Huntress

Huntress

Computer and Network Security

Columbia, Maryland 68,449 followers

Managed #cybersecurity without the complexity. EDR, ITDR, SIEM & SAT crafted for under-resourced IT and Security teams.

About us

Protect Your Endpoints, Identities, Logs, and Employees. The fully managed security platform that combines endpoint detection and response, Microsoft 365 identity protection, a predictably affordable SIEM and science-based security awareness training. Powered by custom-built enterprise technology for mid-market enterprises, small businesses, and the MSPs that support them and delivered by unrivaled industry analysts in our 24/7 Security Operations Center. By delivering a suite of purpose-built solutions that meet budget, security, and peace-of-mind requirements, Huntress is how the globe’s most underresourced businesses defend against today’s cyberthreats. As long as hackers keep hacking, we keep hunting.

Industry
Computer and Network Security
Company size
201-500 employees
Headquarters
Columbia, Maryland
Type
Privately Held
Founded
2015
Specialties
Cyber Breach Detection, Incident Response, Endpoint Protection, Malware Analysis, and Managed Services

Locations

Employees at Huntress

Updates

  • View organization page for Huntress, graphic

    68,449 followers

    Pull those threats out by the roots! A property management firm had a suspicious login within their network. But what made this particular login stick out? Courtesy of an alert generated via managed SIEM, the SOC learned that this login occurred from a known-malicious workstation! 👾 This threat actor compromised an account used for boardroom conferencing operations and moved laterally throughout the network. 🌐 The Huntress SOC immediately isolated the network, denying the threat actor further lateral movement then began work with the SOC support and tactical response teams to locate the initial access vector. 🕵️♀️ Locating the root cause of intrusions is critical, and helps our partners plug the right gaps so that threat actors are permanently evicted from their networks.

    • No alternative text description for this image
  • View organization page for Huntress, graphic

    68,449 followers

    Who here has ever had to wait endlessly for justice to be served?😞 Have you felt the frustration of delays, cancellations, and setbacks that make the process feel impossible? ⏳ Standing up to cybercriminals is never easy, but sharing your story can be a powerful step toward closure. In episode six of "RISE with Robert Cioffi," Robert, CTO and Co-founder of Progressive Computing, Inc., shares the emotional journey of reading his impact statement and confronting the attacker who turned his life upside down. Watch now to see how he found strength in the face of adversity. ➡️ https://lnkd.in/eZi4rFia

  • View organization page for Huntress, graphic

    68,449 followers

    According to IDC, a staggering 70% of breaches originate at the endpoint. 🫨 IT teams must now protect more endpoints—and a wider variety of endpoints—than ever before. 🫠 The perimeter has become much harder to defend. So where do you even start? ¯\_(ツ)_/¯ Here are nine key strategies to strengthen your endpoint security and minimize your risks. 👇

    9 Pro Tips for Better Endpoint Security

    9 Pro Tips for Better Endpoint Security

    Huntress on LinkedIn

  • View organization page for Huntress, graphic

    68,449 followers

    Shut the back door! A Midwest Credit Union with a nefarious persistent remote access backdoor unwittingly gave an adversary full access to the machine and network. 😬 Specifically, a user had fallen for a social engineering email persuading them to download and install a ScreenConnect instance that a cyber criminal controlled. 📩 The machine was isolated, the threat was reported on, and Active Remediation automatically eradicated this threat without the partner needing to intervene 🫡 Many security and IT practitioners advise re-imaging a machine to return it to a healthy security baseline, which is sage wisdom. 🖖 One additional note: Restoring from backups is a reflexive step many take after re-imaging. Keep in mind, if an infection has been on the machine for some time it MAY have been prior backed up - one may unintentionally be re-installing the infection See how Huntress Managed EDR can keep your back... and your backdoor covered: https://lnkd.in/gGgmapWM

    • No alternative text description for this image
  • View organization page for Huntress, graphic

    68,449 followers

    We hate to break it to you, but apps aren’t always your friend (not even the #AI you chat with). They’re definitely not your friend when attackers use them to cause havoc in your Azure ecosystem. In our next episode of #TradecraftTuesday, we’ll be diving into all the sketchy apps lurking in your Microsoft 365 and Azure environments, how these attacks work, and what you can do about them. https://lnkd.in/evS2N2mt

    Tradecraft Tuesday | When Apps Attack

    Tradecraft Tuesday | When Apps Attack

    www.linkedin.com

  • View organization page for Huntress, graphic

    68,449 followers

    A sobering dose of Dark Web 💊 Over the weekend a threat actor was selling access to a German IT company with over 70 million dollars in revenue-- but only a $800 price tag 😵💫 They offer access via Fortinet, likely from any number of the recent CVEs... No other users have responded to the thread yet. 🙅 Stay vigilant, but stay empowered! Talk about layering your defenses with your teams. It's the best way to stop these criminals in their tracks. 💪

    • No alternative text description for this image
  • View organization page for Huntress, graphic

    68,449 followers

    This #communityconfession from one of our partners is a chilling reminder of the sophisticated tactics used by cybercriminals. A real estate lawyer nearly fell victim to a meticulously crafted attack that combined: ✅ Psychological priming - a phone call claiming to be from a company closing a property sale with instructions to expect an email with documents ✅ Targeted phishing email - Shortly after the call, they received an email containing a Dropbox link and a password. ✅ Malicious JavaScript deployment - When clicked on and executed it triggered multiple programs to be installed and run. Huntress isolated the endpoint in five minutes and the incident was fully remediated in 30 minutes. The unsettling truth? AI is increasingly being used to make these attacks more convincing and commonplace. Key Takeaway: Multilayered security isn't just a recommendation—it's survival.

    • No alternative text description for this image

Similar pages

Browse jobs

Funding