
Do You Have a Security Hygiene Checklist in Place?
Without a strong security foundation in place, your customers will suffer from downtime and revenue loss, Huntress writes.

What Is Threat Hunting? A Definition for MSPs and Channel Partners
Huntress explains four types of hunts: intelligence-driven, data-driven, knowledge-driven & hybrid hunts. Here are details for MSPs.

Practical Tips for Conducting Digital Forensics Investigations
Here’s how MSPs, MSSPs & security analysts can fast-track digital forensics investigations & save time, according to Huntress.

Don’t Get Schooled: How MSPs and Security Teams Can Catch a Phish
Phishing is one of the top four key paths for threat actors to achieve success in their attacks and one of the top five sources of breaches.

Four Sneaky Attacker Evasion Techniques You Should Know About
Hackers have learned to be quiet when infiltrating an environment. Huntress explains what MSPs & MSSPs need to know about defense evasion.

Navigating the NIST Cybersecurity Framework
The NIST cybersecurity framework has five pillars — Identify, Protect, Detect, Respond and Recover — for cybersecurity best practices.

What Is Defense Evasion?
By understanding defense evasion techniques, MSSPs & MSPs can harden their arsenal of traps & detections against hackers & adversaries, Huntress asserts.

One Year Later: Lessons Learned from the Colonial Pipeline Cyberattack
Huntress explains what caused the Colonial Pipeline ransomware attack, and how MSPs can prevent similar cyberattacks.

What Should A Modern Cybersecurity Stack Look Like?
Huntress explains the critical layers that security-driven MSPs need to address for themselves and end-customers.

Targeted APT Activity: BABYSHARK Is Out for Blood
This blog follows the ThreatOps investigation of targeted DPRK (North Korean) backed cyber espionage efforts against Nuclear Think Tanks.