Welcome to the Huntress Cybersecurity Blog, your go-to spot for staying ahead of hackers and boosting your cybersecurity savviness. Our blog contributors have focused on making cybersecurity education engaging and accessible for everyone.
From Custom Scripts to Commodity RATs: A Threat Actor’s Evolution to PureRAT
SAT in 2025 Report: What Are You Really Getting from Your Security Awareness Training?
Average Cost of a Data Breach
What Is Managed EDR, and What Does It Mean for Investigations?
The Wolf in Admin Clothing: How Malicious Hackers Try to Infiltrate Your IT Team
Huntress Threat Advisory: The Dangers of Storing Unencrypted Passwords
How an Attacker’s Blunder Gave Us a Rare Look Inside Their Day-to-Day Operations
What Is Single Sign-On?
What Is Multi-Factor Authentication? A Complete Guide to MFA Security
Obscura, an Obscure New Ransomware Variant
Cloudy with a Chance of Misinformation: Debunking Microsoft 365 & Identity Myths
The ClickFix Attack That Wasn’t: From a Fake AnyDesk Installer to MetaStealer
Journey to the Center of the Dark Web: A Tradecraft Tuesday Recap
Should MSPs Turn Off Google Gemini?
Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.