Homepage
Open in app
Sign inGet started

Huntress

Cybersecurity for the 99%

  • Analysis
  • Events
  • Company
  • Our Blog Has Moved!

    Our Blog Has Moved!

    We wish we could say we’re shutting this blog down because hackers have finally given up.
    Go to the profile of Brandon Garcin
    Brandon Garcin
    Jun 1, 2021
    Why Microsoft Defender Antivirus Is Worth Another Look

    Why Microsoft Defender Antivirus Is Worth Another Look

    Even in 2021, the epic antivirus battles continue! And among one of the leading contenders is (yes I’m saying it): Microsoft Defender…
    Go to the profile of Annie Ballew
    Annie Ballew
    Jan 19, 2021
    Redefining Beta

    Redefining Beta

    What if technology never changed? On the plus side, there wouldn’t be constant updates to contend with, no new blogs to read about the…
    Go to the profile of Annie Ballew
    Annie Ballew
    Dec 29, 2020
    Top Hacker Tradecraft That Caught Our Eye in 2020

    Top Hacker Tradecraft That Caught Our Eye in 2020

    As the year-that-must-not-be-named comes to a close, we’ve decided to take a look back at some of the more interesting — and innovative —…
    Go to the profile of Lily Teplow
    Lily Teplow
    Dec 22, 2020
    Rapid Response: TrickBoot

    Rapid Response: TrickBoot

    The TrickBot malware family has sustained its status as a worthy adversary in the world of cybersecurity since 2016. Even after a recent…
    Go to the profile of Annie Ballew
    Annie Ballew
    Dec 3, 2020
    I Have a Lot to be Thankful for in 2020

    I Have a Lot to be Thankful for in 2020

    Thanksgiving 2015: I was a punk with hacking skills but hardly knew SMB security (let alone MSPs). The MSP community had SMB skills but…
    Go to the profile of Kyle Hanslovan
    Kyle Hanslovan
    Nov 27, 2020
    Huntress Service: Partner Enablement

    Huntress Service: Partner Enablement

    Let’s face it — even the best cybersecurity tools won’t configure and sell themselves.
    Go to the profile of Brandon Garcin
    Brandon Garcin
    Nov 18, 2020
    Cybersecurity Lessons We Learned from hack_it 2020

    Cybersecurity Lessons We Learned from hack_it 2020

    Creating accessible (and actionable) cybersecurity education is a huge part of our mission at Huntress — and last week, we were thrilled…
    Go to the profile of Lily Teplow
    Lily Teplow
    Oct 22, 2020
    Phishing, Office 365 and Cybercrime

    Phishing, Office 365 and Cybercrime

    One of the most common targets of phishing and Business Email Compromise are Microsoft 365 / Office 365 credentials. Although most…
    Go to the profile of Kyle Hanslovan
    Kyle Hanslovan
    Sep 16, 2020
    Huntress Service: External Recon

    Huntress Service: External Recon

    Imagine if the Empire knew that there was a flaw in the Death Star’s thermal exhaust port. How would this change the events of the SW…
    Go to the profile of Annie Ballew
    Annie Ballew
    Jul 21, 2020
    ThreatOp$ = Humans * Automation;

    ThreatOp$ = Humans * Automation;

    Huntress ThreatOps
    Go to the profile of Matthew Echols
    Matthew Echols
    Jul 9, 2020
    Huntress Service: Ransomware Canaries

    Huntress Service: Ransomware Canaries

    From CryptoLocker to Locky to Sodinokibi to Maze, ransomware has been a staple in the hacker-verse for a long time. For defenders, the…
    Go to the profile of Annie Ballew
    Annie Ballew
    Jun 24, 2020
    Evolving the Hunt

    Evolving the Hunt

    When I first joined Huntress, what drew me to this company was not just the people and their passion for their work; I was enamored by the…
    Go to the profile of Annie Ballew
    Annie Ballew
    Jun 22, 2020
    Hiding In Plain Sight

