<?xml version="1.0" encoding="utf-8"?>
  <rss version="2.0"
  	xmlns:atom="http://www.w3.org/2005/Atom"
  	xmlns:media="http://search.yahoo.com/mrss/">
  	<channel>
  		<title>Huntress Blog</title>
  		<link>https://www.huntress.com/blog</link>
  		<description></description>
      <pubDate>2026-03-26T20:35:07Z</pubDate>
      <ttl>60</ttl>
      <generator></generator>
		  <atom:link href="https://www.huntress.com/blog/rss.xml" rel="self" type="application/rss+xml"/>
      <item>
        <title>ITDR for Google Workspace | Huntress Managed ITDR</title>
        <link>https://www.huntress.com/blog/managed-itdr-google-workspace</link>
        <guid>https://www.huntress.com/blog/managed-itdr-google-workspace</guid>
        <description>Huntress now delivers ITDR for Google Workspace to protect identities against BEC, inbox rule manipulation, and account takeover, all with a 24/7 SOC-led response.</description>
        <pubDate>2026-03-24T14:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ff50258dcf289440fbf8cefa925d630c0" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ff50258dcf289440fbf8cefa925d630c0"/>
      </item>
      <item>
        <title>Threat Actors Abuse Railway.com PaaS as Microsoft 365 Token Attack Infrastructure</title>
        <link>https://www.huntress.com/blog/railway-paas-m365-token-replay-campaign</link>
        <guid>https://www.huntress.com/blog/railway-paas-m365-token-replay-campaign</guid>
        <description>Railway PaaS is being weaponized as a clean token replay engine in an active AiTM and device code phishing campaign impacting 268+ M365 organizations and 100+ MSPs.</description>
        <pubDate>2026-03-23T21:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F999417a678674eecbe7bec00539cef07" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F999417a678674eecbe7bec00539cef07"/>
      </item>
      <item>
        <title>A _declassified Look Inside the Dark Economy of Cybercrime</title>
        <link>https://www.huntress.com/blog/declassified-cybercrime-episode-one</link>
        <guid>https://www.huntress.com/blog/declassified-cybercrime-episode-one</guid>
        <description>Uncover the dark economy of cybercrime, from organized scam centers and the criminal customer journey to the use of generative AI in scaling attacks.</description>
        <pubDate>2026-03-23T15:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F611485d87824467eb49720d80c460eed" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F611485d87824467eb49720d80c460eed"/>
      </item>
      <item>
        <title>7 Key Manufacturing Cybersecurity Trends for 2026 | Huntress</title>
        <link>https://www.huntress.com/blog/manufacturing-cybersecurity-trends</link>
        <guid>https://www.huntress.com/blog/manufacturing-cybersecurity-trends</guid>
        <description>Explore the latest manufacturing cybersecurity trends, from ransomware to OT takeovers, and real-world risks to production. Learn how to secure your plant.</description>
        <pubDate>2026-03-23T13:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7c47e69fab0846449394eaa2f87accdb" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7c47e69fab0846449394eaa2f87accdb"/>
      </item>
      <item>
        <title>Meet Cody Browning, a Beekeeper in Cybersecurity </title>
        <link>https://www.huntress.com/blog/employee-spotlight-cody-browning</link>
        <guid>https://www.huntress.com/blog/employee-spotlight-cody-browning</guid>
        <description>Meet Huntress Reseller Sales Manager Cody Browning. Learn how his grandmother&#39;s vishing scam inspired his career and fuels our mission to bring human-led cybersecurity to all businesses.</description>
        <pubDate>2026-03-19T14:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F104ffd2720d54b119027f5122f45dd40" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F104ffd2720d54b119027f5122f45dd40"/>
      </item>
      <item>
        <title>How a Tax Search Leads to Kernel-Mode AV/EDR Kill</title>
        <link>https://www.huntress.com/blog/w2-malvertising-to-kernel-mode-edr-kill</link>
        <guid>https://www.huntress.com/blog/w2-malvertising-to-kernel-mode-edr-kill</guid>
        <description>Huntress uncovers a tax-themed malvertising campaign using Google Ads, dual cloaking, rogue ScreenConnect, and an undocumented Huawei driver to kill AV/EDR.</description>
        <pubDate>2026-03-19T14:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc8299f4be3cd40989dda448b1c997c35" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc8299f4be3cd40989dda448b1c997c35"/>
      </item>
      <item>
        <title>Something Phishy in the /tmp Folder</title>
        <link>https://www.huntress.com/blog/huntress-stops-mac-infostealer-before-damage</link>
        <guid>https://www.huntress.com/blog/huntress-stops-mac-infostealer-before-damage</guid>
        <description>Huntress’ AI-Centric SOC recently stopped a MacSync infostealer attack on a macOS device. The malware attempted to scrape credentials, browser cookies, and crypto wallets, but Huntress contained the threat before any data was sent to the attacker. Learn how we did it.</description>
        <pubDate>2026-03-18T14:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7511b8d2a9ad4b5598d5991a0edc1a74" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7511b8d2a9ad4b5598d5991a0edc1a74"/>
      </item>
      <item>
        <title>Huntress Expands Into Proactive Security Posture Management</title>
        <link>https://www.huntress.com/blog/proactive-security-posture-management</link>
        <guid>https://www.huntress.com/blog/proactive-security-posture-management</guid>
        <description>Huntress &quot;shifts left&quot; with Managed ESPM and Managed ISPM. We proactively harden your endpoints and identities to close the security gaps that attackers love to exploit. </description>
        <pubDate>2026-03-17T14:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F70cd2fec3a034623a150d9a634391a3d" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F70cd2fec3a034623a150d9a634391a3d"/>
      </item>
      <item>
        <title>Five Shady Phishing Email Techniques We Spotted </title>
        <link>https://www.huntress.com/blog/five-shady-phishing-email-techniques-we-spotted-in-2025</link>
        <guid>https://www.huntress.com/blog/five-shady-phishing-email-techniques-we-spotted-in-2025</guid>
        <description>From fake UPS shipping notifications to PayPal-themed callback phishing, here are the five top phishing techniques we’re seeing this year. </description>
        <pubDate>2026-03-16T21:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F36607f6c8053422cafbf65256f84ad34" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F36607f6c8053422cafbf65256f84ad34"/>
      </item>
      <item>
        <title>3-2-1 Backup Rule: What It Is + How To Implement | Huntress</title>
        <link>https://www.huntress.com/blog/3-2-1-backup-rule</link>
        <guid>https://www.huntress.com/blog/3-2-1-backup-rule</guid>
        <description>Discover how the 3-2-1 backup rule strengthens your backup strategy against ransomware. Plus, learn how to implement cloud backup best practices with ease.</description>
        <pubDate>2026-03-16T12:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fa2bc84fa8acc43819198ff422db2802f" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fa2bc84fa8acc43819198ff422db2802f"/>
      </item>
      <item>
        <title>How the Huntress SOC Stopped a VPN-Based Ransomware Attack </title>
        <link>https://www.huntress.com/blog/exposed-vpn-ransomware-attack</link>
        <guid>https://www.huntress.com/blog/exposed-vpn-ransomware-attack</guid>
        <description>Get an insider look at how the Huntress SOC stopped an unsecured VPN based ransomware attack. Learn why your business needs more than just software to stay secure. </description>
        <pubDate>2026-03-13T07:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F820180a3605944729ac35853d337fc0c" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F820180a3605944729ac35853d337fc0c"/>
      </item>
      <item>
        <title>Data Exfiltration and Threat Actor Infrastructure Exposed </title>
        <link>https://www.huntress.com/blog/data-exfiltration-threat-actor-infrastructure-exposed</link>
        <guid>https://www.huntress.com/blog/data-exfiltration-threat-actor-infrastructure-exposed</guid>
        <description>Threat actors are people, too, and like everyone else, make mistakes. These mistakes can reveal insights into the threat actor, or even expose access to their infrastructure.</description>
        <pubDate>2026-03-12T14:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7c3626d557ce4a6f8bc1308fbfbe75ce" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7c3626d557ce4a6f8bc1308fbfbe75ce"/>
      </item>
      <item>
        <title>How Threat Actors Abuse Remote Management Software for Initial Access</title>
        <link>https://www.huntress.com/blog/daisy-chaining-rogue-rmm-tools</link>
        <guid>https://www.huntress.com/blog/daisy-chaining-rogue-rmm-tools</guid>
        <description>The abuse of remote monitoring and management (RMM) tools is surging. See how threat actors daisy chain RMM software for initial access, persistence, and detection evasion.</description>
        <pubDate>2026-03-11T14:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb3094245731e4ea0ae705ab70fd0a375" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb3094245731e4ea0ae705ab70fd0a375"/>
      </item>
      <item>
        <title>36 Must-Know Password Statistics for 2026 | Huntress</title>
        <link>https://www.huntress.com/blog/password-statistics</link>
        <guid>https://www.huntress.com/blog/password-statistics</guid>
        <description>The top password statistics might surprise you. Learn how common poor password hygiene is, plus tips for protecting your precious credentials better. </description>
        <pubDate>2026-03-09T14:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F4458c2e8594e4cb19c5b6acc5e2023af" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F4458c2e8594e4cb19c5b6acc5e2023af"/>
      </item>
      <item>
        <title>Top 10 Worst Places to Store a Password | Huntress</title>
        <link>https://www.huntress.com/blog/top-10-worst-places-to-store-a-password</link>
        <guid>https://www.huntress.com/blog/top-10-worst-places-to-store-a-password</guid>
        <description>Check out the top 10 worst places to store your password, as commented by IT and information security professionals.</description>
        <pubDate>2026-03-09T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ff33e3f870d624a078e20a7b5f0fb8a81" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ff33e3f870d624a078e20a7b5f0fb8a81"/>
      </item>
      <item>
        <title>A Threat Actor Abuses Another Free Trial</title>
        <link>https://www.huntress.com/blog/threat-actor-abuses-elastic-cloud-siem</link>
        <guid>https://www.huntress.com/blog/threat-actor-abuses-elastic-cloud-siem</guid>
        <description>A deep dive into a threat actor who exploited SolarWinds Web Help Desk, abused an Elastic Cloud SIEM free trial for exfiltration and triage, revealing key infrastructure.</description>
        <pubDate>2026-03-06T21:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ff0f80ff4b2474af1b6bee7f1f153a7f2" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ff0f80ff4b2474af1b6bee7f1f153a7f2"/>
      </item>
      <item>
        <title>Unmasking an Attack Chain of MuddyWater </title>
        <link>https://www.huntress.com/blog/muddywater-attack-chain</link>
        <guid>https://www.huntress.com/blog/muddywater-attack-chain</guid>
        <description>Huntress has identified and detailed a full timeline of an intrusion in a customer environment that aligns with what others have identified as MuddyWater (Iranian-linked APT). </description>
        <pubDate>2026-03-06T15:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F3a0138d127a04b778b8acb4d49fa54a9" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F3a0138d127a04b778b8acb4d49fa54a9"/>
      </item>
      <item>
        <title>SSO vs. MFA: Key Differences, Compared + Explained | Huntress</title>
        <link>https://www.huntress.com/blog/improving-security-with-sso-and-mfa</link>
        <guid>https://www.huntress.com/blog/improving-security-with-sso-and-mfa</guid>
        <description>SSO vs. MFA: Why choose between the two? Learn how both single sign-on and multi-factor authentication can improve your cybersecurity posture.</description>
        <pubDate>2026-03-05T21:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc81285fc19634fc49e9b8493adba75cc" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc81285fc19634fc49e9b8493adba75cc"/>
      </item>
      <item>
        <title>How a Pharmacy Cyberattack is a Warning Sign for Healthcare’s Cybersecurity Vulnerabilities | Huntress</title>
        <link>https://www.huntress.com/blog/how-a-pharmacy-cyberattack-is-a-warning-sign-for-healthcares-cybersecurity-vulnerabilities</link>
        <guid>https://www.huntress.com/blog/how-a-pharmacy-cyberattack-is-a-warning-sign-for-healthcares-cybersecurity-vulnerabilities</guid>
        <description>Learn how a single cyberattack on a pharmacy tech provider disabled access for millions of patients and what it means for the healthcare industry moving forward.</description>
        <pubDate>2026-03-05T21:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F374792e4aaff4ec8a6563349ad7f19d1" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F374792e4aaff4ec8a6563349ad7f19d1"/>
      </item>
      <item>
        <title>Most Common Passwords 2026: Is Yours on the List?</title>
        <link>https://www.huntress.com/blog/most-common-passwords</link>
        <guid>https://www.huntress.com/blog/most-common-passwords</guid>
        <description>Discover the most common passwords that put you and your business at risk, and get easy tips to improve your password security.</description>
        <pubDate>2026-03-05T19:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F4342537f4a414630aba1ccc7d9448331" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F4342537f4a414630aba1ccc7d9448331"/>
      </item>
      <item>
        <title>RMM Abuse: When IT Convenience Bites Back</title>
        <link>https://www.huntress.com/blog/rmm-abuse-when-it-convenience-bites-back</link>
        <guid>https://www.huntress.com/blog/rmm-abuse-when-it-convenience-bites-back</guid>
        <description>Cybercrime and RMM abuse is up 277% as attackers exploit trusted tools for stealthy access. Learn how to shift from overtrust to verifying behavior and secure your network.</description>
        <pubDate>2026-03-05T08:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F766d74b8127a4092a655219262a74316" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F766d74b8127a4092a655219262a74316"/>
      </item>
      <item>
        <title>Why BEC Is Now an Identity Problem</title>
        <link>https://www.huntress.com/blog/gws-business-email-compromise-identity-problem</link>
        <guid>https://www.huntress.com/blog/gws-business-email-compromise-identity-problem</guid>
        <description>Modern BEC attacks now abuse Google Workspace identities. Discover why BEC is an identity problem, and learn how to secure your organization against these threats.</description>
        <pubDate>2026-03-05T06:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc05b5a32484f4445a7c65b10eef50b8d" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc05b5a32484f4445a7c65b10eef50b8d"/>
      </item>
      <item>
        <title>How Fake OpenClaw Installers Spread GhostSocks Malware</title>
        <link>https://www.huntress.com/blog/openclaw-github-ghostsocks-infostealer</link>
        <guid>https://www.huntress.com/blog/openclaw-github-ghostsocks-infostealer</guid>
        <description>Huntress warns of fake OpenClaw installers on GitHub deploying malware. Learn how these attacks happen, identify signs of infection, and stay protected. </description>
        <pubDate>2026-03-04T15:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F737fa2e793e9459cbfbe5546ef9a22fb" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F737fa2e793e9459cbfbe5546ef9a22fb"/>
      </item>
      <item>
