Blog

Traitorware: How Hackers Abuse Legitimate Apps to Hijack Microsoft 365

Traitorware: How Hackers Abuse Legitimate Apps to Hijack Microsoft 365

Some threats don’t use malware—they use apps you trust. In just 3 minutes, learn how hackers are sneaking into Microsoft 365 using legitimate tools like EM Client. This trick—called Traitorware—lets them stay hidden, take over inboxes, steal data, and even get around MFA. Watch this short video to see how to spot these rogue apps and shut them down before they cause serious damage.
Read More
The State of Identity Security in 2025: A Survey of 600+ Security Professionals

The State of Identity Security in 2025: A Survey of 600+ Security Professionals

Cybercriminals are shifting tactics, and identity-based attacks are now outpacing traditional threats. In this brand-new report, Huntress surveyed over 600 IT and security professionals to uncover how identity threats are hitting businesses hard—and what security teams are doing (or not doing) to fight back. Download the report to explore: The top identity threats impacting mid-sized organizations Why MFA alone isn’t cutting it anymore Where businesses are struggling to detect and respond in time If you're still treating identity protection as optional, this report might just change your mind. Get your copy and see where your organization stacks up.
Read More
Identity Attacks Are Rising – Here is How ITDR Stops Them

Identity Attacks Are Rising – Here is How ITDR Stops Them

Cybercriminals are shifting their focus from endpoints to identities, and most security tools aren’t built to catch them. In just 3 minutes, learn how Identity Threat Detection and Response (ITDR) uncovers hidden identity threats, stops account takeovers, and gives your team the upper hand. No fluff. Just real talk on what it takes to defend against the next evolution of attacks.
Read More
Top 5 Identity Threats You Can’t Afford to Ignore

Top 5 Identity Threats You Can’t Afford to Ignore

The identity layer has become the new battleground for modern cyberattacks—and attackers are getting smarter, stealthier, and harder to stop. In this short read, we break down the five most dangerous identity threats targeting Microsoft 365 and cloud-first environments right now. From stolen credentials and session hijacking to malicious OAuth apps and adversary-in-the-middle (AiTM) tactics, this guide reveals how cybercriminals are bypassing traditional defenses like MFA and EDR to silently take over user accounts and systems. Identities are the new endpoints. Learn how to protect them before attackers exploit them.
Read More
Battling Business Email Compromise with Huntress ITDR

Battling Business Email Compromise with Huntress ITDR

Business email compromise (BEC) is a threat to businesses of all sizes. According to the FBI, BEC is a $50 billion global problem. Is your business prepared? Read this white paper to better understand the real-world impact of BEC attacks and how to shield your organization from them with continuous monitoring, real-time threat detection, and expert incident response. Don't leave your security to chance. Read more to learn how Huntress Managed ITDR delivers early threat detection and swift response to protect businesses against this rising threat.
Read More
The Straightforward Buyer’s Guide to EDR

The Straightforward Buyer’s Guide to EDR

Picking the right EDR solution just got easier. In order to combat today’s threats, businesses need endpoint detection and response (EDR). But how do you pick the best solution for your business? Don’t worry—we got you. Here's a comprehensive guide on how to find the right EDR solution for your business. Download our guide to learn: How to properly evaluate your EDR needs What capabilities to consider (and avoid) when searching for your ideal solution The differences between managed and unmanaged EDR offerings
Read More
Attack Playbook: Before Ransomware Strikes

Attack Playbook: Before Ransomware Strikes

Ransomware is one of the most devastating threats out there today. It’s a multi-billion-dollar nightmare for businesses and individuals worldwide. But these attacks aren’t random, chaotic events that just happen on a whim—they’re calculated procedures that happen in stages to organizations of all sizes. That’s why knowing what to look for is key to preventing these attacks. In this playbook, you’ll learn the signs of a ransomware attack in progress and see how you can strengthen your defenses to shut these threats down. 
Read More
Securing Macs from Surging Cyber Attacks

Securing Macs from Surging Cyber Attacks

macOS security has seen some dramatic shifts recently. And not for the better. As macOS soars in popularity among users and businesses worldwide, it’s becoming a bigger target for cybercriminals. macOS is climbing the ranks fast, on pace to become the most popular operating system by 2030. But with greater popularity comes greater risk. If you use macOS, you’re now up against a barrage of ransomware, spyware, and other nasty tactics. Hackers are working overtime to bring down your defenses, and they’re crafting macOS-specific threats to do so. Put simply, your Mac isn’t the impenetrable device it once was.  But…
Read More
Surviving Cybersecurity Scares: Fighting Fear with Awareness

Surviving Cybersecurity Scares: Fighting Fear with Awareness

Horrifying hacks, terrifying tradecraft, and cybersecurity scares loom in the darkness—but there’s no reason to fright. Come sit with us around the digital campfire and learn how you can give cyber threats a good fight. Join our Security Operation Center (SOC) Tactical Responders, Anton Ovrutsky and Dray Agha, as they walk you through real-world cybersecurity horror stories and give you the insights needed to defend yourself. Don’t miss out on this spooky session. Save your seat today to: Explore threat actor tactics: Gain insights into the latest cybercriminal strategies and techniques. Gain actionable insights: Hear tips and tricks that you…
Read More
They Want Credentials, Control, and Chaos. Let’s Shut it Down!

They Want Credentials, Control, and Chaos. Let’s Shut it Down!

Cybercriminals don’t wait for permission. They sneak in, move fast, and aim for maximum damage. But so do we. In this session, we break down the real-world attacks our Security Operations Center (SOC) stopped before they could take businesses down. Here’s a taste: Credential Theft in Telecom: An attacker quietly lurked for weeks, gathering credentials and mapping the Active Directory. Cobalt Strike in Healthcare: A bad actor bypassed MFA in a New Jersey orthopedic network, pivoted with RDP, and prepped a Cobalt Strike beacon to phone home. Brute-Force RDP in Food Wholesale: Attackers hammered their way into an RDP server,…
Read More