Homepage
Open in app
Sign in
Get started
Huntress
Cybersecurity for the 99%
Analysis
Events
Company
Follow
Our Blog Has Moved!
Our Blog Has Moved!
We wish we could say we’re shutting this blog down because hackers have finally given up.
Brandon Garcin
Jun 1, 2021
Why Microsoft Defender Antivirus Is Worth Another Look
Why Microsoft Defender Antivirus Is Worth Another Look
Even in 2021, the epic antivirus battles continue! And among one of the leading contenders is (yes I’m saying it): Microsoft Defender…
Annie Ballew
Jan 19, 2021
Redefining Beta
Redefining Beta
What if technology never changed? On the plus side, there wouldn’t be constant updates to contend with, no new blogs to read about the…
Annie Ballew
Dec 29, 2020
Top Hacker Tradecraft That Caught Our Eye in 2020
Top Hacker Tradecraft That Caught Our Eye in 2020
As the year-that-must-not-be-named comes to a close, we’ve decided to take a look back at some of the more interesting — and innovative —…
Lily Teplow
Dec 22, 2020
Rapid Response: TrickBoot
Rapid Response: TrickBoot
The TrickBot malware family has sustained its status as a worthy adversary in the world of cybersecurity since 2016. Even after a recent…
Annie Ballew
Dec 3, 2020
I Have a Lot to be Thankful for in 2020
I Have a Lot to be Thankful for in 2020
Thanksgiving 2015: I was a punk with hacking skills but hardly knew SMB security (let alone MSPs). The MSP community had SMB skills but…
Kyle Hanslovan
Nov 27, 2020
Huntress Service: Partner Enablement
Huntress Service: Partner Enablement
Let’s face it — even the best cybersecurity tools won’t configure and sell themselves.
Brandon Garcin
Nov 18, 2020
Cybersecurity Lessons We Learned from hack_it 2020
Cybersecurity Lessons We Learned from hack_it 2020
Creating accessible (and actionable) cybersecurity education is a huge part of our mission at Huntress — and last week, we were thrilled…
Lily Teplow
Oct 22, 2020
Phishing, Office 365 and Cybercrime
Phishing, Office 365 and Cybercrime
One of the most common targets of phishing and Business Email Compromise are Microsoft 365 / Office 365 credentials. Although most…
Kyle Hanslovan
Sep 16, 2020
Huntress Service: External Recon
Huntress Service: External Recon
Imagine if the Empire knew that there was a flaw in the Death Star’s thermal exhaust port. How would this change the events of the SW…
Annie Ballew
Jul 21, 2020
ThreatOp$ = Humans * Automation;
ThreatOp$ = Humans * Automation;
Huntress ThreatOps
Matthew Echols
Jul 9, 2020
Huntress Service: Ransomware Canaries
Huntress Service: Ransomware Canaries
From CryptoLocker to Locky to Sodinokibi to Maze, ransomware has been a staple in the hacker-verse for a long time. For defenders, the…
Annie Ballew
Jun 24, 2020
Evolving the Hunt
Evolving the Hunt
When I first joined Huntress, what drew me to this company was not just the people and their passion for their work; I was enamored by the…
Annie Ballew
Jun 22, 2020
Hiding In Plain Sight
Hiding In Plain Sight
Hiding a malicious payload in a file meant to look like a log.
John Ferrell
Jun 18, 2020
ThreatOps Analysis: Keyed Malware
ThreatOps Analysis: Keyed Malware
Attackers will sometimes “key” the malware for a particular host or user, meaning the malware will only run on the targeted host…
John Ferrell
Mar 17, 2020
Adversary Exposed: How One Criminal Attempted to Sell an MSP on the Dark Web
Adversary Exposed: How One Criminal Attempted to Sell an MSP on the Dark Web
Think about all the things you can buy and do on the dark web.
Annie Ballew
Feb 4, 2020
Validating the SolarWinds N-central “Dumpster Diver” Vulnerability
Validating the SolarWinds N-central “Dumpster Diver” Vulnerability
Thanks to the efforts of multiple MSP partners, our team was notified about a zero-day vulnerability posted to PacketStorm for SolarWinds…
Kyle Hanslovan
Jan 24, 2020
Validating the Bishop Fox Findings in ConnectWise Control
Validating the Bishop Fox Findings in ConnectWise Control
In computer security, responsible disclosure is a vulnerability disclosure model in which an issue is publicly disclosed only after a…
Kyle Hanslovan
Jan 22, 2020
Assisted Remediation in Action
Assisted Remediation in Action
This week we had the opportunity to help an MSP partner contain and remediate an Emotet/TrickBot infection that impacted a client with 50+…
Kyle Hanslovan
Nov 15, 2019
Huntress Development Notes: Updating the Updater
Huntress Development Notes: Updating the Updater
If you’ve ever taken a look inside the Huntress Agent directory you may have noticed the file wyUpdate.exe . This executable is wyUpdate…
John Ferrell
Oct 3, 2019
Rapid Response: Keeping up with BlueKeep
Rapid Response: Keeping up with BlueKeep
It is only a matter of time before hackers exploit BlueKeep to wreak havoc on a network. Learn what you need to know to protect your hosts.
Monika Gupta
Jun 4, 2019
Deep Dive: A LNK in the Chain
Deep Dive: A LNK in the Chain
The Huntress ThreatOps team sees all sorts of clever tricks attackers use to launch PowerShell.
John Ferrell
May 30, 2019
Incident Education: Sales Ammo for the IT Arsenal
Incident Education: Sales Ammo for the IT Arsenal
There’s not a day that goes by where I don’t hear cringe-worthy stories of sales tactics peddling FEAR, UNCERTAINTY, and DOUBT (FUD) to…
Kyle Hanslovan
May 16, 2019
Rapid Response: ASUS Live Update Attack (Operation ShadowHammer)
Rapid Response: ASUS Live Update Attack (Operation ShadowHammer)
A simple overview on how hackers pushed backdoored updates to over a million ASUS devices running Windows.
Kyle Hanslovan
Mar 26, 2019
CVE-2017–18362: Arbitrary SQL Injection in MangedITSync Integration
CVE-2017–18362: Arbitrary SQL Injection in MangedITSync Integration
A vulnerability was discovered and disclosed in late 2017 that affected the ConnectWise ManagedITSync integration, designed to sync data…
Chris Bisnett
Feb 8, 2019
About Huntress
Latest Stories
Archive
About Medium
Terms
Privacy
Teams