        <title> The Evolving Linux Threat Landscape</title>
        <link>https://www.huntress.com/blog/evolving-linux-threat-landscape</link>
        <guid>https://www.huntress.com/blog/evolving-linux-threat-landscape</guid>
        <description>Learn about the narrowing threat gap, the rise of cross-platform attacks (like WSL abuse), and the specific ransomware and nation-state actors targeting Linux endpoints in 2026.</description>
        <pubDate>2026-03-03T15:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F78afdb6e5575435398832a46a7d1fe36" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F78afdb6e5575435398832a46a7d1fe36"/>
      </item>
      <item>
        <title>Fake Tech Support Delivers Havoc Command &amp; Control</title>
        <link>https://www.huntress.com/blog/fake-tech-support-havoc-command-control</link>
        <guid>https://www.huntress.com/blog/fake-tech-support-havoc-command-control</guid>
        <description>Adversaries leverage fake tech support to deploy a modified Havoc C2 agent, employing DLL sideloading, syscall evasion (HellsGate), and RMM tools for persistent access.</description>
        <pubDate>2026-03-02T15:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F9bdb1bdd58d8465597e8476e8f9958e9" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F9bdb1bdd58d8465597e8476e8f9958e9"/>
      </item>
      <item>
        <title>A Survivor’s Journey Through the Cybercrime Underground</title>
        <link>https://www.huntress.com/blog/survivor-journey-human-trafficking-cybercrime-underground</link>
        <guid>https://www.huntress.com/blog/survivor-journey-human-trafficking-cybercrime-underground</guid>
        <description>From an IT job to forced underground cybercrime, Mohammad’s story exposes the global trafficking network behind massive crypto scams.  Learn the signs to stay safe. </description>
        <pubDate>2026-02-26T08:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ffc0d986c4df74f91b3453f02667c2f5f" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ffc0d986c4df74f91b3453f02667c2f5f"/>
      </item>
      <item>
        <title>Disrupting Attacks on Endpoints | Attack Disruption Engine</title>
        <link>https://www.huntress.com/blog/disrupting-endpoint-attacks-with-huntress-managed-edr</link>
        <guid>https://www.huntress.com/blog/disrupting-endpoint-attacks-with-huntress-managed-edr</guid>
        <description>Standard EDR creates a gap between detection and action. Huntress closes it. Learn how our Attack Disruption Engine automatically disrupts threat actors and reduces the impact of endpoint attacks.</description>
        <pubDate>2026-02-25T06:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F426a8058e00d45cd9d57e4d0c8884fc5" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F426a8058e00d45cd9d57e4d0c8884fc5"/>
      </item>
      <item>
        <title>The Growing Reality of AI-Enhanced Candidate Fraud</title>
        <link>https://www.huntress.com/blog/ai-enhanced-candidate-fraud</link>
        <guid>https://www.huntress.com/blog/ai-enhanced-candidate-fraud</guid>
        <description>AI-driven deception is the new reality in hiring. Explore key statistics on deepfakes and resume fraud, and learn data-informed strategies to solidify your defense.</description>
        <pubDate>2026-02-20T14:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc34ed870b8c64018bc973e475b5bb015" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc34ed870b8c64018bc973e475b5bb015"/>
      </item>
      <item>
        <title>Hiding in Plain Sight with App Domain Manager Injection</title>
        <link>https://www.huntress.com/blog/app-domain-manager-injection</link>
        <guid>https://www.huntress.com/blog/app-domain-manager-injection</guid>
        <description>Uncover how attackers use App Domain Manager injection to run code inside trusted .NET apps by tweaking config files and bypassing application controls. Learn key strategies to detect and stop these attacks.</description>
        <pubDate>2026-02-19T06:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F295cdbb45b384ef6978ee56f48e5517e" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F295cdbb45b384ef6978ee56f48e5517e"/>
      </item>
      <item>
        <title>A New RAT and a Hands-on-Keyboard Intrusion</title>
        <link>https://www.huntress.com/blog/clickfix-matanbuchus-astarionrat-analysis</link>
        <guid>https://www.huntress.com/blog/clickfix-matanbuchus-astarionrat-analysis</guid>
        <description>ClickFix infection deploys Matanbuchus 3.0 loader and drops a new RAT that we’ve dubbed AstarionRAT. We break down the layers and the hands-on intrusion that followed.</description>
        <pubDate>2026-02-16T06:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F3361a6638bc34222a64a5ff354adf587" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F3361a6638bc34222a64a5ff354adf587"/>
      </item>
      <item>
        <title>The Identity Breach You Didn’t Know You Had: Google Workspace</title>
        <link>https://www.huntress.com/blog/identity-breach-google-workspace</link>
        <guid>https://www.huntress.com/blog/identity-breach-google-workspace</guid>
        <description></description>
        <pubDate>2026-02-12T06:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fab617072bfd74293b33995278717e506" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fab617072bfd74293b33995278717e506"/>
      </item>
      <item>
        <title>Employee Monitoring and SimpleHelp Software Abused in Ransomware Operations</title>
        <link>https://www.huntress.com/blog/employee-monitoring-simplehelp-abused-in-ransomware-operations</link>
        <guid>https://www.huntress.com/blog/employee-monitoring-simplehelp-abused-in-ransomware-operations</guid>
        <description>Huntress uncovers ransomware operations abusing employee monitoring software and SimpleHelp RMM for persistence, and ransomware deployment.</description>
        <pubDate>2026-02-11T15:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F87bc5f4d8c704215a195e73a96bd6e02" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F87bc5f4d8c704215a195e73a96bd6e02"/>
      </item>
      <item>
        <title>10 Endpoint Security Trends and Tips for 2026 | Huntress</title>
        <link>https://www.huntress.com/blog/endpoint-security-trends</link>
        <guid>https://www.huntress.com/blog/endpoint-security-trends</guid>
        <description>Learn the latest endpoint security trends, from AI-powered defense to zero trust and human-led threat hunting that help under-resourced teams stop threats faster.</description>
        <pubDate>2026-02-09T14:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb9600605dc5746c29d4bceff994cfd69" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb9600605dc5746c29d4bceff994cfd69"/>
      </item>
      <item>
        <title>Active Exploitation of SolarWinds Web Help Desk (CVE-2025-26399)</title>
        <link>https://www.huntress.com/blog/active-exploitation-solarwinds-web-help-desk-cve-2025-26399</link>
        <guid>https://www.huntress.com/blog/active-exploitation-solarwinds-web-help-desk-cve-2025-26399</guid>
        <description>Huntress has observed active exploitation of a deserialization and remote code execution against the SolarWinds Web Help Desk software (CVE-2025-26399).</description>
        <pubDate>2026-02-08T06:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc22306eb3b8b4d78946a62ab83024fd9" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc22306eb3b8b4d78946a62ab83024fd9"/>
      </item>
      <item>
        <title>Windows Projected File System (ProjFS) Internals: A Technical Deep Dive</title>
        <link>https://www.huntress.com/blog/windows-projected-file-system-mechanics</link>
        <guid>https://www.huntress.com/blog/windows-projected-file-system-mechanics</guid>
        <description>Huntress uncovers the mechanics of the Windows Projected File System. Explore the ProjFS driver, virtualization roots, and the PowerShell commands.</description>
        <pubDate>2026-02-05T15:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F3ded56fa55be4fda98978f5d73189087" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F3ded56fa55be4fda98978f5d73189087"/>
      </item>
      <item>
        <title>They Got In Through SonicWall. Then They Tried to Kill Every Security Tool </title>
        <link>https://www.huntress.com/blog/encase-byovd-edr-killer</link>
        <guid>https://www.huntress.com/blog/encase-byovd-edr-killer</guid>
        <description>Huntress responded to a 2026 intrusion using compromised SonicWall VPN credentials and a revoked EnCase forensic driver to terminate EDR processes via BYOVD.</description>
        <pubDate>2026-02-04T15:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F3113e7f47893448db72aae369590e980" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F3113e7f47893448db72aae369590e980"/>
      </item>
      <item>
        <title>Reduce Alert Fatigue Like a Huntress Cybersecurity Pro </title>
        <link>https://www.huntress.com/blog/how-to-deal-with-alert-fatigue-like-a-security-pro</link>
        <guid>https://www.huntress.com/blog/how-to-deal-with-alert-fatigue-like-a-security-pro</guid>
        <description>Deal with alert fatigue like a pro. Learn practical tips from Huntress&#39; SOC on managing overwhelming alerts, preventing burnout, and focusing on real threats.</description>
        <pubDate>2026-02-02T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F3176e9f9abe84156a463c966d8530703" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F3176e9f9abe84156a463c966d8530703"/>
      </item>
      <item>
        <title>The (!FALSE) Pattern: How SOAPHound Queries Disappear Before They Hit Your Logs</title>
        <link>https://www.huntress.com/blog/ldap-active-directory-detection-part-four</link>
        <guid>https://www.huntress.com/blog/ldap-active-directory-detection-part-four</guid>
        <description>SOAPHound&#39;s LDAP query (!soaphound=*) never appears in Event 1644 logs, but it transforms into (! (FALSE)) through LDAP optimization. Understanding this transformation reveals a unique detection signature that most defenders have never seen.</description>
        <pubDate>2026-01-29T15:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fa19fd2d3a68d4bb78612359c540d02ee" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fa19fd2d3a68d4bb78612359c540d02ee"/>
      </item>
      <item>
        <title>How Huntress Managed ITDR&#39;s New Incident Report Timeline Changes Response</title>
        <link>https://www.huntress.com/blog/huntress-managed-itdr-incident-report-timeline-response</link>
        <guid>https://www.huntress.com/blog/huntress-managed-itdr-incident-report-timeline-response</guid>
        <description>Learn how the Incident Report Timeline within Huntress Managed ITDR offers clear, chronological insights, enabling a decisive response to incidents.</description>
        <pubDate>2026-01-26T06:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F8963d867f9474c60b8f8d60621123cb5" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F8963d867f9474c60b8f8d60621123cb5"/>
      </item>
      <item>
        <title>Huntress Catches SmarterMail Account Takeover Leading to RCE</title>
        <link>https://www.huntress.com/blog/smartermail-account-takeover-leading-to-rce</link>
        <guid>https://www.huntress.com/blog/smartermail-account-takeover-leading-to-rce</guid>
        <description>SmarterMail versions prior to Build 9511 are vulnerable to privileged account takeover and remote code execution. Learn more about the latest Huntress DE&amp;TH Team’s findings.</description>
        <pubDate>2026-01-22T15:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0e6cd43c84f34420bcf997dc96947e7b" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0e6cd43c84f34420bcf997dc96947e7b"/>
      </item>
      <item>
        <title>How Hacked Construction Apps Are Bringing Down Jobsite Security</title>
        <link>https://www.huntress.com/blog/hacked-construction-apps-bringing-down-jobsite-security</link>
        <guid>https://www.huntress.com/blog/hacked-construction-apps-bringing-down-jobsite-security</guid>
        <description>Vertical-specific construction applications face unique risks. Hacked apps stem from flaws in the software or its components, expanding the jobsite attack surface.</description>
        <pubDate>2026-01-21T06:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Faceb7e9cafc246af8ace8c62f4ea9a11" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Faceb7e9cafc246af8ace8c62f4ea9a11"/>
      </item>
      <item>
        <title>Dissecting CrashFix: KongTuke&#39;s New Toy</title>
        <link>https://www.huntress.com/blog/malicious-browser-extention-crashfix-kongtuke</link>
        <guid>https://www.huntress.com/blog/malicious-browser-extention-crashfix-kongtuke</guid>
        <description>Fake ad blocker crashes your browser, then offers a &quot;fix.&quot; Go inside KongTuke&#39;s CrashFix campaign, from malicious extension to ModeloRAT for VIP targets.</description>
        <pubDate>2026-01-16T06:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc8b7c5427000401996fa5aa533ff6331" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc8b7c5427000401996fa5aa533ff6331"/>
      </item>
      <item>
        <title>SDFlags: The Log Field I Wasn&#39;t Looking at That Revealed How BloodHound Really Works</title>
        <link>https://www.huntress.com/blog/ldap-active-directory-detection-part-three</link>
        <guid>https://www.huntress.com/blog/ldap-active-directory-detection-part-three</guid>
        <description>While investigating LDAP filters and attributes, I completely missed &quot;SDFlags&quot; in my Event 1644 logs. When I finally noticed it, the investigation led to nTSecurityDescriptor, attack path discovery, and a high-confidence detection signature.</description>
        <pubDate>2026-01-15T15:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc0c1dbc98c7d485a88cd5e50c231f5ca" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc0c1dbc98c7d485a88cd5e50c231f5ca"/>
      </item>
      <item>
        <title>Cross-Platform Unity in EDR</title>
        <link>https://www.huntress.com/blog/pursuing-parity-cross-platform-unity</link>
        <guid>https://www.huntress.com/blog/pursuing-parity-cross-platform-unity</guid>
        <description>Huntress researchers weigh in on the challenge of getting feature parity across Windows, macOS, and Linux. And learn how unique security models and platform maturity shape the way products are built.</description>
        <pubDate>2026-01-13T06:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F4e54c7e92761499cb1c3016a69beadc1" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F4e54c7e92761499cb1c3016a69beadc1"/>
      </item>
      <item>
        <title>Reflecting on AI in 2025: Faster Attacks, Same Old Tradecraft</title>
        <link>https://www.huntress.com/blog/ai-2025-faster-attacks-same-tradecraft</link>
        <guid>https://www.huntress.com/blog/ai-2025-faster-attacks-same-tradecraft</guid>
        <description>Huntress outlines 2025 AI attack speed with automated scripts, but adversaries use familiar tradecraft. Detection and hygiene remain decisive.</description>
        <pubDate>2026-01-12T08:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7f82007cad794934835e279e816bcf04" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7f82007cad794934835e279e816bcf04"/>
      </item>
      <item>
        <title>ESXi Exploitation in the Wild</title>
        <link>https://www.huntress.com/blog/esxi-vm-escape-exploit</link>
        <guid>https://www.huntress.com/blog/esxi-vm-escape-exploit</guid>
        <description>Huntress outlines a complex, multi-step attack designed to break out of guest VMs and target the ESXi hypervisor, using potential zero-day vulnerabilities and sneaky VSOCK communication.</description>
        <pubDate>2026-01-07T14:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F50420347e7c147a4b4abe8368f128acb" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F50420347e7c147a4b4abe8368f128acb"/>
      </item>
      <item>
        <title>Rogue RMMs: Common Social Engineering Tactics We Saw in 2025</title>
        <link>https://www.huntress.com/blog/rogue-screenconnect-social-engineering-tactics-2025</link>
