Glitch effect

Cybersecurity Horror Stories

Introducing Huntress Managed ITDR.

Glitch effectGlitch effect
Watch the Webinar
By submitting this form, you accept our Terms of Service & Privacy Policy
Oops! Something went wrong while submitting the form.

Join us this Halloween, where we look at some terrifying real-world examples of attacks detected by Huntress.  You’ll hear directly from our front-line SOC analysts who investigated the cases.  They will walk you through what spooked them and how they stopped the evil spirits (which turned out to be hackers masquerading as ghosts) from haunting our customers.

In addition to clever Halloween puns, you will also gain a better understanding of what techniques adversaries are using to conduct business email compromise (BEC) and how you can stay protected.

In this webinar, we’ll cover:

  • Learn about the latest business email compromise (BEC) threats we’re seeing in the wild
  • Understand what indicators of attack (IOA) were uncovered during threat hunting
  • Get insight into how Huntress MDR for Microsoft 365 can monitor and protect your organization from email-based attacks

Dray Agha
Senior Manager, Security Operations Center
Linkedin icon
Herbie Zimmerman
Manage Security Operations Center UK, Huntress
Chris Cochran
Chief Evangelist, Huntress