At Huntress, we believe: - ALL businesses deserve enterprise-grade security, not just the 1% - Cybersecurity should be accessible, not exclusive - Local governments, schools, hospitals, and manufacturers deserve the same protection as big tech - Protecting organizations below the cybersecurity poverty line is one of the most urgent challenges in our industry And our new strategic advisory board member thinks so, too. We’re honored to welcome Jen Easterly to the Huntress Strategic Advisory Board. With decades of experience leading security efforts at the highest levels, she’s joining Huntress to help solve a problem we’ve both been tackling from different angles for years: how to protect the millions of organizations that fall below the cybersecurity poverty line. “Cybercrime is outpacing the growth of most U.S. businesses, state-sponsored actors are relentlessly targeting critical infrastructure, and threat actors are continually evolving their tactics… That’s why I’m excited to join Huntress to disrupt threat actors in bold, innovative ways and make a real, measurable impact on our community,” -- Jen Easterly. She’ll be joining us live at #BHUSA, Booth 2451. Come say “hey.” Read more about her appointment here: https://lnkd.in/gN8G-zsA
Huntress
Computer and Network Security
Columbia, Maryland 99,066 followers
Managed #cybersecurity without the complexity. EDR, ITDR, SIEM & SAT crafted for under-resourced IT and Security teams.
About us
Protect Your Endpoints, Identities, Logs, and Employees. The fully managed security platform that combines endpoint detection and response, Microsoft 365 identity protection, a predictably affordable SIEM and science-based security awareness training. Powered by custom-built enterprise technology for mid-market enterprises, small businesses, and the MSPs that support them and delivered by unrivaled industry analysts in our 24/7 Security Operations Center. By delivering a suite of purpose-built solutions that meet budget, security, and peace-of-mind requirements, Huntress is how the globe’s most underresourced businesses defend against today’s cyberthreats. As long as hackers keep hacking, we keep hunting.
- Website
-
https://huntress.com
External link for Huntress
- Industry
- Computer and Network Security
- Company size
- 501-1,000 employees
- Headquarters
- Columbia, Maryland
- Type
- Privately Held
- Founded
- 2015
- Specialties
- Cyber Breach Detection, Incident Response, Endpoint Protection, Malware Analysis, and Managed Services
Locations
-
Primary
6996 Columbia Gateway Dr
Columbia, Maryland 21046, US
Employees at Huntress
Updates
-
We're closing the books on #BHUSA. Day 1, we built our BlackHat HQ, stocked it with swag, and got to work. Day 2, we went full throttle. From packed theater sessions and booth deep-dives to swag sightings in the wild, our crew made the most of every minute. 🏎️ Highlights from our final lap: ✔️ A pit stop at the Microsoft booth (sprinkle donuts included) 🍩 ✔️ Demos running hot ‘til the very end ✔️ Hanging out with our partners ✔️ Monster consumption reaching legendary status BlackHat 2025: thanks for the conversations, the laughs, and the opportunity to push our mission forward. Until next time… 💪 Huntress
-
-
Dear Diary, Finished day one at #BHUSA. Spirits are high. Caffeine levels are…concerning. The booth is built. The swag is flowing. And the team? Already wrecking threats and making new friends. Some early highlights: ✔️ Ate lunch on the floor like seasoned conference goblins ✔️ Had three people ask what ClickFix is ✔️ Welcomed our newest Huntress Advisory Board Member, Jen Easterly ✔️ Spotted a guy carrying an open laptop and two Monsters (I think his name was Kyle) Will report back tomorrow. 💪 Huntress
-
-
-
-
-
+2
-
-
Today at #BHUSA: A Boss Level double feature! 🎙️ Strategic vision with Jen Easterly 🔐 Full access AMA with John Hammond & Jonathan Johnson ⚡ Back-to-back at Booth 2451.