        <guid>https://www.huntress.com/blog/rogue-screenconnect-social-engineering-tactics-2025</guid>
        <description>From lures involving Social Security statements to top domains and hashes used in attacks, here&#39;s an in-depth look at incidents involving ScreenConnect in 2025. </description>
        <pubDate>2025-12-31T06:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F44e2389b93534207a0cc0efe981058c6" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F44e2389b93534207a0cc0efe981058c6"/>
      </item>
      <item>
        <title>The LDAP Whitespace Problem: Making Sigma Rules Work in Production</title>
        <link>https://www.huntress.com/blog/ldap-active-directory-detection-part-two</link>
        <guid>https://www.huntress.com/blog/ldap-active-directory-detection-part-two</guid>
        <description>Your LDAP detection rules work in the lab but fail in production. Here&#39;s why Event 1644 whitespace variations break your Sigma rules and how to fix them.</description>
        <pubDate>2025-12-30T06:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc8e5f48707dc427d8c1961c28e6fc158" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc8e5f48707dc427d8c1961c28e6fc158"/>
      </item>
      <item>
        <title>Tradecraft Tuesday Recap: React2Shell, ClickFix, and the Rise of AI Scams</title>
        <link>https://www.huntress.com/blog/holiday-security-tips-for-family-friends</link>
        <guid>https://www.huntress.com/blog/holiday-security-tips-for-family-friends</guid>
        <description>From &quot;React2Shell&quot; exploitation to sophisticated &quot;Living off Trusted Sites&quot; phishing, Huntress experts break down the threats targeting both enterprises and families today.</description>
        <pubDate>2025-12-23T08:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F95c9085a9c544590a0436448a5c7a209" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F95c9085a9c544590a0436448a5c7a209"/>
      </item>
      <item>
        <title>Rising Supply Chain Attacks on Cybersecurity Ecosystems | Huntress </title>
        <link>https://www.huntress.com/blog/rising-supply-chain-attacks-cybersecurity-ecosystems</link>
        <guid>https://www.huntress.com/blog/rising-supply-chain-attacks-cybersecurity-ecosystems</guid>
        <description>Learn how supply chain attacks and shifting trust are reshaping the software supply chain, and what enterprises must do to strengthen resilience.</description>
        <pubDate>2025-12-23T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F24895bab92ba401ab8a98aaddff54a98" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F24895bab92ba401ab8a98aaddff54a98"/>
      </item>
      <item>
        <title>Trial, Error, and Typos: Why Some Malware Attacks Aren&#39;t as &#39;Sophisticated&#39; as You Think</title>
        <link>https://www.huntress.com/blog/trial-error-typos-malware-attacks-sophisticated</link>
        <guid>https://www.huntress.com/blog/trial-error-typos-malware-attacks-sophisticated</guid>
        <description>Think all threat actors are pros? This post reveals how &#39;unsophisticated&#39; malware and attacker errors help defenders stop attacks before damage is done.</description>
        <pubDate>2025-12-22T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb2b400b8789742ddb5bc6a6c80636b4c" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb2b400b8789742ddb5bc6a6c80636b4c"/>
      </item>
      <item>
        <title>Securing Your Business: The Vital Role of Cyber Insurance | Huntress</title>
        <link>https://www.huntress.com/blog/securing-your-business-the-vital-role-of-cyber-insurance</link>
        <guid>https://www.huntress.com/blog/securing-your-business-the-vital-role-of-cyber-insurance</guid>
        <description>Understand the critical role of cyber insurance in safeguarding your business from cyber threats. Learn how this coverage can protect your assets.</description>
        <pubDate>2025-12-19T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5df54a39b5ab4a3ca02cbd399848b422" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5df54a39b5ab4a3ca02cbd399848b422"/>
      </item>
      <item>
        <title>Active Exploitation of Gladinet CentreStack/Triofox Insecure Cryptography Vulnerability</title>
        <link>https://www.huntress.com/blog/active-exploitation-gladinet-centrestack-triofox-insecure-cryptography-vulnerability</link>
        <guid>https://www.huntress.com/blog/active-exploitation-gladinet-centrestack-triofox-insecure-cryptography-vulnerability</guid>
        <description>Threat actors are exploiting a vulnerability in Gladinet’s CentreStack and Triofox products that stems from hardcoded cryptographic keys in the AES implementation.</description>
        <pubDate>2025-12-18T23:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc7d35f0db299414198587c79cb26f2af" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc7d35f0db299414198587c79cb26f2af"/>
      </item>
      <item>
        <title>A Series of Unfortunate (RMM) Events</title>
        <link>https://www.huntress.com/blog/series-of-unfortunate-rmm-events</link>
        <guid>https://www.huntress.com/blog/series-of-unfortunate-rmm-events</guid>
        <description>Recently, the Huntress SOC has observed threat actors increasingly use PDQ and GoTo Resolve to deploy further remote monitoring and management (RMM) tools in attacks.</description>
        <pubDate>2025-12-18T08:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F2643034cc85c40ada45a670c0f3359c6" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F2643034cc85c40ada45a670c0f3359c6"/>
      </item>
      <item>
        <title>The OID Problem: Writing LDAP Detections That Actually Work</title>
        <link>https://www.huntress.com/blog/ldap-active-directory-detection-part-one</link>
        <guid>https://www.huntress.com/blog/ldap-active-directory-detection-part-one</guid>
        <description>Learn why your LDAP detection rules never fire and how to fix them. Hint: it&#39;s the OID-to-bitwise transformation.</description>
        <pubDate>2025-12-16T06:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F6ba5b66559fa4676832b3c5a67b70280" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F6ba5b66559fa4676832b3c5a67b70280"/>
      </item>
      <item>
        <title>CMMC: The Opportunity ($$) and Challenge for MSPs</title>
        <link>https://www.huntress.com/blog/cmmc-opportunity-cost-msp-challenges</link>
        <guid>https://www.huntress.com/blog/cmmc-opportunity-cost-msp-challenges</guid>
        <description>CMMC is coming. Learn how to turn this challenge into a major revenue opportunity for your business.</description>
        <pubDate>2025-12-10T06:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5a98aaa26c15436fae4790aefbfb5f83" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5a98aaa26c15436fae4790aefbfb5f83"/>
      </item>
      <item>
        <title>AI-Poisoning &amp; AMOS Stealer: How Trust Became the Biggest Mac Threat</title>
        <link>https://www.huntress.com/blog/amos-stealer-chatgpt-grok-ai-trust</link>
        <guid>https://www.huntress.com/blog/amos-stealer-chatgpt-grok-ai-trust</guid>
        <description>Attackers are exploiting user trust in AI and aggressive SEO to deliver an evolved Atomic macOS Stealer. Learn why this social engineering tradecraft bypasses traditional network controls and the future of macOS infostealer defense.</description>
        <pubDate>2025-12-09T06:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fa08d535589c0480a87d467943b15878f" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fa08d535589c0480a87d467943b15878f"/>
      </item>
      <item>
        <title>Announcing the Latest Report on Huntress Managed SAT: Key Findings and Insights</title>
        <link>https://www.huntress.com/blog/huntress-managed-security-awareness-training-expert-review</link>
        <guid>https://www.huntress.com/blog/huntress-managed-security-awareness-training-expert-review</guid>
        <description>A new independent report explores how Huntress’ approach to SAT supports real behavior change. Learn what works best in building security culture.</description>
        <pubDate>2025-12-09T06:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F01f6e4d9d2ad4606b4a0bb1fb721caad" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F01f6e4d9d2ad4606b4a0bb1fb721caad"/>
      </item>
      <item>
        <title>PeerBlight Linux Backdoor Exploits React2Shell CVE-2025-55182</title>
        <link>https://www.huntress.com/blog/peerblight-linux-backdoor-exploits-react2shell</link>
        <guid>https://www.huntress.com/blog/peerblight-linux-backdoor-exploits-react2shell</guid>
        <description>Huntress is seeing threat actors exploit React2Shell (CVE-2025-55182) to deploy a Linux backdoor, a reverse proxy tunnel, and a Go-based post-exploitation implant.</description>
        <pubDate>2025-12-09T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0e3b4c3f3db544bea4695f2587044584" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0e3b4c3f3db544bea4695f2587044584"/>
      </item>
      <item>
        <title>Hardening the Hypervisor: Practical Defenses Against Ransomware Targeting ESXi </title>
        <link>https://www.huntress.com/blog/hypervisor-defenses-against-ransomware-targeting-esxi</link>
        <guid>https://www.huntress.com/blog/hypervisor-defenses-against-ransomware-targeting-esxi</guid>
        <description>Hypervisors are a major target for ransomware attacks. Get expert guidance from Huntress on how to protect your virtualized infrastructure. Learn how to secure access, put runtime controls in place, simplify patching, and improve your recovery plans.
</description>
        <pubDate>2025-12-08T06:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0a3dbfefe6c7479190c676b576fe035b" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0a3dbfefe6c7479190c676b576fe035b"/>
      </item>
      <item>
        <title>What Does the Dark Web Look Like? Pulling Back the Curtain | Huntress</title>
        <link>https://www.huntress.com/blog/pulling-back-the-curtain-a-journey-through-the-dark-web</link>
        <guid>https://www.huntress.com/blog/pulling-back-the-curtain-a-journey-through-the-dark-web</guid>
        <description>Learn what the dark web looks like with an exploration of the far reaches of the internet, how you can get there, and what you might find… from a safe distance.</description>
        <pubDate>2025-12-03T15:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5cc0c7d385694f96a508f855363cb9ce" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5cc0c7d385694f96a508f855363cb9ce"/>
      </item>
      <item>
        <title>Velociraptor Misuse, Pt. II: The Eye of the Storm</title>
        <link>https://www.huntress.com/blog/velociraptor-misuse-part-two-eye-of-the-storm</link>
        <guid>https://www.huntress.com/blog/velociraptor-misuse-part-two-eye-of-the-storm</guid>
        <description>Huntress reports an uptick in threat actors abusing the Velociraptor open-source DFIR tool, linked to incidents involving WSUS exploitation, VS Code tunnels, and more. </description>
        <pubDate>2025-12-03T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fbaa01970db3c4da7aeed7dfede1ab7a3" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fbaa01970db3c4da7aeed7dfede1ab7a3"/>
      </item>
      <item>
        <title>Datacenter Infrastructure &amp; Identity Attacks</title>
        <link>https://www.huntress.com/blog/datacenter-infrastructure-and-identity-attacks</link>
        <guid>https://www.huntress.com/blog/datacenter-infrastructure-and-identity-attacks</guid>
        <description>Do you know where identity attacks come from? It’s not just location or VPNs, but there’s a &quot;secret third thing&quot; in identity attacks. See how a new AS-based detection system closed this critical visibility gap.</description>
        <pubDate>2025-12-02T06:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fdaf670588c594b9594e8703612a67947" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fdaf670588c594b9594e8703612a67947"/>
      </item>
      <item>
        <title>What Is Cyber Threat Hunting? Types, Tricks, and Tips | Huntress </title>
        <link>https://www.huntress.com/blog/what-is-threat-hunting</link>
        <guid>https://www.huntress.com/blog/what-is-threat-hunting</guid>
        <description>What is cyber threat hunting, and what do threat hunters do? In this blog, we define what threat hunting actually is and the strategy and skill behind it.</description>
        <pubDate>2025-12-01T23:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F469cfeacca3544c1be373d022ff782b4" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F469cfeacca3544c1be373d022ff782b4"/>
      </item>
      <item>
        <title>What Is Account Takeover Fraud? A Comprehensive Guide | Huntress</title>
        <link>https://www.huntress.com/blog/account-takeover-what-it-is-and-how-to-protect-against-it</link>
        <guid>https://www.huntress.com/blog/account-takeover-what-it-is-and-how-to-protect-against-it</guid>
        <description>Account takeover fraud happens when attackers steal login credentials to access accounts. Learn how to detect and prevent account takeover fraud. </description>
        <pubDate>2025-12-01T19:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0126d015252e46a3a4992d1e0531ba39?format=webp" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0126d015252e46a3a4992d1e0531ba39?format=webp"/>
      </item>
      <item>
        <title>#ShadyHacks with Kyle Hanslovan</title>
        <link>https://www.huntress.com/blog/shadyhacks-with-kyle-hanslovan</link>
        <guid>https://www.huntress.com/blog/shadyhacks-with-kyle-hanslovan</guid>
        <description>Huntress CEO Kyle Hanslovan&#39;s live hack demo: modern hacker playbook, with stolen credentials, MFA bypass, and M365 token hijacking. Get defense tips, stay protected.</description>
        <pubDate>2025-11-26T14:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ff61ee4df978b4b96bfc2b93b5a131e47" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ff61ee4df978b4b96bfc2b93b5a131e47"/>
      </item>
      <item>
        <title>7 Benefits of Outsourcing Cybersecurity Services for Your Business | Huntress</title>
        <link>https://www.huntress.com/blog/7-benefits-of-outsourcing-cybersecurity-services</link>
        <guid>https://www.huntress.com/blog/7-benefits-of-outsourcing-cybersecurity-services</guid>
        <description>Explore the top benefits of cybersecurity outsourcing and learn how it can bolster defenses while freeing up time, energy, and resources for your team.</description>
        <pubDate>2025-11-24T16:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fdfae8d20cd204bc99e4e604d8531c051" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fdfae8d20cd204bc99e4e604d8531c051"/>
      </item>
      <item>
        <title>ClickFix Gets Creative: Malware Buried in Images</title>
        <link>https://www.huntress.com/blog/clickfix-malware-buried-in-images</link>
        <guid>https://www.huntress.com/blog/clickfix-malware-buried-in-images</guid>
        <description>Huntress uncovered an attack utilizing a ClickFix lure to initiate a multi-stage malware execution chain. This analysis reveals how threat actors use steganography to conceal infostealers like LummaC2 and Rhadamanthys within seemingly harmless PNGs.</description>
        <pubDate>2025-11-24T06:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F71736a89bd5a497b93e17c2f6ba5cd39" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F71736a89bd5a497b93e17c2f6ba5cd39"/>
      </item>
      <item>
        <title>Velociraptor WSUS Exploitation, Pt. I: WSUS-Up?</title>
        <link>https://www.huntress.com/blog/velociraptor-misuse-part-one-wsus-up</link>
        <guid>https://www.huntress.com/blog/velociraptor-misuse-part-one-wsus-up</guid>
        <description>Huntress has seen an uptick in threat actors abusing the Velociraptor open-source DFIR tool in a range of attacks, including a recent incident involving WSUS exploitation.</description>
        <pubDate>2025-11-20T15:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F6e5eae9bc06649b29d7fd75addc6acf3" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F6e5eae9bc06649b29d7fd75addc6acf3"/>
      </item>
      <item>
