News

Huntress
huntress. com > why-huntress > case-studies > evolv-it

Evolv IT Case Study

6+ day, 19+ hour ago  (379+ words) Get full endpoint visibility, detection, and response. Protect your Microsoft 365 and Google Workspace identities and email environments. Managed threat response and robust compliance support at a predictable price. Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts. Quickly…...

Symbols: nasdaq:evlv,btc-usd
Huntress
huntress. com > resources > what-is-device-code-phishing

What is Device Code Phishing?

2+ week, 3+ day ago  (256+ words) Get full endpoint visibility, detection, and response. Protect your Microsoft 365 and Google Workspace identities and email environments. Managed threat response and robust compliance support at a predictable price. Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts. Quickly…...

Symbols: btc-usd,btc-cad
Huntress
huntress. com > blog > axios-npm-compromise

Tradecraft Tuesday Recap: axios npm Supply Chain Compromise

3+ week, 5+ day ago  (822+ words) Get full endpoint visibility, detection, and response. Protect your Microsoft 365 and Google Workspace identities and email environments. Managed threat response and robust compliance support at a predictable price. Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts. Quickly…...

Symbols: setup.js
Huntress
huntress. com > why-huntress > case-studies > new-charter-technologies

New Charter case study

1+ mon, 1+ week ago  (397+ words) Get full endpoint visibility, detection, and response. Protect your Microsoft 365 and Google Workspace identities and email environments. Managed threat response and robust compliance support at a predictable price. Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts. Quickly…...

Symbols: msps,edr,itdr
Huntress
huntress. com > blog > supply-chain-compromise-axios-npm-package

Supply-Chain Compromise of axios npm Package

1+ mon, 2+ week ago  (1682+ words) Get full endpoint visibility, detection, and response. Protect your Microsoft 365 and Google Workspace identities and email environments. Managed threat response and robust compliance support at a predictable price. Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts. Quickly…...

Symbols: rat
Huntress
huntress. com > use-cases > infostealers

Stay Protected From Infostealers | Secure Your Data with Huntress

1+ mon, 2+ week ago  (1103+ words) How to Stop Ransomware Before the Encryption Starts. Learn more on 1/20. Register for the webinar > Get full endpoint visibility, detection, and response. Protect your Microsoft 365 and Google Workspace identities and email environments. Managed threat response and robust compliance support at…...

Symbols: mfa,edr,msps
Huntress
huntress. com > blog > exposed-vpn-ransomware-attack

How the Huntress SOC Stopped a VPN-Based Ransomware Attack

2+ mon, 5+ day ago  (1393+ words) Get full endpoint visibility, detection, and response Protect your Microsoft 365 identities and email environments. Managed threat response and robust compliance support at a predictable price. Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single…...

Symbols: edr
Huntress
huntress. com > blog > threat-actor-abuses-elastic-cloud-siem

A Threat Actor Abuses Another Free Trial

2+ mon, 1+ week ago  (865+ words) Get full endpoint visibility, detection, and response Protect your Microsoft 365 identities and email environments. Managed threat response and robust compliance support at a predictable price. Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single…...

Symbols: rmm
Huntress
huntress. com > blog > rmm-abuse-when-it-convenience-bites-back

RMM Abuse: When IT Convenience Bites Back

2+ mon, 1+ week ago  (1329+ words) Get full endpoint visibility, detection, and response Protect your Microsoft 365 identities and email environments. Managed threat response and robust compliance support at a predictable price. Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single…...

Symbols: rmm
Huntress
huntress. com > trafficking-victim-to-cybercrime-whistleblower

From Trafficking Victim to Cybercrime Whistleblower

2+ mon, 3+ week ago  (65+ words) Get full endpoint visibility, detection, and response Protect your Microsoft 365 identities and email environments. Managed threat response and robust compliance support at a predictable price. Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single…...

Symbols: arz,afcx,cvsa