-
-
Cybersecurity isn’t just for the 1%. We build for the internal teams doing more with less, the IT pros wearing too many hats, and the MSPs holding the line. This week at #BHUSA, we’re showing how: 🔐 Real attacks get shut down in real time 🎯 Detection goes deeper than signatures 🤝 Hackers who don’t just defend, they hunt Want to go deeper? Catch John Hammond unpacking stealthy Linux persistence techniques you’ve probably never seen. Then join us on August 7 at Booth 2246 for our joint session with Microsoft. (We’re talking more coverage, less spend.) All week long at Booth 2451. See you there.
-
🕵️♂️ What’s lurking in the depths of the dark web? This month’s Tradecraft Tuesday takes you into the shadows to explore: 👉 The types of data sold and how it’s monetized 👉 Risks for organizations targeted by initial access brokers 👉 Examples of shady activity, like Play ransomware Our experts will peel back the layers and give you the info needed to stay safe from dark web shadiness. Don’t miss out, register now: https://lnkd.in/gHmT-6jg
-
-
⚠️ Huntress has been responding to an ongoing wave of high-severity Akira ransomware incidents originating from SonicWall devices. - We’ve seen around 20 different attacks so far, with the first of these starting on July 25 - Some of the attackers in these incidents have at least part of the same playbook - We’ve seen threat actors using tools like Advanced_IP_Scanner, WinRAR, and FileZilla, and installing new accounts or full blown RMMs like AnyDesk for persistence What should you do? ✅ Disable your SonicWall VPN. We strongly advise you to disable SSL VPN access on your SonicWall appliances until an official patch and guidance are released. ✅ If you can't disable It, lock it down. If the VPN is business-critical, immediately restrict access to a minimal allow-list of known, trusted IP addresses. Segment the network to prevent a breach of the appliance from immediately providing access to critical servers like domain controllers. ✅ Learn more about this active exploit and get an up-to-date list of indicators of compromise: https://lnkd.in/gsJS5Qpr 👀 Help the Huntress SOC! If you're a SonicWall user you can help us gather more intelligence on this exploit and the surrounding activity by spinning up a free trial of SIEM: https://lnkd.in/gPHHzcyN
-
-
Heads up: our SOC has eyes on what appears to be active exploitation of SonicWall devices, possibly a zero day. We’re seeing threat actors bypass MFA, pivot to domain controllers, and deploy ransomware like Akira. Our Senior SOC Manager Dray A. just broke it down in a post that’s making the rounds across LinkedIn. If you manage SonicWall infrastructure, take 3 minutes and read this now. IOCs + guidance. 👇👇👇
🚨 Sonicwall Exploitation (zero day?) 🚨 Update: we have a blog on this https://lnkd.in/gcrD5uxn 👀 What is happening 👀 Huntress has observed a number of threat actors gain access into internal networks via Sonicwall devices. This is happening at a pace that suggests exploitation, possibly a zero day exploit in Sonicwall. Threat actors have gained control of accounts that even have MFA deployed. Threat actors are pivoting from the Sonicwall device straight to the DC. Their post-compromise activities range from ransomware (akira, we suspect) to creating additional users for persistence. ⁉️ What should I do / what does Huntress advise⁉️ We first advise that the Sonicwall VPN services are disabled, until a patch or communication from Sonicwall materialises. If the Sonicwall VPN must be kept online, restrict VPN access to a number of trusted IPs, and segment the network to limit pivot opportunities Contact Sonicwall support for more information and guidance, as so far there have not been any comms from Sonicwall If you're a current Huntress partner, ensure you've deployed Huntress SIEM and are exporting your Sonicwall logs, to allow us additional security visibility, and please make sure our EDR is installed on all machines . If you're not yet a Huntress partner, leverage our trial for monitoring (if you want, disable the trial after when this Sonicwall situ is done, I'm not after your money 🙏 ) https://lnkd.in/efYiNJdr 🔍 IPv4s observed 🔍 142.252.99[.]59 45.86.208[.]240 77.247.126[.]239 104.238.205[.]105 193.239.236[.]149 104.238.220[.]216 193.163.194[.]7 194.33.45[.]155 64.44.118[.]206 185.199.103[.]100
-