        <title>Huntress Acquires Inside Agent</title>
        <link>https://www.huntress.com/blog/huntress-acquires-inside-agent</link>
        <guid>https://www.huntress.com/blog/huntress-acquires-inside-agent</guid>
        <description>Huntress acquired Inside Agent to bolster identity security with a new ISPM solution. The move enhances proactive defense against cyberattacks.</description>
        <pubDate>2025-11-18T17:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fca71e222249c4230b0afb4dcbf6cb337" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fca71e222249c4230b0afb4dcbf6cb337"/>
      </item>
      <item>
        <title>Huntress Lands on the Microsoft Marketplace</title>
        <link>https://www.huntress.com/blog/huntress-available-on-marketplace-microsoft</link>
        <guid>https://www.huntress.com/blog/huntress-available-on-marketplace-microsoft</guid>
        <description>Huntress is now on the Microsoft Marketplace. Combine our protection with Microsoft 365 and Defender, get 24/7 monitoring, and enjoy enterprise-grade security without the hefty price tag.</description>
        <pubDate>2025-11-17T14:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe212b1b9af414e11851cdab80c823531" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe212b1b9af414e11851cdab80c823531"/>
      </item>
      <item>
        <title>What Should A Modern Cybersecurity Stack Look Like? | Huntress</title>
        <link>https://www.huntress.com/blog/what-should-a-modern-cybersecurity-stack-look-like</link>
        <guid>https://www.huntress.com/blog/what-should-a-modern-cybersecurity-stack-look-like</guid>
        <description>In this blog, we dive into the critical layers that make up a solid cybersecurity stack and provide tips for getting buy-in from decision makers.</description>
        <pubDate>2025-11-17T13:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fd1fcdf54b592449ea70356d8a9e9decb" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fd1fcdf54b592449ea70356d8a9e9decb"/>
      </item>
      <item>
        <title>Threats Plague Educational Organizations</title>
        <link>https://www.huntress.com/blog/threats-against-education</link>
        <guid>https://www.huntress.com/blog/threats-against-education</guid>
        <description>Threat actors are targeting the education sector with data breaches, phishing emails, ransomware hits, brute force RDP attacks, and more. </description>
        <pubDate>2025-11-13T06:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fab91aae300894d7ebcafde08ed3e900d" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fab91aae300894d7ebcafde08ed3e900d"/>
      </item>
      <item>
        <title>MFA for Business: Benefits, Methods &amp; Why It Still Matters</title>
        <link>https://www.huntress.com/blog/demystifying-multi-factor-authentication-for-businesses</link>
        <guid>https://www.huntress.com/blog/demystifying-multi-factor-authentication-for-businesses</guid>
        <description>MFA for business isn’t a silver bullet. But it’s close! Learn the benefits, MFA methods, and how to make it work without the usual headaches. </description>
        <pubDate>2025-11-07T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0d68dc32a7674d9eafbddab202506d10" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0d68dc32a7674d9eafbddab202506d10"/>
      </item>
      <item>
        <title>Deobfuscating Files for Flags: Huntress CTF 2025 Retro</title>
        <link>https://www.huntress.com/blog/huntress-ctf-2025-retro</link>
        <guid>https://www.huntress.com/blog/huntress-ctf-2025-retro</guid>
        <description>11,000+ hackers—one epic challenge. See who the winners are and key insights from this year&#39;s massive Huntress Capture the Flag competition. Read the full breakdown!</description>
        <pubDate>2025-11-06T14:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7035797483dd41b587baac30060be485" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7035797483dd41b587baac30060be485"/>
      </item>
      <item>
        <title>Gootloader | Threat Detection Overview </title>
        <link>https://www.huntress.com/blog/gootloader-threat-detection-woff2-obfuscation</link>
        <guid>https://www.huntress.com/blog/gootloader-threat-detection-woff2-obfuscation</guid>
        <description>Gootloader returns with new obfuscation techniques, including custom WOFF2 fonts and updated persistence mechanisms, while continuing its partnership with Vanilla Tempest for ransomware deployment. Dive in and discover what Huntress is seeing. </description>
        <pubDate>2025-11-05T15:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc5ca2c6f28994ad1877490baf68255c5" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc5ca2c6f28994ad1877490baf68255c5"/>
      </item>
      <item>
        <title>Huntress and DEFCERT Are Streamlining CMMC Assessment Prep</title>
        <link>https://www.huntress.com/blog/huntress-defcert-streamline-cmmc-assessment-prep</link>
        <guid>https://www.huntress.com/blog/huntress-defcert-streamline-cmmc-assessment-prep</guid>
        <description>Huntress and DEFCERT partnered to help with CMMC compliance. Use their Shared Responsibility Matrix and operation plans to streamline your Level 2 assessment</description>
        <pubDate>2025-11-05T14:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe17f0d3efdaa409db5d7b9e2483bd1a9" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe17f0d3efdaa409db5d7b9e2483bd1a9"/>
      </item>
      <item>
        <title>Live Hacking Into Microsoft 365 with Kyle Hanslovan</title>
        <link>https://www.huntress.com/blog/live-hacking-microsoft-365-kyle-hanslovan</link>
        <guid>https://www.huntress.com/blog/live-hacking-microsoft-365-kyle-hanslovan</guid>
        <description>Learn how cybercriminals bypass Microsoft 365 MFA and steal credentials in a live hacking demo. Discover defense strategies to protect your systems.</description>
        <pubDate>2025-11-04T16:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F34d2a3d104da450292197702d60c4cb4" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F34d2a3d104da450292197702d60c4cb4"/>
      </item>
      <item>
        <title>What Is the Zero Trust Security Model? | Huntress</title>
        <link>https://www.huntress.com/blog/what-is-the-zero-trust-security-model</link>
        <guid>https://www.huntress.com/blog/what-is-the-zero-trust-security-model</guid>
        <description> Learn the fundamentals of Zero Trust Security and how it protects organizations by ensuring constant verification and reducing cyber risks. Stay secure with Zero Trust.</description>
        <pubDate>2025-10-28T04:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fad8f5c0e8ddf4a9f99564557daa048e0" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fad8f5c0e8ddf4a9f99564557daa048e0"/>
      </item>
      <item>
        <title>Exploitation of Windows Server Update Services Remote Code Execution Vulnerability (CVE-2025-59287) </title>
        <link>https://www.huntress.com/blog/exploitation-of-windows-server-update-services-remote-code-execution-vulnerability</link>
        <guid>https://www.huntress.com/blog/exploitation-of-windows-server-update-services-remote-code-execution-vulnerability</guid>
        <description>Huntress has observed threat actors exploiting a Microsoft Windows Server Update Services (WSUS) vulnerability (CVE-2025-59287).</description>
        <pubDate>2025-10-24T04:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F86b7b3417b154f40bf10bbb4d5ac05d6" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F86b7b3417b154f40bf10bbb4d5ac05d6"/>
      </item>
      <item>
        <title>Looking Through a Pinhole at a Qilin Ransomware Attack</title>
        <link>https://www.huntress.com/blog/looking-at-qilin-ransomware-attack</link>
        <guid>https://www.huntress.com/blog/looking-at-qilin-ransomware-attack</guid>
        <description>Incident analysis is critical, but for newcomers, it can be daunting. Learn how to confirm commands, validate findings, and spot real impact during a Qilin ransomware event.</description>
        <pubDate>2025-10-22T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F642541cb00fe4e90a07832fed51581a9" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F642541cb00fe4e90a07832fed51581a9"/>
      </item>
      <item>
        <title>Dealing with Imperfect Telemetry: Techniques for Effective Incident Response</title>
        <link>https://www.huntress.com/blog/imperfect-telemetry-techniques-effective-incident-response</link>
        <guid>https://www.huntress.com/blog/imperfect-telemetry-techniques-effective-incident-response</guid>
        <description>See how the Huntress Tactical Response team tackles security telemetry gaps. We share real-world techniques for working with missing logs, degraded telemetry, and cloud logging challenges to uncover critical insights and improve investigations.</description>
        <pubDate>2025-10-21T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F4f5bb63967d7485d8f4d0b3691aa065d" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F4f5bb63967d7485d8f4d0b3691aa065d"/>
      </item>
      <item>
        <title>Dispelling Ransomware Deployment Myths</title>
        <link>https://www.huntress.com/blog/dispelling-ransomware-deployment-myths</link>
        <guid>https://www.huntress.com/blog/dispelling-ransomware-deployment-myths</guid>
        <description>Huntress analyzes ransomware activity, uncovering attack patterns and key detection opportunities while dispelling ransomware myths.</description>
        <pubDate>2025-10-16T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F1a0b787ebf684620a602320f6e66cd17" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F1a0b787ebf684620a602320f6e66cd17"/>
      </item>
      <item>
        <title>CMMC Final Rule: A Guide for DoD Subcontractors</title>
        <link>https://www.huntress.com/blog/cmmc-final-rule-guide-for-dod-subcontractors</link>
        <guid>https://www.huntress.com/blog/cmmc-final-rule-guide-for-dod-subcontractors</guid>
        <description>The DoD&#39;s CMMC final rule is here. Learn what it means for subcontractors, the new timeline, and how to prepare for your Level 2 audit to stay competitive.</description>
        <pubDate>2025-10-15T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F228215002174478d9d63c89ac4edbd41" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F228215002174478d9d63c89ac4edbd41"/>
      </item>
      <item>
        <title>Active Exploitation of Gladinet CentreStack and Triofox Local File Inclusion Flaw</title>
        <link>https://www.huntress.com/blog/gladinet-centrestack-triofox-local-file-inclusion-flaw</link>
        <guid>https://www.huntress.com/blog/gladinet-centrestack-triofox-local-file-inclusion-flaw</guid>
        <description>Huntress has observed in-the-wild exploitation of a Local File Inclusion vulnerability in Gladinet CentreStack and Triofox products.</description>
        <pubDate>2025-10-15T04:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fed6898a26597492b96f930c32f27a7a1" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fed6898a26597492b96f930c32f27a7a1"/>
      </item>
      <item>
        <title>The Crown Prince, Nezha: A New Tool Favored by China-Nexus Threat Actors</title>
        <link>https://www.huntress.com/blog/nezha-china-nexus-threat-actor-tool</link>
        <guid>https://www.huntress.com/blog/nezha-china-nexus-threat-actor-tool</guid>
        <description>Beginning in mid-2025, Huntress discovered a new tool being used to facilitate webserver intrusions known as Nezha, which up until now hasn’t been publicly reported on. This was used in tandem with other families of malware and web shell management tools such as Ghost RAT and AntSword.</description>
        <pubDate>2025-10-15T04:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F23d4b0b97a6c44119d5cf9c5ff789138" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F23d4b0b97a6c44119d5cf9c5ff789138"/>
      </item>
      <item>
        <title>How to Offend Your IT Team: Cybersecurity Tips</title>
        <link>https://www.huntress.com/blog/guide-for-security-unaware</link>
        <guid>https://www.huntress.com/blog/guide-for-security-unaware</guid>
        <description>Ready to drive your IT team crazy? See our top security blunders and learn practical tips to improve your cybersecurity habits.  </description>
        <pubDate>2025-10-14T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F04d5f449fb9146259edc829189ff2605" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F04d5f449fb9146259edc829189ff2605"/>
      </item>
      <item>
        <title>Huntress Threat Advisory: Widespread SonicWall SSLVPN Compromise</title>
        <link>https://www.huntress.com/blog/sonicwall-sslvpn-compromise</link>
        <guid>https://www.huntress.com/blog/sonicwall-sslvpn-compromise</guid>
        <description>Huntress has observed a spike in compromises of SonicWall SSLVPN devices across multiple customer environments.</description>
        <pubDate>2025-10-10T04:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe2e2b336e6d04957a6b9b7c061f7858f" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe2e2b336e6d04957a6b9b7c061f7858f"/>
      </item>
      <item>
        <title>Ditch Lame Cybersecurity Tips: These Best Practices Actually Work</title>
        <link>https://www.huntress.com/blog/lamest-cybersecurity-tips-what-to-do-instead</link>
        <guid>https://www.huntress.com/blog/lamest-cybersecurity-tips-what-to-do-instead</guid>
        <description>Tired of hearing the same old cybersecurity tips? Learn actionable, modern strategies to protect yourself and your organization from bad threat actors. 
</description>
        <pubDate>2025-10-07T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc66a9cabf8894791bee6e83e9bffef6b" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc66a9cabf8894791bee6e83e9bffef6b"/>
      </item>
      <item>
        <title> Build a Stronger Security Awareness Program with Huntress</title>
        <link>https://www.huntress.com/blog/what-is-a-security-awareness-training-program</link>
        <guid>https://www.huntress.com/blog/what-is-a-security-awareness-training-program</guid>
        <description>Improve security culture with a stronger security awareness program. Huntress Managed Security Awareness Training is designed to reduce incidents and protect your team.</description>
        <pubDate>2025-10-06T16:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>27 Biggest Data Breaches Globally (+ Lessons) 2025 | Huntress</title>
        <link>https://www.huntress.com/blog/biggest-data-breaches</link>
        <guid>https://www.huntress.com/blog/biggest-data-breaches</guid>
        <description>Learn about the biggest data breaches of the past 20 years, how they happened, and how you can better protect your organization from major threats.</description>
        <pubDate>2025-10-03T16:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fcd7122555e5f43d6acf6510c98d2197d" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fcd7122555e5f43d6acf6510c98d2197d"/>
      </item>
      <item>
        <title>Top Cyber Threat Trends of 2025 from Deepfakes, ClickFix, and ViewState Exploits</title>
        <link>https://www.huntress.com/blog/craftiest-trends-scams-tradecraft-2025</link>
        <guid>https://www.huntress.com/blog/craftiest-trends-scams-tradecraft-2025</guid>
        <description>John Hammond and Greg Linares with Huntress discuss the top tradecraft we’ve seen this year so far, from ClickFix attacks to deepfake social engineering</description>
        <pubDate>2025-10-02T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F74e8269f3489487c8674e138929b4fa1" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F74e8269f3489487c8674e138929b4fa1"/>
      </item>
      <item>
        <title>Be Offensive: A bold take on Cybersecurity Awareness Month.</title>
        <link>https://www.huntress.com/blog/be-offensive-cybersecurity-awareness-month</link>
        <guid>https://www.huntress.com/blog/be-offensive-cybersecurity-awareness-month</guid>
        <description>Over 20 years of Cybersecurity Awareness Month, and we’ve had enough. This October, Huntress is taking a new attitude with an offensive-minded approach to defense.
