs! Remote Management Software from the Hacker’s Perspective

RATs! Remote Management Software from the Hacker’s Perspective

February 6, 2024
Threat Advisory: Possible AnyDesk Stolen Code Signing Certificate

Threat Advisory: Possible AnyDesk Stolen Code Signing Certificate

February 2, 2024
Ransomware Deployment Attempts Via TeamViewer

Ransomware Deployment Attempts Via TeamViewer

January 17, 2024
Full Transparency: Controlling Apple's TCC

Full Transparency: Controlling Apple's TCC

January 16, 2024
Securing Healthcare: Handling Cyber Threats with Care

Securing Healthcare: Handling Cyber Threats with Care

January 12, 2024
Empowering the Hunt: All Your Security in One Place

Empowering the Hunt: All Your Security in One Place

January 4, 2024
No items found.
Glitch effect

Sign Up for Blog Updates

Subscribe today and you’ll be the first to know when new content hits the blog.

Huntress at work