wpthinkertechreport

75 Posts
Stealthware: The Rise of Malicious OAuth Apps in Microsoft 365

Stealthware: The Rise of Malicious OAuth Apps in Microsoft 365

Hackers are hiding in plain sight—here’s how. Forget malware—some attacks now use custom-built apps to quietly break into Microsoft 365. These apps, known as Stealthware, are designed to look legit but secretly steal data, change inbox rules, and stick around long-term. They can even bypass MFA and avoid triggering security alerts. In just 5 minutes, learn how these sneaky apps work—and how to find and remove them before they do real damage.
Read More
Traitorware: How Hackers Abuse Legitimate Apps to Hijack Microsoft 365

Traitorware: How Hackers Abuse Legitimate Apps to Hijack Microsoft 365

Some threats don’t use malware—they use apps you trust. In just 3 minutes, learn how hackers are sneaking into Microsoft 365 using legitimate tools like EM Client. This trick—called Traitorware—lets them stay hidden, take over inboxes, steal data, and even get around MFA. Watch this short video to see how to spot these rogue apps and shut them down before they cause serious damage.
Read More
The State of Identity Security in 2025: A Survey of 600+ Security Professionals

The State of Identity Security in 2025: A Survey of 600+ Security Professionals

Cybercriminals are shifting tactics, and identity-based attacks are now outpacing traditional threats. In this brand-new report, Huntress surveyed over 600 IT and security professionals to uncover how identity threats are hitting businesses hard—and what security teams are doing (or not doing) to fight back. Download the report to explore: The top identity threats impacting mid-sized organizations Why MFA alone isn’t cutting it anymore Where businesses are struggling to detect and respond in time If you're still treating identity protection as optional, this report might just change your mind. Get your copy and see where your organization stacks up.
Read More
Identity Attacks Are Rising – Here is How ITDR Stops Them

Identity Attacks Are Rising – Here is How ITDR Stops Them

Cybercriminals are shifting their focus from endpoints to identities, and most security tools aren’t built to catch them. In just 3 minutes, learn how Identity Threat Detection and Response (ITDR) uncovers hidden identity threats, stops account takeovers, and gives your team the upper hand. No fluff. Just real talk on what it takes to defend against the next evolution of attacks.
Read More
Top 5 Identity Threats You Can’t Afford to Ignore

Top 5 Identity Threats You Can’t Afford to Ignore

The identity layer has become the new battleground for modern cyberattacks—and attackers are getting smarter, stealthier, and harder to stop. In this short read, we break down the five most dangerous identity threats targeting Microsoft 365 and cloud-first environments right now. From stolen credentials and session hijacking to malicious OAuth apps and adversary-in-the-middle (AiTM) tactics, this guide reveals how cybercriminals are bypassing traditional defenses like MFA and EDR to silently take over user accounts and systems. Identities are the new endpoints. Learn how to protect them before attackers exploit them.
Read More
Battling Business Email Compromise with Huntress ITDR

Battling Business Email Compromise with Huntress ITDR

Business email compromise (BEC) is a threat to businesses of all sizes. According to the FBI, BEC is a $50 billion global problem. Is your business prepared? Read this white paper to better understand the real-world impact of BEC attacks and how to shield your organization from them with continuous monitoring, real-time threat detection, and expert incident response. Don't leave your security to chance. Read more to learn how Huntress Managed ITDR delivers early threat detection and swift response to protect businesses against this rising threat.  
Read More
Decoding Compliance and Cyber Insurance: From Mandates to Clarity 

Decoding Compliance and Cyber Insurance: From Mandates to Clarity 

Let’s face it, our data and privacy are under siege, and it’s a challenge we all need to face together. Regulations have taken the form of compliance frameworks to address risk. Further, the rise of cyber insurance has gone from just-in-case protection to necessary. Come join us as we gain a better understanding of compliance mandates, dive into cyber insurance requirements, and how we’ll assist you in turning regulatory challenges into a competitive advantage. In this webinar, Huntress explores: How we got to these regulations: Get a deeper understanding of the risk exposure we face every day Why do we…
Read More
Solving the SIEM Problem 

Solving the SIEM Problem 

Every day, we’re bombarded by massive amounts of information. From daily news and stocks, to the latest box scores, keeping up with it all is a full-time job. Your IT infrastructure is no different. Millions of logs circulate through your IT systems, including firewall data, system logs, and endpoint events to name a few. Security Information and Event Management, or SIEM for short, was designed to make sense of it all. Centralizing logs is at the heart of what SIEM was meant to do. But does just having a SIEM and organizing your data help if there’s still too much…
Read More
The Smart Buyer’s Guide to SIEM 

The Smart Buyer’s Guide to SIEM 

Ready to demystify SIEM? Welcome. If you’re reading this, you’re probably curious about Security Information and Event Management (SIEM). Maybe you’ve got a question or two you’ve been hesitant to ask. No problem. We know SIEM can be an intimidating topic, but we’re here to let you know it doesn’t have to be. In this guide, we’ll dive deep into the hows, whats, and whys of SIEM, all in straightforward, comprehensible language. By the end, you’ll have a better understanding of this critical technology and the know-how to select the right solution for your organization.
Read More
Solving the SIEM Problem 

Solving the SIEM Problem 

Tired of traditional SIEM solutions creating more headaches for you? You’re not alone. While SIEMs were built to gather and correlate data and streamline your IT operations, most have become too noisy and complex to manage. From false positives to the need for specialized management—not to mention skyrocketing costs as your data intake grows—legacy SIEMs can make you feel like you’re spiraling out of control. Don’t settle for a SIEM that doesn’t work for you. It’s time for a new approach. Dive into the most common problems SIEM users face and learn how to solve them. Whether you’re grappling with…
Read More