</description>
        <pubDate>2025-10-01T13:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fd848c38c3f154259a822e70c76f92a78" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fd848c38c3f154259a822e70c76f92a78"/>
      </item>
      <item>
        <title>Don’t Sweat the ClickFix Techniques: Variants &amp; Detection Evolution</title>
        <link>https://www.huntress.com/blog/dont-sweat-clickfix-techniques</link>
        <guid>https://www.huntress.com/blog/dont-sweat-clickfix-techniques</guid>
        <description>Learn how ClickFix techniques like FileFix, TerminalFix, and DownloadFix trick users into compromising. Then, learn proven detection methods using chokepoint strategies and behavioral analytics. </description>
        <pubDate>2025-09-29T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F3aac48f0a1844cc2975fc08a9e2e82c1" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F3aac48f0a1844cc2975fc08a9e2e82c1"/>
      </item>
      <item>
        <title>A Vietnamese threat actor&#39;s shift from PXA Stealer to PureRAT</title>
        <link>https://www.huntress.com/blog/purerat-threat-actor-evolution</link>
        <guid>https://www.huntress.com/blog/purerat-threat-actor-evolution</guid>
        <description>Trace a threat actor&#39;s journey from custom Python stealers to a sophisticated commodity RAT. Learn how their tactics evolved and why this shift to .NET matters.</description>
        <pubDate>2025-09-25T14:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F22ad9f98d10e4270b1279962e5cb2f57" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F22ad9f98d10e4270b1279962e5cb2f57"/>
      </item>
      <item>
        <title>SAT effectiveness: Are security awareness training programs reducing human risk?</title>
        <link>https://www.huntress.com/blog/sat-programs-reduce-human-risk</link>
        <guid>https://www.huntress.com/blog/sat-programs-reduce-human-risk</guid>
        <description>Learn the truth about SAT effectiveness. Our latest report reveals why increased spending on training isn’t reducing human risk—and how to fix it. </description>
        <pubDate>2025-09-23T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F77c0074982274e57a3cabf6e26f383c1" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F77c0074982274e57a3cabf6e26f383c1"/>
      </item>
      <item>
        <title>What’s the Average Cost of a Data Breach in 2025? | Huntress</title>
        <link>https://www.huntress.com/blog/average-cost-of-a-data-breach</link>
        <guid>https://www.huntress.com/blog/average-cost-of-a-data-breach</guid>
        <description>Learn what the average cost of a data breach is and how factors like industry and location impact it. Plus, learn how to protect yourself from costly breaches.</description>
        <pubDate>2025-09-22T17:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fab232f2be12049f5b28768c5f7f1caaf" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fab232f2be12049f5b28768c5f7f1caaf"/>
      </item>
      <item>
        <title>What Is Managed EDR? </title>
        <link>https://www.huntress.com/blog/value-of-telemetry-investigations</link>
        <guid>https://www.huntress.com/blog/value-of-telemetry-investigations</guid>
        <description>Learn more about what it actually means to go up against hackers–and why creative, human-led investigations are essential for keeping your organization safe from modern threats.</description>
        <pubDate>2025-09-22T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe8ab4e1870a043f998e574785edf16b1" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe8ab4e1870a043f998e574785edf16b1"/>
      </item>
      <item>
        <title>How Malicious Hackers Try to Infiltrate Your IT Team</title>
        <link>https://www.huntress.com/blog/malicious-hackers-impersonate-it-staff</link>
        <guid>https://www.huntress.com/blog/malicious-hackers-impersonate-it-staff</guid>
        <description>Malicious hackers are impersonating IT and cybersecurity professionals to infiltrate your systems and steal sensitive data. Learn how to identify and defend against these insider threats and protect your organization from &quot;fake workers.&quot;</description>
        <pubDate>2025-09-18T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F6552dbeee02944babf25638f378be9fb" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F6552dbeee02944babf25638f378be9fb"/>
      </item>
      <item>
        <title>The Dangers of Storing Unencrypted Passwords</title>
        <link>https://www.huntress.com/blog/dangers-of-storing-unencrypted-passwords</link>
        <guid>https://www.huntress.com/blog/dangers-of-storing-unencrypted-passwords</guid>
        <description>Threat actors exploited SonicWall VPN, deployed Akira ransomware, and uninstalled Huntress Managed EDR agents after finding plaintext recovery codes. Learn how to secure your credentials and prevent similar attacks.</description>
        <pubDate>2025-09-15T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F609f802aaf4d46b8bf95ff59010aeaf5" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F609f802aaf4d46b8bf95ff59010aeaf5"/>
      </item>
      <item>
        <title>An Attacker’s Blunder Gave Us a Look Into Their Operations</title>
        <link>https://www.huntress.com/blog/rare-look-inside-attacker-operation</link>
        <guid>https://www.huntress.com/blog/rare-look-inside-attacker-operation</guid>
        <description>An attacker installed Huntress onto their operating machine, giving us a detailed look at how they’re using AI to build workflows, searching for tools like Evilginx, and researching targets like software development companies.</description>
        <pubDate>2025-09-09T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F4f81d51c40d244c8b3b5cc5b61561b5b" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F4f81d51c40d244c8b3b5cc5b61561b5b"/>
      </item>
      <item>
        <title>What Is Single Sign-On? The Practical Guide | Huntress</title>
        <link>https://www.huntress.com/blog/what-is-sso-login</link>
        <guid>https://www.huntress.com/blog/what-is-sso-login</guid>
        <description>Learn what single sign-on (SSO) login is, how it’s used in role management and cybersecurity, and how to set it up at your organization. </description>
        <pubDate>2025-09-08T17:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7a0ab4a48e994dd19e715bd06c006934" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7a0ab4a48e994dd19e715bd06c006934"/>
      </item>
      <item>
        <title>What Is Multi-Factor Authentication (MFA)? | Huntress</title>
        <link>https://www.huntress.com/blog/what-is-multi-factor-authentication</link>
        <guid>https://www.huntress.com/blog/what-is-multi-factor-authentication</guid>
        <description>Understand the multiple uses for multi-factor authentication, plus why it’s important for cybersecurity and how to implement it at your organization. </description>
        <pubDate>2025-09-05T15:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F06c5c2a0f64945719b264134325345a1" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F06c5c2a0f64945719b264134325345a1"/>
      </item>
      <item>
        <title>Obscura, an Obscure New Ransomware Variant</title>
        <link>https://www.huntress.com/blog/obscura-ransomware-variant</link>
        <guid>https://www.huntress.com/blog/obscura-ransomware-variant</guid>
        <description>Huntress found a previously unseen ransomware variant called Obscura on a victim company’s domain controller.</description>
        <pubDate>2025-09-02T19:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F68bf71c51ece47989ed30b079c137b43" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F68bf71c51ece47989ed30b079c137b43"/>
      </item>
      <item>
        <title>Debunking Microsoft 365 &amp; Identity Myths</title>
        <link>https://www.huntress.com/blog/debunking-microsoft-365-identity-myths</link>
        <guid>https://www.huntress.com/blog/debunking-microsoft-365-identity-myths</guid>
        <description>Don’t fall for common Microsoft 365 identity security myths. Here, Huntress debunks misconceptions around logins, MFA, Conditional Access, Impossible Travel, and security tuning. </description>
        <pubDate>2025-09-02T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F54a8782ad64f4e05b54657a7d49b3e70" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F54a8782ad64f4e05b54657a7d49b3e70"/>
      </item>
      <item>
        <title>From a Fake AnyDesk Installer to MetaStealer</title>
        <link>https://www.huntress.com/blog/fake-anydesk-clickfix-metastealer-malware</link>
        <guid>https://www.huntress.com/blog/fake-anydesk-clickfix-metastealer-malware</guid>
        <description>Learn how a fake AnyDesk installer led to a unique MetaStealer attack, highlighting how threat actors evolve ClickFix techniques beyond the classic playbook to steal credentials and files.</description>
        <pubDate>2025-08-29T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F49a2e4eef06848d68458d64690b38aeb" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F49a2e4eef06848d68458d64690b38aeb"/>
      </item>
      <item>
        <title>Join Huntress&#39; John Hammond &amp; Dave Kleinatland on a Journey of the Dark Web</title>
        <link>https://www.huntress.com/blog/journey-to-center-of-dark-web-tradecraft-tuesday-recap</link>
        <guid>https://www.huntress.com/blog/journey-to-center-of-dark-web-tradecraft-tuesday-recap</guid>
        <description>Huntress researchers take a tour through the dark web, from innovative threat actor marketing techniques to cybercrime drama on BreachForums.</description>
        <pubDate>2025-08-27T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F01956cbac4e54c6583786988f22f6b02" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F01956cbac4e54c6583786988f22f6b02"/>
      </item>
      <item>
        <title> Should MSPs Turn Off Google Gemini? Gemini Flaw Hijacks Email Summaries </title>
        <link>https://www.huntress.com/blog/google-gemini-phishing-risks</link>
        <guid>https://www.huntress.com/blog/google-gemini-phishing-risks</guid>
        <description>Hackers are using Google Gemini&#39;s email summaries to sneak in phishing attacks without links or attachments.</description>
        <pubDate>2025-08-26T15:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc408dad738614ca2a24754c9dbdec495" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc408dad738614ca2a24754c9dbdec495"/>
      </item>
      <item>
        <title>Ten Years of Resilience, Innovation &amp; Community-Driven Defense</title>
        <link>https://www.huntress.com/blog/huntress-top-ten-decade-in-cybersecurity</link>
        <guid>https://www.huntress.com/blog/huntress-top-ten-decade-in-cybersecurity</guid>
        <description>Celebrate 10 years of wrecking hackers! See how Huntress has evolved and elevated in an ever-changing cybersecurity landscape, shaped by key milestones and critical lessons.</description>
        <pubDate>2025-08-25T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe449577efdaa4c98be50f2b5d820645f" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe449577efdaa4c98be50f2b5d820645f"/>
      </item>
      <item>
        <title>Cephalus Ransomware: Don’t Lose Your Head </title>
        <link>https://www.huntress.com/blog/cephalus-ransomware</link>
        <guid>https://www.huntress.com/blog/cephalus-ransomware</guid>
        <description>In mid-August, Huntress saw two incidents that linked back to a ransomware variant called Cephalus, which included DLL sideloading via a legitimate SentinelOne executable.</description>
        <pubDate>2025-08-21T21:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F98e607252c0341b6a13cd6ee1ac16af9" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F98e607252c0341b6a13cd6ee1ac16af9"/>
      </item>
      <item>
        <title>Exposing Data Exfiltration: Detecting LOLBins, TTPs, and Ransomware Tactics</title>
        <link>https://www.huntress.com/blog/exposing-data-exfiltration-lolbin-ttp-binaries</link>
        <guid>https://www.huntress.com/blog/exposing-data-exfiltration-lolbin-ttp-binaries</guid>
        <description>Threat actors often steal data during the course of their attacks. This is particularly true for ransomware threat actors, who do it before deploying file encryption in order to engage in “double extortion” activities. This activity can be difficult to detect, particularly if it’s not dissimilar to legitimate actions taken by system administrators.</description>
        <pubDate>2025-08-19T14:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe177077968b84f71a887ed2884bae0df" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe177077968b84f71a887ed2884bae0df"/>
      </item>
      <item>
        <title>90 Business-Critical Data Breach Statistics [2025] | Huntress</title>
        <link>https://www.huntress.com/blog/data-breach-statistics</link>
        <guid>https://www.huntress.com/blog/data-breach-statistics</guid>
        <description>Learn the top data breach statistics of the last several years and learn about common causes, how they vary by industry, and future trends.  </description>
        <pubDate>2025-08-15T16:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fadd5424f71f34a19b79c1bd31c19ed05" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fadd5424f71f34a19b79c1bd31c19ed05"/>
      </item>
      <item>
        <title> Kawabunga, Dude, You’ve Been Ransomed!</title>
        <link>https://www.huntress.com/blog/kawalocker-ransomware-deployed</link>
        <guid>https://www.huntress.com/blog/kawalocker-ransomware-deployed</guid>
        <description>Thanks in large part to our customer base, Huntress sees a great deal of interesting activity, particularly from threat actors (but also from admins). Part of that activity includes not just ransomware variants that Huntress hasn’t seen before, but also variants that may not have been documented via any public means. Further, when these incidents occur, Huntress very often gets a detailed look at the threat actor’s activity, including commands and their timing.</description>
        <pubDate>2025-08-14T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F84f6d1ab03e34ee6b3c749d3e21fe9f6" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F84f6d1ab03e34ee6b3c749d3e21fe9f6"/>
      </item>
      <item>
        <title>Active Exploitation of SonicWall VPNs</title>
        <link>https://www.huntress.com/blog/exploitation-of-sonicwall-vpn</link>
        <guid>https://www.huntress.com/blog/exploitation-of-sonicwall-vpn</guid>
        <description>A likely zero-day vulnerability in SonicWall VPNs is being actively exploited to bypass MFA and deploy ransomware. Huntress advises disabling the VPN service immediately or severely restricting access via IP allow-listing. We&#39;re seeing threat actors pivot directly to domain controllers within hours of the initial breach.</description>
        <pubDate>2025-08-13T22:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe17b526ea6654197864a9883bc0c9e22" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe17b526ea6654197864a9883bc0c9e22"/>
      </item>
      <item>
        <title>Active Exploitation of SonicWall VPNs</title>
        <link>https://www.huntress.com/blog/exploitation-of-sonicwall-vpn</link>
        <guid>https://www.huntress.com/blog/exploitation-of-sonicwall-vpn</guid>
        <description>A likely zero-day vulnerability in SonicWall VPNs is being actively exploited to bypass MFA and deploy ransomware. Huntress advises disabling the VPN service immediately or severely restricting access via IP allow-listing. We&#39;re seeing threat actors pivot directly to domain controllers within hours of the initial breach.</description>
        <pubDate>2025-08-13T22:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe17b526ea6654197864a9883bc0c9e22" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe17b526ea6654197864a9883bc0c9e22"/>
      </item>
      <item>
        <title>Huntress for CMMC Compliance</title>
        <link>https://www.huntress.com/blog/navigating-cmmc-compliance-in-2025-how-huntress-helps</link>
        <guid>https://www.huntress.com/blog/navigating-cmmc-compliance-in-2025-how-huntress-helps</guid>
        <description>See how Huntress fits into the updated 2024 CMMC framework. Explore how Sensitive Data Mode helps safeguard CUI and support compliance. </description>
        <pubDate>2025-08-13T13:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F582fca6b491641ae8f8b7ef08bf6f823" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F582fca6b491641ae8f8b7ef08bf6f823"/>
      </item>
      <item>
        <title>What Hollywood Movies Get Right (and Wrong) About Hacking</title>
        <link>https://www.huntress.com/blog/hollywood-hacking-scenes-we-loved-tradecraft-tuesday-recap</link>
        <guid>https://www.huntress.com/blog/hollywood-hacking-scenes-we-loved-tradecraft-tuesday-recap</guid>
        <description>From The Social Network to The Matrix Reloaded, we break down the top hacking movie and TV show scenes that made us applaud (and cringe).</description>
        <pubDate>2025-08-11T15:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F735920a2e1e14a408ab45abfb9f6de03" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F735920a2e1e14a408ab45abfb9f6de03"/>
      </item>
      <item>
        <title>How to Identify Recruiting Scams and How Huntress Fights Back</title>
        <link>https://www.huntress.com/blog/identify-recruiting-scams-and-how-huntress-fights-back</link>
        <guid>https://www.huntress.com/blog/identify-recruiting-scams-and-how-huntress-fights-back</guid>
        <description>Recruitment scams are on the rise. Learn how to identify common scams and discover how Huntress is actively working to protect job seekers from fraudulent offers and identity theft.</description>
        <pubDate>2025-08-05T04:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb2a5c6b3fa32453c850c550b1d47c78d" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb2a5c6b3fa32453c850c550b1d47c78d"/>
      </item>
      <item>
        <title>The Commented Kill Chain: Why Old Ransomware Playbooks Never Die</title>
        <link>https://www.huntress.com/blog/why-old-ransomware-playbooks-never-die</link>
        <guid>https://www.huntress.com/blog/why-old-ransomware-playbooks-never-die</guid>
        <description>When a clearly commented script revealed an attacker&#39;s tactics, Huntress prevented encryption. Read on to learn more about the evolution of recycled ransomware playbooks used by multiple threat actors.</description>
        <pubDate>2025-07-31T04:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ff8188b57155447be8cb86c6c40a0540b" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ff8188b57155447be8cb86c6c40a0540b"/>
      </item>
      <item>
        <title>Information to Insights: Intrusion Analysis Methodology</title>
        <link>https://www.huntress.com/blog/intrusion-analysis-methodology</link>
        <guid>https://www.huntress.com/blog/intrusion-analysis-methodology</guid>
        <description>Transform raw Windows event data into actionable insights. Learn expert methodologies for intrusion analysis, authentication events, credential dumping, and RDP activity to stay ahead of threats.</description>
        <pubDate>2025-07-30T04:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F19c91199feb34cdaa9bd1dac300e9742" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F19c91199feb34cdaa9bd1dac300e9742"/>
      </item>
      <item>
        <title>Getting to the Crux (Ransomware) of the Matter</title>
        <link>https://www.huntress.com/blog/crux-ransomware</link>
        <guid>https://www.huntress.com/blog/crux-ransomware</guid>
        <description>Huntress has observed a new ransomware variant, Crux, being used in multiple incidents. </description>
        <pubDate>2025-07-18T04:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F84847380d23e4cb0a4039b82ecf4d17c" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F84847380d23e4cb0a4039b82ecf4d17c"/>
      </item>
      <item>
        <title>The Case For SigParser</title>
        <link>https://www.huntress.com/blog/the-case-for-sigparser</link>
        <guid>https://www.huntress.com/blog/the-case-for-sigparser</guid>
        <description>Court is in session! In this blog post, we examine the use of a legitimate Microsoft 365 application called “SigParser” identified during an identity compromise. How are OAuth apps used during identity intrusions? Find out here!</description>
        <pubDate>2025-07-18T04:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F888436919fec4b1cacddbc154346e96d" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F888436919fec4b1cacddbc154346e96d"/>
      </item>
      <item>
        <title>The 2025 Cybercrime Report: 9 Emerging Trends + Statistics | Huntress</title>
        <link>https://www.huntress.com/blog/cybercrime-trends</link>
        <guid>https://www.huntress.com/blog/cybercrime-trends</guid>
        <description>Learn top cybercrime trends from Huntress’ 2025 survey of more than 500 American IT professionals. Plus, learn tips for improving your cybersecurity. </description>
        <pubDate>2025-07-17T14:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F50f57283957f438ba1fe5c5af85d71f8" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F50f57283957f438ba1fe5c5af85d71f8"/>
      </item>
      <item>
        <title>Remote Monitoring and Management Tools: A Gateway for Bulk Attacks on MSP Customers, Pt. 2 </title>
        <link>https://www.huntress.com/blog/rmm-gateway-for-bulk-attacks-on-msp-customers-part-2</link>
        <guid>https://www.huntress.com/blog/rmm-gateway-for-bulk-attacks-on-msp-customers-part-2</guid>
        <description>When a threat actor exploited an MSP&#39;s RMM tool to target businesses, Huntress investigated and uncovered another eerily similar incident with key differences that reveal evolving tactics</description>
        <pubDate>2025-07-17T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc794f1fa886c42b6b000e35f53be62f4" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc794f1fa886c42b6b000e35f53be62f4"/>
      </item>
      <item>
        <title>Huntress Collabs with Microsoft to Boost Business Security</title>
        <link>https://www.huntress.com/blog/huntress-microsoft-collaborate-to-boost-business-security</link>
        <guid>https://www.huntress.com/blog/huntress-microsoft-collaborate-to-boost-business-security</guid>
        <description>Huntress is collaborating with Microsoft to help your business get the most out of your Microsoft security investments.</description>
        <pubDate>2025-07-14T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F8a43a4e22a754564aaccfde7501d69b4?format=webp" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F8a43a4e22a754564aaccfde7501d69b4?format=webp"/>
      </item>
      <item>
        <title>Wing FTP Server Remote Code Execution (CVE-2025-47812) Exploited in the Wild</title>
        <link>https://www.huntress.com/blog/wing-ftp-server-remote-code-execution-cve-2025-47812-exploited-in-wild</link>
        <guid>https://www.huntress.com/blog/wing-ftp-server-remote-code-execution-cve-2025-47812-exploited-in-wild</guid>
        <description>Huntress discovered active exploitation of Wing FTP Server RCE (CVE-2025-47812). Learn more about the injection flaw, attack timeline, forensic artifacts, and how to protect your organization.</description>
        <pubDate>2025-07-10T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F8a6eedfd67be41baaa687ee2943c94cc" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F8a6eedfd67be41baaa687ee2943c94cc"/>
      </item>
      <item>
        <title>Top Cyber Hygiene Tips for Better Digital Security</title>
        <link>https://www.huntress.com/blog/huntress-top-cyber-hygiene-tips</link>
        <guid>https://www.huntress.com/blog/huntress-top-cyber-hygiene-tips</guid>
        <description>Secure your systems with these essential cyber hygiene tips, from using MFA to patching software and spotting phishing scams. Stay safe. Stay updated.
