The tournament we’ve all been *really* waiting for is finally tipping off ? Yes, the “Worst Places to Store Your Password” tournament has arrived! We asked our online community on LinkedIn and our Huntress community on Slack to share their wildest examples of the best (worst) places to store a password. The results? This stunning bracket. Now that you’ve seen the lineup, the big question is: Who you got?! ?? Get the inside edge on your office bracket by reading the tournament breakdown: https://lnkd.in/eeTunYwK
Huntress
计算机和网络安全
Columbia,Maryland 82,091 位关注者
Managed #cybersecurity without the complexity. EDR, ITDR, SIEM & SAT crafted for under-resourced IT and Security teams.
关于我们
Protect Your Endpoints, Identities, Logs, and Employees. The fully managed security platform that combines endpoint detection and response, Microsoft 365 identity protection, a predictably affordable SIEM and science-based security awareness training. Powered by custom-built enterprise technology for mid-market enterprises, small businesses, and the MSPs that support them and delivered by unrivaled industry analysts in our 24/7 Security Operations Center. By delivering a suite of purpose-built solutions that meet budget, security, and peace-of-mind requirements, Huntress is how the globe’s most underresourced businesses defend against today’s cyberthreats. As long as hackers keep hacking, we keep hunting.
- 网站
-
https://huntress.com
Huntress的外部链接
- 所属行业
- 计算机和网络安全
- 规模
- 501-1,000 人
- 总部
- Columbia,Maryland
- 类型
- 私人持股
- 创立
- 2015
- 领域
- Cyber Breach Detection、Incident Response、Endpoint Protection、Malware Analysis和Managed Services
地点
-
主要
6996 Columbia Gateway Dr
US,Maryland,Columbia,21046
Huntress员工
动态
-
The worst time to find out someone messed around with your data logs? After a threat actor dumps encryption on your network. Here’s what happened?? First, a Remote Desktop Gateway was compromised, followed by: ?? Domain mapping ?? Credentials theft from the registry and other locations Then things got interesting: ?? The Windows Application log was cleared ?? PowerShell was set up to not log console history ?? Shadow copies were deleted to make recovery tricky if encryption was used Crisis averted: Our SOC isolated the network before the threat actor dropped any nasty encryption Here’s a few ways to lock down your data logs ?? Roll out managed SIEM: logs are streamed to a safe location away from the host including logs cleared on the endpoint ?? Set up a solid backup plan: make sure shadow copy deletion doesn’t catch you by surprise
-
-
A US construction company had a threat actor lurking in their network. Let’s break it down ?? ??? They authenticated onto the VPN with a compromised user account ?? Attempted to dump registry hives for credential theft, but got blocked by our Managed Microsoft Defender ?? Controlled two user accounts before our SOC stopped the intrusion Additional analysis showed their initial access started from a malicious IPv4 address connected to a ransomware actor. Here’s how to turn up the heat on attackers like this one: ?? Add MFA to your VPN for an additional security obstacle ?? Deploy security solutions on all devices. Don’t be stingy: workstations, gateway devices, and more ?? Consider expanding your devices' default logging size, as we often find logs get overwritten quickly during intrusions
-
-
These are the #ransomware groups that businesses need to be aware of ?? ?? 21.4% of ransomware attacks we observed came from RansomHub ?? 16.8% of attacks were from Inc/Lynx ?? 15.8% originated from Akira Get the insights to really defend against today’s biggest ransomware threats with the Huntress 2025 Cyber Threat Report: https://lnkd.in/gheY3dQZ
-
-
Huntress转发了
Pretty sure this pitstop from Sebring over the weekend perfectly mimics the daily IT / Security grind ?? Issues flying in from left-field fast af ?? The team rapidly springing into action—excuting their roles with precision ??? Fires igniting from unexpected places ?? All the beautiful nuance underappreciated by those in the stands. I’m thankful as hell for the pit crew out there who make the magic possible ?? Credit: Forte Racing, Automobili Lamborghini S.p.A., and Huntress
-
Unpatched Microsoft Exchange servers are an open invitation to threat actors?? ??They drop webshells ??Scout out post-exploitation shenanigans: ?? Enumeration via WMIC ?? ARP Scanning Threat actors are obsessed with scanning and exploiting unpatched Exchange servers. They’re all about persistence with minimal detection and lateral movement. So don’t run on borrowed time: ?? Patch immediately: we see way too many ancient Exchange servers ?? Scan for webshells: look for suspicious ASPX files in Exchange and IIS directories ?? Watch for unexpected child processes especially from IIS web processes ?? Use strong EDR and logging for perimeter devices, including MS Exchange
-
-
Ever wondered how credential dumping and lateral movement are flagged almost immediately? Check out this example of SIEM and EDR working together to detect threats in under a minute, preventing threat actors from causing catastrophic damage to your environment. More combined telemetry means faster detection and response, along with a richer environment for root cause analysis of threat activity. Read more about how HUntress Managed SIEM will help stop threats in their tracks: https://lnkd.in/eqQuAzj3
-
A manufacturer found that an employee downloaded Gootloader malware via an SEO poisoning attack. From there: ?? Huntress EDR flagged anomalous domain enumeration ?? We found a newly created account: “Administralol”? ?? Investigated further—turns out, the entry point was Gootloader malware ?? Attackers tried to persist with a scheduled task running JavaScript This story isn't unique. Here are real cases of attacks that have blown by traditional defenses and became threats that stuck around for years???
-
Here’s how to stop attacks in minutes with managed SIEM ?? ?? This threat actor logged in from a known, sketchy workstation ?? Our Managed SIEM sent out an alert, giving our SOC the heads up ?? Then in <5 minutes, we kicked them out to prevent further access When you’re rocking a managed SIEM backed by a 24/7 SOC, you don’t hear about attacks AFTER you’ve been wrecked—you shut them down *before* they even start
-
-
A threat actor slid into a network through exposed virtual network computing (VNC). Here’s what happened ?? ? They deployed C:\\Users\\<redacted>\\Music\\setup.msi to install Atera & Splashtop for persistent remote access ? Splashtop beaconed to the malicious public IP ? Transferred and ran credential dumping tools with Splashtop Our SOC reacted quickly. We dug into the attack, isolated the network, and shut down the persistence path. Here’s how to tighten up your remote access security ?? ?? Put remote connection tools like VNC behind the firewall or use a VPN with MFA enabled ?? Use software allow-listing and strict firewall rules to block threat actors from installing unauthorized remote access tools
-