    Hiding In Plain Sight

    Hiding a malicious payload in a file meant to look like a log.
    Go to the profile of John Ferrell
    John Ferrell
    Jun 18, 2020
    ThreatOps Analysis: Keyed Malware

    ThreatOps Analysis: Keyed Malware

    Attackers will sometimes “key” the malware for a particular host or user, meaning the malware will only run on the targeted host…
    Go to the profile of John Ferrell
    John Ferrell
    Mar 17, 2020
    Adversary Exposed: How One Criminal Attempted to Sell an MSP on the Dark Web

    Adversary Exposed: How One Criminal Attempted to Sell an MSP on the Dark Web

    Think about all the things you can buy and do on the dark web.
    Go to the profile of Annie Ballew
    Annie Ballew
    Feb 4, 2020
    Validating the SolarWinds N-central “Dumpster Diver” Vulnerability

    Validating the SolarWinds N-central “Dumpster Diver” Vulnerability

    Thanks to the efforts of multiple MSP partners, our team was notified about a zero-day vulnerability posted to PacketStorm for SolarWinds…
    Go to the profile of Kyle Hanslovan
    Kyle Hanslovan
    Jan 24, 2020
    Validating the Bishop Fox Findings in ConnectWise Control

    Validating the Bishop Fox Findings in ConnectWise Control

    In computer security, responsible disclosure is a vulnerability disclosure model in which an issue is publicly disclosed only after a…
    Go to the profile of Kyle Hanslovan
    Kyle Hanslovan
    Jan 22, 2020
    Assisted Remediation in Action

    Assisted Remediation in Action

    This week we had the opportunity to help an MSP partner contain and remediate an Emotet/TrickBot infection that impacted a client with 50+…
    Go to the profile of Kyle Hanslovan
    Kyle Hanslovan
    Nov 15, 2019
    Huntress Development Notes: Updating the Updater

    Huntress Development Notes: Updating the Updater

    If you’ve ever taken a look inside the Huntress Agent directory you may have noticed the file wyUpdate.exe . This executable is wyUpdate…
    Go to the profile of John Ferrell
    John Ferrell
    Oct 3, 2019
    Rapid Response: Keeping up with BlueKeep

    Rapid Response: Keeping up with BlueKeep

    It is only a matter of time before hackers exploit BlueKeep to wreak havoc on a network. Learn what you need to know to protect your hosts.
    Go to the profile of Monika Gupta
    Monika Gupta
    Jun 4, 2019
    Deep Dive: A LNK in the Chain

    Deep Dive: A LNK in the Chain

    The Huntress ThreatOps team sees all sorts of clever tricks attackers use to launch PowerShell.
    Go to the profile of John Ferrell
    John Ferrell
    May 30, 2019
    Incident Education: Sales Ammo for the IT Arsenal

    Incident Education: Sales Ammo for the IT Arsenal

    There’s not a day that goes by where I don’t hear cringe-worthy stories of sales tactics peddling FEAR, UNCERTAINTY, and DOUBT (FUD) to…
    Go to the profile of Kyle Hanslovan
    Kyle Hanslovan
    May 16, 2019
    Rapid Response: ASUS Live Update Attack (Operation ShadowHammer)

    Rapid Response: ASUS Live Update Attack (Operation ShadowHammer)

    A simple overview on how hackers pushed backdoored updates to over a million ASUS devices running Windows.
    Go to the profile of Kyle Hanslovan
    Kyle Hanslovan
    Mar 26, 2019
    CVE-2017–18362: Arbitrary SQL Injection in MangedITSync Integration

    CVE-2017–18362: Arbitrary SQL Injection in MangedITSync Integration

    A vulnerability was discovered and disclosed in late 2017 that affected the ConnectWise ManagedITSync integration, designed to sync data…
    Go to the profile of Chris Bisnett
    Chris Bisnett
    Feb 8, 2019
    About HuntressLatest StoriesArchiveAbout MediumTermsPrivacyTeams