</description>
        <pubDate>2025-07-08T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F9f7f4e60dbc840329299feebfb112ff8" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F9f7f4e60dbc840329299feebfb112ff8"/>
      </item>
      <item>
        <title>Remote Monitoring and Management Tools: A Gateway for Bulk Attacks on MSP Customers </title>
        <link>https://www.huntress.com/blog/remote-monitoring-management-tools-gateway-for-attacks-on-msp-pt-1</link>
        <guid>https://www.huntress.com/blog/remote-monitoring-management-tools-gateway-for-attacks-on-msp-pt-1</guid>
        <description>Four years after the Kaseya supply chain attack, a recent incident shows how threat actors still successfully target MSPs’ downstream customers through RMM software.  </description>
        <pubDate>2025-07-02T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F1f0068feceba426ea73ba9b86227e0d1" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F1f0068feceba426ea73ba9b86227e0d1"/>
      </item>
      <item>
        <title>What the OpenAI Court Order Means for Cybersecurity and Privacy</title>
        <link>https://www.huntress.com/blog/openai-court-order-cybersecurity-privacy</link>
        <guid>https://www.huntress.com/blog/openai-court-order-cybersecurity-privacy</guid>
        <description>Learn what the OpenAI lawsuit and court order mean for data privacy, cybersecurity, and the future of AI innovation.</description>
        <pubDate>2025-07-01T15:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F08651219615b47cc8ef33198c66ee39e" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F08651219615b47cc8ef33198c66ee39e"/>
      </item>
      <item>
        <title> AI: Friend or Faux in Cybersecurity? Huntress Tradecraft Tuesday</title>
        <link>https://www.huntress.com/blog/ai-friend-faux-tradecraft-tuesday-recap</link>
        <guid>https://www.huntress.com/blog/ai-friend-faux-tradecraft-tuesday-recap</guid>
        <description>Is AI in cybersecurity a tool for defenders or the attackers? Find out in our recap of Huntress’ June Tradecraft Tuesday, where we break it down. </description>
        <pubDate>2025-06-30T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F1ae6c67adb424ad29558c280ec261b06" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F1ae6c67adb424ad29558c280ec261b06"/>
      </item>
      <item>
        <title>Recutting the Kerberos Diamond Ticket</title>
        <link>https://www.huntress.com/blog/recutting-the-kerberos-diamond-ticket</link>
        <guid>https://www.huntress.com/blog/recutting-the-kerberos-diamond-ticket</guid>
        <description>Clear up common misconceptions about the Kerberos Diamond Ticket and learn how to refine the technique for better OPSEC, including more realistic PAC details and support for service tickets. You’ll learn how to apply the idea securely to both Ticket Granting Tickets and Service Tickets, creating forgeries that blend in more effectively with legitimate Kerberos traffic. The result is a stealthier alternative to traditional Silver Tickets and a more convincing method that raises the bar for Kerberos forgeries.</description>
        <pubDate>2025-06-25T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F40b868e2890449aaab56b1c0f1aadabb" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F40b868e2890449aaab56b1c0f1aadabb"/>
      </item>
      <item>
        <title>Huntress Managed ITDR Supports AD-Synced Identity Disablement</title>
        <link>https://www.huntress.com/blog/managed-itdr-supports-ad-synced-identity-disablement</link>
        <guid>https://www.huntress.com/blog/managed-itdr-supports-ad-synced-identity-disablement</guid>
        <description>Huntress Managed ITDR closes the gap with AD-synchronized identity disablement. Secure identities on-prem and in the cloud with this powerful update.</description>
        <pubDate>2025-06-24T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0ada21b3fe074560bda66cd93983a3c6" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0ada21b3fe074560bda66cd93983a3c6"/>
      </item>
      <item>
        <title>Cybersecurity Leadership Insights for Building Unstoppable Security Teams</title>
        <link>https://www.huntress.com/blog/cybersecurity-leadership-insights</link>
        <guid>https://www.huntress.com/blog/cybersecurity-leadership-insights</guid>
        <description>Learn cybersecurity leadership insights on developing elite cybersecurity teams from a seasoned NSA, NASA, and Huntress leader. Learn to hire, retain, and prevent burnout with impactful team growth and success strategies.</description>
        <pubDate>2025-06-20T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Feb0be83142cb4ac2b0493219cf082cdb" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Feb0be83142cb4ac2b0493219cf082cdb"/>
      </item>
      <item>
        <title>Inside the BlueNoroff Web3 macOS Intrusion Analysis </title>
        <link>https://www.huntress.com/blog/inside-bluenoroff-web3-intrusion-analysis</link>
        <guid>https://www.huntress.com/blog/inside-bluenoroff-web3-intrusion-analysis</guid>
        <description>Learn how DPRK&#39;s BlueNoroff group executed a Web3 macOS intrusion. Explore the attack chain, malware, and techniques in our detailed technical report.</description>
        <pubDate>2025-06-18T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ff93ed5f31fd34924b360c3f6c540efba" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ff93ed5f31fd34924b360c3f6c540efba"/>
      </item>
      <item>
        <title>Proactive Account Review Uncovers Unauthorized Surveillance Tools</title>
        <link>https://www.huntress.com/blog/how-proactive-account-review-uncovered-unauthorized-surveillance-tools</link>
        <guid>https://www.huntress.com/blog/how-proactive-account-review-uncovered-unauthorized-surveillance-tools</guid>
        <description>A routine account review revealed the use of productivity monitoring tools in a medical clinic, highlighting the hidden risks associated with employee monitoring software. Learn the importance of proactive audits in protecting critical systems and sensitive data from potential threats.</description>
        <pubDate>2025-06-17T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F1d6eb83f122b437985bd9f60ea0a5c5c" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F1d6eb83f122b437985bd9f60ea0a5c5c"/>
      </item>
      <item>
        <title>Introducing Behavior-Based Assignments</title>
        <link>https://www.huntress.com/blog/introducing-behavior-based-assignments</link>
        <guid>https://www.huntress.com/blog/introducing-behavior-based-assignments</guid>
        <description>Manage human risk by turning real-world incidents into teachable moments with Behavior-Based Assignments. This new feature integrates with Managed EDR and Managed ITDR to provide targeted security awareness training.</description>
        <pubDate>2025-06-16T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5bf3b076871341f1a2e9cf17bf5770ba" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5bf3b076871341f1a2e9cf17bf5770ba"/>
      </item>
      <item>
        <title>137 Key Cybersecurity Statistics for 2026 and Beyond </title>
        <link>https://www.huntress.com/blog/cybersecurity-statistics</link>
        <guid>https://www.huntress.com/blog/cybersecurity-statistics</guid>
        <description>Uncover top cybercrime trends, data breaches, and essential workforce insights to bolster your defenses with this comprehensive roundup of cybersecurity statistics.</description>
        <pubDate>2025-06-12T13:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F4454138e2538496f8b15457e65fec435" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F4454138e2538496f8b15457e65fec435"/>
      </item>
      <item>
        <title>How Huntress Addresses Lateral Movement</title>
        <link>https://www.huntress.com/blog/how-huntress-addresses-lateral-movement</link>
        <guid>https://www.huntress.com/blog/how-huntress-addresses-lateral-movement</guid>
        <description>Huntress Managed EDR tackles lateral movement, a common attack tactic, with a layered approach to telemetry collection and detection. Read on to learn how we identify malicious activity while minimizing false positives.</description>
        <pubDate>2025-06-12T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F48386cf66edd4de9915c234bd59aa77d" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F48386cf66edd4de9915c234bd59aa77d"/>
      </item>
      <item>
        <title>Extending Threat Coverage on Macs with XProtect and Microsoft Defender for Endpoint</title>
        <link>https://www.huntress.com/blog/threat-coverage-on-macs-with-xprotect-microsoft-defender-for-endpoint</link>
        <guid>https://www.huntress.com/blog/threat-coverage-on-macs-with-xprotect-microsoft-defender-for-endpoint</guid>
        <description>Enhance Mac security with Huntress Managed EDR&#39;s new coverage for Apple XProtect and Microsoft Defender for Endpoint. Learn how we can protect your macOS.
</description>
        <pubDate>2025-06-11T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F66663b217d3948968b04b8dfa7d3e842" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F66663b217d3948968b04b8dfa7d3e842"/>
      </item>
      <item>
        <title> Introducing Threat Simulator for Better Employee Security Awareness Training. Start Your Trial Today.</title>
        <link>https://www.huntress.com/blog/introducing-threat-simulator-from-huntress-managed-sat</link>
        <guid>https://www.huntress.com/blog/introducing-threat-simulator-from-huntress-managed-sat</guid>
        <description>Boost employee security awareness with Threat Simulator from Huntress Managed SAT. It features hands-on training, game-like sessions, and real results. Start your free trial today.</description>
        <pubDate>2025-06-10T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F814c886b24e346a18980c4a5cb5ddb98" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F814c886b24e346a18980c4a5cb5ddb98"/>
      </item>
      <item>
        <title>Boring Isn’t Harmless: The Risks Behind Common Cyberattack Tradecraft </title>
        <link>https://www.huntress.com/blog/boring-isnt-harmless-risks-behind-common-cyberattack-tradecraft</link>
        <guid>https://www.huntress.com/blog/boring-isnt-harmless-risks-behind-common-cyberattack-tradecraft</guid>
        <description>Don’t underestimate basic attacker tradecraft tactics. Learn how common cybersecurity tradecraft succeeds and get practical tips from the Huntress SOC to shut it down.</description>
        <pubDate>2025-06-05T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F998554c77ccc407ba93a70347197da55" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F998554c77ccc407ba93a70347197da55"/>
      </item>
      <item>
        <title>Infostealers Crash Course: A Tradecraft Tuesday Recap</title>
        <link>https://www.huntress.com/blog/infostealers-crash-course-tradecraft-tuesday-recap</link>
        <guid>https://www.huntress.com/blog/infostealers-crash-course-tradecraft-tuesday-recap</guid>
        <description>Cybercriminals are sitting on a pile of stolen credentials, financial information, and sensitive data, thanks to the success of infostealers. Read more to learn how infostealers have grown to become a scourge to defenders, and how businesses can protect themselves.</description>
        <pubDate>2025-06-03T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe58917463c8045fdb761d563d6d14ef2" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe58917463c8045fdb761d563d6d14ef2"/>
      </item>
      <item>
        <title>“Advanced” Intrusion Targeting Critical Marketing Research Company</title>
        <link>https://www.huntress.com/blog/advanced-intrusion-targeting-executive-at-critical-marketing-research-company</link>
        <guid>https://www.huntress.com/blog/advanced-intrusion-targeting-executive-at-critical-marketing-research-company</guid>
        <description>An intrusion at a market research company used living-off-the-land techniques, but Huntress detected and mitigated the threat, uncovering tactics like service creation and registry manipulation. Learn more and get detection guidance and mitigation strategies.</description>
        <pubDate>2025-05-27T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F6703ac68aa5d46be997e2e15cd64478d" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F6703ac68aa5d46be997e2e15cd64478d"/>
      </item>
      <item>
        <title>Detecting Malicious Security Product Bypass Techniques</title>
        <link>https://www.huntress.com/blog/defendnot-detecting-malicious-security-product-bypass-techniques</link>
        <guid>https://www.huntress.com/blog/defendnot-detecting-malicious-security-product-bypass-techniques</guid>
        <description>&quot;defendnot&quot; bypasses Windows Defender using undocumented APIs. Learn detection strategies and robust defenses against this sophisticated evasion technique.
