An attacker's mistake gave Huntress an unusually clear window into how a real cybercriminal operation runs day-to-day. Here's the full investigation, including the timeline they didn't want us to see.
Explore the Hottest Tradecraft and Hacker Tactics
Join us for Tradecraft Tuesday, a monthly session covering threat actor tactics on the rise, recent, real-life security incidents, and methods you can use to defend against threats.
October gets busy. Webinars, live workshops, in-person meetups—you name it. Check out our event calendar, mark your favorites, and learn how to take the fight to the attackers
Cybersecurity Awareness Month Events
Capture The Flag: Test Your Skills
Think you can outsmart a hacker? Prove it. Our interactive Capture The Flag challenge lets you step into the attacker’s shoes, so you can beat them at their own game.
Cybersecurity Awareness Month Resource Hub
Some vendors are telling customers that MFA is enough and identity data is minimal. Neither is accurate. Huntress clears the air on the most common Microsoft 365 and identity security myths.
Hackers are always scanning for weak points. Good security hygiene isn't glamorous, but it's the thing that wrecks their day and locks them out before the real damage begins.
Next Steps: Turn Security Awareness Into Action
Awareness is a start. Pair it with the right tools, and attackers don’t stand a chance.