Blog

Data and AI Present Significant Opportunities for Social Benefits Systems

Data and AI Present Significant Opportunities for Social Benefits Systems

In today's rapidly evolving world, social benefits agencies, across the globe, face unprecedented challenges and opportunities. ​ This report, authored by the International Institute for Analytics together with SAS experts, delves into how data and AI can revolutionize social benefits systems, making them more inclusive, efficient, innovative, and personalized.Key Takeaways: Addressing Disruptive Forces: Learn how changing demographics, growing public expectations, and increasing fraud threats are reshaping social benefits agencies and how data and AI can help overcome these challenges. ​ Enhancing Payment Integrity: Discover advanced solutions to detect and prevent fraud, ensuring that benefits reach those truly in need while…
Read More
Lateral Movement to Credential Theft: How Endpoint and Identities are Interconnected

Lateral Movement to Credential Theft: How Endpoint and Identities are Interconnected

Is it an endpoint attack or an identity breach? In the real world—it’s usually both. From stolen credentials to sneaky inbox rules and RDP exploits, hackers are getting better at blending tactics. That’s why knowing how endpoint and identity threats work together is critical. Watch this on-demand webinar to learn: The key differences between endpoint and identity attacks Real examples our SOC has seen in the wild Why you need both protections working together to stay secure Watch anytime—see how modern threats really unfold, and what it takes to stop them.
Read More
Stealthware: The Rise of Malicious OAuth Apps in Microsoft 365

Stealthware: The Rise of Malicious OAuth Apps in Microsoft 365

Hackers are hiding in plain sight—here’s how. Forget malware—some attacks now use custom-built apps to quietly break into Microsoft 365. These apps, known as Stealthware, are designed to look legit but secretly steal data, change inbox rules, and stick around long-term. They can even bypass MFA and avoid triggering security alerts. In just 5 minutes, learn how these sneaky apps work—and how to find and remove them before they do real damage.
Read More
Traitorware: How Hackers Abuse Legitimate Apps to Hijack Microsoft 365

Traitorware: How Hackers Abuse Legitimate Apps to Hijack Microsoft 365

Some threats don’t use malware—they use apps you trust. In just 3 minutes, learn how hackers are sneaking into Microsoft 365 using legitimate tools like EM Client. This trick—called Traitorware—lets them stay hidden, take over inboxes, steal data, and even get around MFA. Watch this short video to see how to spot these rogue apps and shut them down before they cause serious damage.
Read More
The State of Identity Security in 2025: A Survey of 600+ Security Professionals

The State of Identity Security in 2025: A Survey of 600+ Security Professionals

Cybercriminals are shifting tactics, and identity-based attacks are now outpacing traditional threats. In this brand-new report, Huntress surveyed over 600 IT and security professionals to uncover how identity threats are hitting businesses hard—and what security teams are doing (or not doing) to fight back. Download the report to explore: The top identity threats impacting mid-sized organizations Why MFA alone isn’t cutting it anymore Where businesses are struggling to detect and respond in time If you're still treating identity protection as optional, this report might just change your mind. Get your copy and see where your organization stacks up.
Read More
Identity Attacks Are Rising – Here is How ITDR Stops Them

Identity Attacks Are Rising – Here is How ITDR Stops Them

Cybercriminals are shifting their focus from endpoints to identities, and most security tools aren’t built to catch them. In just 3 minutes, learn how Identity Threat Detection and Response (ITDR) uncovers hidden identity threats, stops account takeovers, and gives your team the upper hand. No fluff. Just real talk on what it takes to defend against the next evolution of attacks.
Read More
Top 5 Identity Threats You Can’t Afford to Ignore

Top 5 Identity Threats You Can’t Afford to Ignore

The identity layer has become the new battleground for modern cyberattacks—and attackers are getting smarter, stealthier, and harder to stop. In this short read, we break down the five most dangerous identity threats targeting Microsoft 365 and cloud-first environments right now. From stolen credentials and session hijacking to malicious OAuth apps and adversary-in-the-middle (AiTM) tactics, this guide reveals how cybercriminals are bypassing traditional defenses like MFA and EDR to silently take over user accounts and systems. Identities are the new endpoints. Learn how to protect them before attackers exploit them.
Read More
Battling Business Email Compromise with Huntress ITDR

Battling Business Email Compromise with Huntress ITDR

Business email compromise (BEC) is a threat to businesses of all sizes. According to the FBI, BEC is a $50 billion global problem. Is your business prepared? Read this white paper to better understand the real-world impact of BEC attacks and how to shield your organization from them with continuous monitoring, real-time threat detection, and expert incident response. Don't leave your security to chance. Read more to learn how Huntress Managed ITDR delivers early threat detection and swift response to protect businesses against this rising threat.
Read More
Lateral Movement to Credential Theft: How Endpoint and Identities are Interconnected

Lateral Movement to Credential Theft: How Endpoint and Identities are Interconnected

Is it an endpoint attack or an identity breach? In the real world—it’s usually both. From stolen credentials to sneaky inbox rules and RDP exploits, hackers are getting better at blending tactics. That’s why knowing how endpoint and identity threats work together is critical. Watch this on-demand webinar to learn: The key differences between endpoint and identity attacks Real examples our SOC has seen in the wild Why you need both protections working together to stay secure Watch anytime—see how modern threats really unfold, and what it takes to stop them.
Read More
Stealthware: The Rise of Malicious OAuth Apps in Microsoft 365

Stealthware: The Rise of Malicious OAuth Apps in Microsoft 365

Hackers are hiding in plain sight—here’s how. Forget malware—some attacks now use custom-built apps to quietly break into Microsoft 365. These apps, known as Stealthware, are designed to look legit but secretly steal data, change inbox rules, and stick around long-term. They can even bypass MFA and avoid triggering security alerts. In just 5 minutes, learn how these sneaky apps work—and how to find and remove them before they do real damage.
Read More