</description>
        <pubDate>2025-05-23T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe08f13bc961c434ca082024b58a4bf77" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe08f13bc961c434ca082024b58a4bf77"/>
      </item>
      <item>
        <title>Building an Incident Response Plan That Works </title>
        <link>https://www.huntress.com/blog/incident-response-planning-basics</link>
        <guid>https://www.huntress.com/blog/incident-response-planning-basics</guid>
        <description>Every business is unique, and your incident response plan should be too. Learn why having a tailored plan is crucial for staying prepared and minimizing risk. </description>
        <pubDate>2025-05-21T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fcbba08966dca437d8ee87b16b4d6db27" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fcbba08966dca437d8ee87b16b4d6db27"/>
      </item>
      <item>
        <title>2025 Managed ITDR Report: The Rise of Identity Threats in Cybersecurity</title>
        <link>https://www.huntress.com/blog/identity-threats-in-cybersecurity</link>
        <guid>https://www.huntress.com/blog/identity-threats-in-cybersecurity</guid>
        <description>Why Huntress’ 2025 Managed ITDR Report should be required reading for every security team.</description>
        <pubDate>2025-05-20T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fa8746e2f24bc482dbac65a05128f46d7" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fa8746e2f24bc482dbac65a05128f46d7"/>
      </item>
      <item>
        <title>Breaking Down Ransomware Attacks | Learn How To Stay Protected</title>
        <link>https://www.huntress.com/blog/breaking-down-ransomware-attacks-and-how-to-stay-ahead</link>
        <guid>https://www.huntress.com/blog/breaking-down-ransomware-attacks-and-how-to-stay-ahead</guid>
        <description>Break down how a ransomware attack works.  Why ransomware is on the side, and how Huntress helps you stay protected. </description>
        <pubDate>2025-05-15T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F88af397985f64858a50ee62e863756e8" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F88af397985f64858a50ee62e863756e8"/>
      </item>
      <item>
        <title>Simplify Agent Management with Automated Health Checks</title>
        <link>https://www.huntress.com/blog/huntress-new-client-side-api-brings-endpoint-clarity</link>
        <guid>https://www.huntress.com/blog/huntress-new-client-side-api-brings-endpoint-clarity</guid>
        <description>Get to know Huntress&#39; new client-side API for EDR, which enables real-time agent health checks and simplifies endpoint management. With instant “healthy” or “unhealthy” status updates, you can ensure your security is running smoothly.</description>
        <pubDate>2025-05-14T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F323fd8422bb74502ae1c903fd839cb6e" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F323fd8422bb74502ae1c903fd839cb6e"/>
      </item>
      <item>
        <title>Time to Ransom is Money</title>
        <link>https://www.huntress.com/blog/for-ransomware-time-to-ransom-is-money</link>
        <guid>https://www.huntress.com/blog/for-ransomware-time-to-ransom-is-money</guid>
        <description>During ransomware attacks, the average time-to-ransom for attackers is almost 17 hours. Learn more about what this means for businesses.</description>
        <pubDate>2025-05-13T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F1ace9eaad23c463992670e3dadaae9b1" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F1ace9eaad23c463992670e3dadaae9b1"/>
      </item>
      <item>
        <title>Post-Exploitation Activities Observed from the Samsung MagicINFO 9 Server Flaw</title>
        <link>https://www.huntress.com/blog/post-exploitation-activities-observed-from-samsung-magicinfo-9-server-flaw</link>
        <guid>https://www.huntress.com/blog/post-exploitation-activities-observed-from-samsung-magicinfo-9-server-flaw</guid>
        <description>Huntress has verified that attackers are exploiting flaws in Samsung MagicINFO 9 Server (version 21.1050.0). Understand why MagicINFO 9 Server shouldn’t be internet-facing until a patch is available and applied. </description>
        <pubDate>2025-05-09T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fbe8f1afdf8524a23a8ee68d7d8f05e36" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fbe8f1afdf8524a23a8ee68d7d8f05e36"/>
      </item>
      <item>
        <title>Utilizing ASNs for Hunting &amp; Response</title>
        <link>https://www.huntress.com/blog/utilizing-asns-for-hunting-and-response</link>
        <guid>https://www.huntress.com/blog/utilizing-asns-for-hunting-and-response</guid>
        <description>Autonomous system numbers are like the address book of the internet, and not every IP address belongs to a “friendly” address. Learn more about how the Huntress Hunt &amp; Response teams utilize ASNs.</description>
        <pubDate>2025-05-08T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe1f7e6bf75e24b7f9d125d57a745b3b9" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe1f7e6bf75e24b7f9d125d57a745b3b9"/>
      </item>
      <item>
        <title>Rapid Response: Samsung MagicINFO 9 Server Flaw</title>
        <link>https://www.huntress.com/blog/rapid-response-samsung-magicinfo9-server-flaw</link>
        <guid>https://www.huntress.com/blog/rapid-response-samsung-magicinfo9-server-flaw</guid>
        <description>Huntress has verified Samsung’s MagicINFO 9 Server (version 21.1050.0) is vulnerable to a publicly available proof-of-concept (PoC). Understand why MagicINFO 9 Server shouldn’t be internet-facing until a patch is applied. </description>
        <pubDate>2025-05-07T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F94d861c26a78420b94c6695444187e65" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F94d861c26a78420b94c6695444187e65"/>
      </item>
      <item>
        <title>Do Tigers Really Change Their Stripes?</title>
        <link>https://www.huntress.com/blog/do-tigers-really-change-their-stripes</link>
        <guid>https://www.huntress.com/blog/do-tigers-really-change-their-stripes</guid>
        <description>Across the larger cybersecurity community, an often-used adage is that “threat actors always change their tactics.” However, when we really start to look at and track incident data, we begin to see that while some changes may be necessitated based on infrastructures and other challenges the threat actor may encounter, there are times when tactics remain consistent across incidents. Recent investigations into exploitation activity for CVE-2025-31151 and CVE-2025-30406 show similar TTPs across different incidents.</description>
        <pubDate>2025-05-06T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ff869df80f0ab4eb788747d2ecc98e1bf" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ff869df80f0ab4eb788747d2ecc98e1bf"/>
      </item>
      <item>
        <title>The 36 Most Common Cyberattacks (2025) | Huntress</title>
        <link>https://www.huntress.com/blog/most-common-cyberattacks</link>
        <guid>https://www.huntress.com/blog/most-common-cyberattacks</guid>
        <description>Learn about some of the most common cyberattacks, how threat actors access computers and networks, and how to lower future risks. </description>
        <pubDate>2025-05-02T13:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F6c00a04325734f56ab8baa8650aa4ff5" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F6c00a04325734f56ab8baa8650aa4ff5"/>
      </item>
      <item>
        <title>Applying Criminal Justice Principles to Detection Engineering</title>
        <link>https://www.huntress.com/blog/applying-criminal-justice-principles-to-detection-engineering</link>
        <guid>https://www.huntress.com/blog/applying-criminal-justice-principles-to-detection-engineering</guid>
        <description>Explore how criminal justice principles can improve detection engineering by distinguishing true threats from false positives. And learn how concepts like burden of proof and intent enhance cybersecurity defense strategies.</description>
        <pubDate>2025-05-01T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe2b8962c10f8428486111bf76ce7a89f" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe2b8962c10f8428486111bf76ce7a89f"/>
      </item>
      <item>
        <title>What Is Business Email Compromise? BEC Defined | Huntress</title>
        <link>https://www.huntress.com/blog/what-is-business-email-compromise-bec</link>
        <guid>https://www.huntress.com/blog/what-is-business-email-compromise-bec</guid>
        <description>A business email compromise (BEC) attack is a type of scam where bad actors impersonate a trusted source to obtain information from their targeted individual.</description>
        <pubDate>2025-04-30T22:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F23d923d12fa84474bb87eae5a20490eb?format=webp" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F23d923d12fa84474bb87eae5a20490eb?format=webp"/>
      </item>
      <item>
        <title>Minutes Matter: Huntress Managed SIEM Makes Them Count (Here’s How)</title>
        <link>https://www.huntress.com/blog/minutes-matter-huntress-managed-siem-makes-them-count</link>
        <guid>https://www.huntress.com/blog/minutes-matter-huntress-managed-siem-makes-them-count</guid>
        <description>Huntress Managed SIEM makes threat detection and response faster and more accessible. Learn about new features, real-world success stories, and how it enhances cybersecurity and compliance. </description>
        <pubDate>2025-04-29T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F37776d8465ff403e94183ba87ce7f64f" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F37776d8465ff403e94183ba87ce7f64f"/>
      </item>
      <item>
        <title>Identity Threats Got a Whole Lot Nastier, But So Did We</title>
        <link>https://www.huntress.com/blog/protect-against-identity-threats-with-managed-itdr-and-rogue-apps</link>
        <guid>https://www.huntress.com/blog/protect-against-identity-threats-with-managed-itdr-and-rogue-apps</guid>
        <description>Huntress Managed ITDR with Rogue Apps proactively protects against identity threats, including malicious OAuth apps. Learn about the surge in identity-based attacks and how to defend your business effectively.</description>
        <pubDate>2025-04-28T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F2445f146c0644472991673385dc2a425" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F2445f146c0644472991673385dc2a425"/>
      </item>
      <item>
        <title>How to Stop Malware Attacks with a Security-First Culture</title>
        <link>https://www.huntress.com/blog/how-to-stop-malware-attacks-with-security-first-culture</link>
        <guid>https://www.huntress.com/blog/how-to-stop-malware-attacks-with-security-first-culture</guid>
        <description>Protect your business from malware attacks by fostering a security-first culture. Learn how to defend against cyber threats, establish strategies, and train employees to spot malware before it strikes.</description>
        <pubDate>2025-04-24T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>Credential Theft: Expanding Your Reach, Pt. II</title>
        <link>https://www.huntress.com/blog/credential-theft-expanding-your-reach-pt-2</link>
        <guid>https://www.huntress.com/blog/credential-theft-expanding-your-reach-pt-2</guid>
        <description>As with many tactics within the MITRE ATT&amp;CK framework, credential theft consists of a number of different techniques. Showing what many of them look like on an endpoint helps other security professionals understand what to look for and how to detect and respond to similar activity.</description>
        <pubDate>2025-04-24T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5389552a2dc8495ba553344ec918772f" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5389552a2dc8495ba553344ec918772f"/>
      </item>
      <item>
        <title>Say Hello to Mac Malware</title>
        <link>https://www.huntress.com/blog/say-hello-to-mac-malware-a-tradecraft-tuesday-recap</link>
        <guid>https://www.huntress.com/blog/say-hello-to-mac-malware-a-tradecraft-tuesday-recap</guid>
        <description>In this month’s Tradecraft Tuesday, we talked about how threat actors are finetuning their macOS malware in order to maintain persistent access and avoid detection by Apple’s security features.</description>
        <pubDate>2025-04-22T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fed09297839c84515a7dd500c273e3f91" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fed09297839c84515a7dd500c273e3f91"/>
      </item>
      <item>
        <title>Tales of Too Many RMMs</title>
        <link>https://www.huntress.com/blog/tales-of-too-many-rmms</link>
        <guid>https://www.huntress.com/blog/tales-of-too-many-rmms</guid>
        <description>In a highly interconnected world, remote monitoring and management (RMM) tools are critical to reducing cost and increasing efficiencies. However, these tools pose challenges and even significant risk if not properly managed.</description>
        <pubDate>2025-04-17T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F4c2f27fedce4423eb2a149f38711ff76?format=webp" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F4c2f27fedce4423eb2a149f38711ff76?format=webp"/>
      </item>
      <item>
        <title>Why App Allowlisting and Zero Trust Solutions Alone Won’t Save You</title>
        <link>https://www.huntress.com/blog/why-app-allowlisting-and-zero-trust-solutions-alone-wont-save-you</link>
        <guid>https://www.huntress.com/blog/why-app-allowlisting-and-zero-trust-solutions-alone-wont-save-you</guid>
        <description>App Allowlisting is a good preventative software tool, but it&#39;s not enough. Learn why a layered security approach with detection and response is crucial to protect against today&#39;s cyber threats.</description>
        <pubDate>2025-04-16T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F55ea42c3938545179f5aaef3cc81231c" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F55ea42c3938545179f5aaef3cc81231c"/>
      </item>
      <item>
        <title>CVE-2025-30406 - Critical Gladinet CentreStack &amp; Triofox Vulnerability Exploited In The Wild</title>
        <link>https://www.huntress.com/blog/cve-2025-30406-critical-gladinet-centrestack-triofox-vulnerability-exploited-in-the-wild</link>
        <guid>https://www.huntress.com/blog/cve-2025-30406-critical-gladinet-centrestack-triofox-vulnerability-exploited-in-the-wild</guid>
        <description>Huntress has observed in the wild exploitation against CVE-2025-30406, a weakness due to hardcoded cryptographic keys.</description>
        <pubDate>2025-04-14T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ffdf0bfe3997047828069aab24cc22b2e?format=webp" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ffdf0bfe3997047828069aab24cc22b2e?format=webp"/>
      </item>
      <item>
        <title>Ransomware Initial Access Brokers Exposed</title>
        <link>https://www.huntress.com/blog/brute-force-or-something-more-ransomware-initial-access-brokers-exposed</link>
        <guid>https://www.huntress.com/blog/brute-force-or-something-more-ransomware-initial-access-brokers-exposed</guid>
        <description>Discover how a seemingly simple brute force attack led to the uncovering of a suspected ransomware-as-a-service operation. This ecosystem appears to be leveraged by initial access brokers, driving an illicit and complex network of cybercrime.</description>
        <pubDate>2025-04-10T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fa24761509a8f4363840a74e944c546af?format=webp" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fa24761509a8f4363840a74e944c546af?format=webp"/>
      </item>
      <item>
        <title>How EDR and ITDR Elevate Your Security</title>
        <link>https://www.huntress.com/blog/identities-are-the-new-perimeter-endpoints-are-only-the-beginning</link>
        <guid>https://www.huntress.com/blog/identities-are-the-new-perimeter-endpoints-are-only-the-beginning</guid>
        <description>Threat actors are now exploiting both endpoints and identities in the latest cyberattacks. Learn about the rise of identity-based threats and why a combined EDR and ITDR approach is crucial for your cybersecurity.</description>
        <pubDate>2025-04-09T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F161e7d7bd02c41e092446e4b77f7d96c?format=webp" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F161e7d7bd02c41e092446e4b77f7d96c?format=webp"/>
      </item>
      <item>
        <title>Credential Theft Guide: Initial Access, Mimikatz &amp; Post-Exploitation</title>
        <link>https://www.huntress.com/blog/credential-theft-expanding-your-reach</link>
        <guid>https://www.huntress.com/blog/credential-theft-expanding-your-reach</guid>
        <description>What is credential theft? Learn how threat actors use phishing, brute force, and tools like Mimikatz or Registry hive dumps to gain initial access and move laterally.</description>
        <pubDate>2025-04-08T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fee8c5cd11188478e9934492d13e73a4c?format=webp" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fee8c5cd11188478e9934492d13e73a4c?format=webp"/>
      </item>
      <item>
        <title>CrushFTP CVE-2025-31161 Auth Bypass and Post-Exploitation</title>
        <link>https://www.huntress.com/blog/crushftp-cve-2025-31161-auth-bypass-and-post-exploitation</link>
        <guid>https://www.huntress.com/blog/crushftp-cve-2025-31161-auth-bypass-and-post-exploitation</guid>
        <description>Huntress observed in-the-wild exploitation of CVE-2025-31161, an authentication bypass vulnerability in versions of CrushFTP and further  post-exploitation leveraging MeshCentral and other malware.</description>
        <pubDate>2025-04-04T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F533bac73b98e4e4682bb3aaa8914c6d0?format=webp" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F533bac73b98e4e4682bb3aaa8914c6d0?format=webp"/>
      </item>
      <item>
        <title>Cyber Hygiene Threats Lurking at Your Perimeter: RDP, VPNs, and Remote Tools</title>
        <link>https://www.huntress.com/blog/cyber-hygiene-attacks-prevention</link>
        <guid>https://www.huntress.com/blog/cyber-hygiene-attacks-prevention</guid>
        <description>Poor credential hygiene and misconfigurations give hackers an easy way in. See real-world cyber hygiene failures, how attackers exploit them, and how Managed EDR stops them cold.</description>
        <pubDate>2025-04-04T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F714e05451e2b42f4aa15cf477e0aa985?format=webp" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F714e05451e2b42f4aa15cf477e0aa985?format=webp"/>
      </item>
      <item>
        <title>The Unwanted Guest</title>
        <link>https://www.huntress.com/blog/the-unwanted-guest</link>
        <guid>https://www.huntress.com/blog/the-unwanted-guest</guid>
        <description>Threat actors are enabling the built-in Windows Guest account to maintain persistence. Learn how they gain access and how to detect this activity.
</description>
        <pubDate>2025-04-02T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb3bb27f055ec404eb53510d666922467" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb3bb27f055ec404eb53510d666922467"/>
      </item>
      <item>
        <title>Scalable EDR Advanced Agent Analytics with ClickHouse</title>
        <link>https://www.huntress.com/blog/scalable-edr-advanced-agent-analytics-with-clickhouse</link>
        <guid>https://www.huntress.com/blog/scalable-edr-advanced-agent-analytics-with-clickhouse</guid>
        <description>Learn how and why Huntress uses ClickHouse for scalable EDR agent analytics, ensuring availability and stability for millions of endpoints while maintaining cost efficiency.</description>
        <pubDate>2025-04-01T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fefe08e3ae55d48fcb63a4ecc6c665a41?format=webp" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fefe08e3ae55d48fcb63a4ecc6c665a41?format=webp"/>
      </item>
      <item>
        <title>Why cybersecurity matters for your business. </title>
        <link>https://www.huntress.com/blog/neglecting-cybersecurity-can-save-you-money-now</link>
        <guid>https://www.huntress.com/blog/neglecting-cybersecurity-can-save-you-money-now</guid>
        <description>Doing nothing now can cost your business more than money. Learn why proactive cybersecurity steps keep your business resilient and save costs in the long term. </description>
        <pubDate>2025-03-31T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe2136aee1be54400b29dc5e09b9332fd?format=webp" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe2136aee1be54400b29dc5e09b9332fd?format=webp"/>
      </item>
      <item>
        <title>Securing Endpoints from Common Vulnerabilities </title>
        <link>https://www.huntress.com/blog/locking-down-common-endpoint-vulnerabilities</link>
        <guid>https://www.huntress.com/blog/locking-down-common-endpoint-vulnerabilities</guid>
        <description>Learn how to lock down common endpoint vulnerabilities like weak passwords and unpatched software to secure your systems against threats like phishing and malware.</description>
        <pubDate>2025-03-28T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F933e6b3304fc4caa9a41ec00ae8cc7a6?format=webp" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F933e6b3304fc4caa9a41ec00ae8cc7a6?format=webp"/>
      </item>
      <item>
        <title>The Ultimate Validation: Making a Hacker’s “Do Not Engage” List</title>
        <link>https://www.huntress.com/blog/making-a-hackers-do-not-engage-list</link>
        <guid>https://www.huntress.com/blog/making-a-hackers-do-not-engage-list</guid>
        <description>When Celestial Stealer runs in the wild, it looks for Huntress’ own Jai Minton as a potential threat, and this shuts down the infostealer operation if his name is detected. </description>
        <pubDate>2025-03-24T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F4c73e0fe18724ea8a876b0e44c4c6c1c?format=webp" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F4c73e0fe18724ea8a876b0e44c4c6c1c?format=webp"/>
      </item>
      <item>
        <title>Untold Tales from Tactical Response | Huntress</title>
        <link>https://www.huntress.com/blog/untold-tales-from-tactical-response</link>
        <guid>https://www.huntress.com/blog/untold-tales-from-tactical-response</guid>
        <description>Explore the inner workings of real-world cyberattacks and gain insight into the challenges faced by Huntress threat analysts. Discover the critical role of investigative techniques and their importance in uncovering and addressing these threats.</description>
        <pubDate>2025-03-10T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ffd86912b14674040b0fb0ee6a57ad94c" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ffd86912b14674040b0fb0ee6a57ad94c"/>
      </item>
      <item>
        <title>90% of IT Pros are Confident in Remote Cybersecurity | Huntress</title>
        <link>https://www.huntress.com/blog/remote-work-security-best-practices</link>
        <guid>https://www.huntress.com/blog/remote-work-security-best-practices</guid>
        <description>New data shows cybersecurity professionals are confident about their remote work safety. See the findings, plus security best practices for remote and hybrid work.</description>
        <pubDate>2025-03-07T19:07:02Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fbb21b23e75dd4c0fb36b4dc5b3161401?format=webp" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fbb21b23e75dd4c0fb36b4dc5b3161401?format=webp"/>
      </item>
      <item>
        <title>Detect and Eliminate Persistent Malware Before It Wreaks Havoc | Huntress</title>
        <link>https://www.huntress.com/blog/how-to-detect-and-eliminate-persistent-malware-before-it-wreaks-havoc</link>
        <guid>https://www.huntress.com/blog/how-to-detect-and-eliminate-persistent-malware-before-it-wreaks-havoc</guid>
        <description>Stopping malware isn’t about catching one-off alerts. It’s about finding and shutting down the persistence that keeps them in your systems. Here’s how Huntress found, fought, and drop-kicked malware that others missed.</description>
        <pubDate>2025-03-07T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F46335e2c851245038cd96e17cd05f0d9" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F46335e2c851245038cd96e17cd05f0d9"/>
      </item>
      <item>
        <title>How Huntress Achieved a Blazing Fast MTTR</title>
        <link>https://www.huntress.com/blog/how-huntress-achieved-a-blazing-fast-mttr-and-why-it-matters</link>
        <guid>https://www.huntress.com/blog/how-huntress-achieved-a-blazing-fast-mttr-and-why-it-matters</guid>
        <description>The Huntress SOC has an average response time of 8 minutes. That means we can investigate threats, send incident reports, and resolve alerts in record time, shutting down attackers before they have a chance to act.</description>
        <pubDate>2025-03-06T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fd8a5b9d44fc44feeb7e65ba99a618070" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fd8a5b9d44fc44feeb7e65ba99a618070"/>
      </item>
      <item>
        <title>Uncover Tomorrow’s Cyber Threats Today | Huntress</title>
        <link>https://www.huntress.com/blog/infographic-uncover-tomorrows-cyber-threats-today</link>
        <guid>https://www.huntress.com/blog/infographic-uncover-tomorrows-cyber-threats-today</guid>
        <description>Explore 2024&#39;s top cyber threats, including ransomware trends, advanced phishing tactics, and targeted industries. Stay ahead—download the Huntress 2025 Cyber Threat Report now!</description>
        <pubDate>2025-03-04T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc0d532fc8ac544ecac2b72837d2d4872" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc0d532fc8ac544ecac2b72837d2d4872"/>
      </item>
      <item>
        <title>Cybersecurity Threats in Healthcare [2025 Report] | Huntress</title>
        <link>https://www.huntress.com/blog/cybersecurity-threats-in-healthcare</link>
        <guid>https://www.huntress.com/blog/cybersecurity-threats-in-healthcare</guid>
        <description>These are the top cybersecurity threats in healthcare, according to Huntress’s 2025 survey of IT pros. Read the full report and learn how to avoid them.</description>
        <pubDate>2025-03-04T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F53424e3802db4ea78c2e966363457a84?format=webp" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F53424e3802db4ea78c2e966363457a84?format=webp"/>
      </item>
      <item>
        <title>Hunt for RedCurl | Huntress</title>
        <link>https://www.huntress.com/blog/the-hunt-for-redcurl-2</link>
        <guid>https://www.huntress.com/blog/the-hunt-for-redcurl-2</guid>
        <description>Huntress discovered RedCurl activity across several organizations in Canada going back to 2023. Learn more about how this APT operates and how they aim to remain undetected while exfiltrating sensitive data.</description>
        <pubDate>2025-03-03T15:55:35Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7cec99d221cc47fc945c3f1eadc23962" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7cec99d221cc47fc945c3f1eadc23962"/>
      </item>
      <item>
        <title>How Effective Is Your SAT Program? | Huntress</title>
        <link>https://www.huntress.com/blog/the-wall-street-journal-says-sat-programs-do-more-harm-than-good-are-they-right</link>
        <guid>https://www.huntress.com/blog/the-wall-street-journal-says-sat-programs-do-more-harm-than-good-are-they-right</guid>
        <description>Discover how modernized security awareness training can transform your workforce into a cybersecurity-first culture. Learn Huntress&#39; key strategies.</description>
        <pubDate>2025-02-27T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fa9f8f5b943514f28bdf2d7b32277ba7b" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fa9f8f5b943514f28bdf2d7b32277ba7b"/>
      </item>
      <item>
        <title>2025 Cybersecurity Threat Report: Proliferating RATs, Evolving Ransomware, and Other Findings | Huntress</title>
        <link>https://www.huntress.com/blog/huntress-2025-cyber-threat-report-proliferating-rats-evolving-ransomware-and-other-findings</link>
        <guid>https://www.huntress.com/blog/huntress-2025-cyber-threat-report-proliferating-rats-evolving-ransomware-and-other-findings</guid>
        <description>Huntress’ 2025 Cyber Threat Report is here! Explore the year&#39;s biggest threats—RATs, phishing, ransomware—and how evolving tactics demand smarter defense.</description>
        <pubDate>2025-02-11T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ffc25dbb530b84cb79bc232519d83b123?format=webp" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ffc25dbb530b84cb79bc232519d83b123?format=webp"/>
      </item>
      <item>
        <title>6 Months of Researching OAuth Application Attacks | Huntress</title>
        <link>https://www.huntress.com/blog/never-just-one-termite-6-months-of-researching-oauth-application-attacks</link>
        <guid>https://www.huntress.com/blog/never-just-one-termite-6-months-of-researching-oauth-application-attacks</guid>
        <description>There’s never just one termite. Huntress has spent the last 6 months researching and cracking down on malicious OAuth applications. Read about what we’ve found in this blog!</description>
        <pubDate>2025-02-10T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc80bdc27f3bc4437af5128b7ebbb2ed9" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc80bdc27f3bc4437af5128b7ebbb2ed9"/>
      </item>
      <item>
        <title>Device Code Phishing in Google Cloud and Azure | Huntress</title>
        <link>https://www.huntress.com/blog/oh-auth-2-0-device-code-phishing-in-google-cloud-and-azure</link>
        <guid>https://www.huntress.com/blog/oh-auth-2-0-device-code-phishing-in-google-cloud-and-azure</guid>
        <description>All OAuth 2.0 implementations are equal. Some are just more equal than others. This blog covers device code phishing and compares OAuth implementations between Google and Azure. Does OAuth implementation impact the efficacy of hacker tradecraft? Find out here!</description>
        <pubDate>2025-02-06T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7e7c649ebb684f77b166569f03be9b08" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7e7c649ebb684f77b166569f03be9b08"/>
      </item>
      <item>
        <title>The Huntress Cyber Insurance Trends Report (2025) | Huntress</title>
        <link>https://www.huntress.com/blog/cyber-insurance-trends</link>
        <guid>https://www.huntress.com/blog/cyber-insurance-trends</guid>
        <description>Discover the top cyber insurance trends for 2025, plus learn how to choose the right plan for your organization.</description>
        <pubDate>2025-02-04T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F57d4734a5b8b4d54a3fbad3aef327093?format=webp" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F57d4734a5b8b4d54a3fbad3aef327093?format=webp"/>
      </item>
      <item>
        <title>Why Every Business Needs Endpoint Protection | Huntress</title>
        <link>https://www.huntress.com/blog/why-every-business-needs-endpoint-protection-in-2025</link>
        <guid>https://www.huntress.com/blog/why-every-business-needs-endpoint-protection-in-2025</guid>
        <description>Your endpoints are prime targets for cyberattacks. Learn why protecting them is vital and how endpoint security can shield your business from becoming an easy mark.</description>
        <pubDate>2025-01-30T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F4124a5033f0c4f4bac764a29c77ad568" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F4124a5033f0c4f4bac764a29c77ad568"/>
      </item>
      <item>
        <title>PerfMon! What Is It Good For? | Huntress</title>
        <link>https://www.huntress.com/blog/perfmon-what-is-it-good-for</link>
        <guid>https://www.huntress.com/blog/perfmon-what-is-it-good-for</guid>
        <description>Explore how Performance Monitor (PerfMon) counters can be used as alternative methods for detecting Kerberos roasting attacks, moving beyond the traditional reliance on Windows Events 4768/4769.</description>
        <pubDate>2025-01-23T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fd01894c2db33458bbea6a87936208c30" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fd01894c2db33458bbea6a87936208c30"/>
      </item>
      <item>
        <title>What are LOLBins? How to Detect Malicious Threats | Huntress</title>
        <link>https://www.huntress.com/blog/detecting-malicious-use-of-lolbins</link>
        <guid>https://www.huntress.com/blog/detecting-malicious-use-of-lolbins</guid>
        <description>Learn what LOLBins are, threats malicious threat actors can pose, how to detect those threats, and how to prevent them.</description>
        <pubDate>2025-01-09T22:12:04Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0144390d06ee4847aa8fa25b834e262b" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0144390d06ee4847aa8fa25b834e262b"/>
      </item>
      <item>
        <title>Cleo Software Actively Being Exploited in the Wild CVE-2024-55956 | Huntress</title>
        <link>https://www.huntress.com/blog/threat-advisory-oh-no-cleo-cleo-software-actively-being-exploited-in-the-wild</link>
        <guid>https://www.huntress.com/blog/threat-advisory-oh-no-cleo-cleo-software-actively-being-exploited-in-the-wild</guid>
        <description>Huntress identified an emerging threat involving Cleo’s LexiCom, VLTransfer, and Harmony software, known as CVE-2024-55956, commonly used to manage file transfers. Read more about this emerging threat on the Huntress Blog.</description>
        <pubDate>2025-01-06T21:16:42Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F8676b90cc8994f06af16361dda32924d" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F8676b90cc8994f06af16361dda32924d"/>
      </item>
      <item>
        <title>Exploring Package Tracking Smishing Scams | Huntress</title>
        <link>https://www.huntress.com/blog/exploring-package-tracking-smishing-scams</link>
        <guid>https://www.huntress.com/blog/exploring-package-tracking-smishing-scams</guid>
        <description>Smishing (or SMS phishing) is far more frequent during the holidays. Learn to recognize the signs of a smish and how to avoid falling victim to one.</description>
        <pubDate>2025-01-02T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0bd9a94ea83d4d2a987cfd6c299ec536" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0bd9a94ea83d4d2a987cfd6c299ec536"/>
      </item>
      <item>
        <title>2024: Revisiting a Year in Threats | Huntress</title>
        <link>https://www.huntress.com/blog/2024-revisiting-a-year-in-threats</link>
        <guid>https://www.huntress.com/blog/2024-revisiting-a-year-in-threats</guid>
        <description>Take a look back at some of the biggest threats we observed and analyzed in 2024.</description>
        <pubDate>2024-12-31T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F98acfa7e6524445dbf23864fbf06d65b" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F98acfa7e6524445dbf23864fbf06d65b"/>
      </item>
      <item>
        <title>How Managed SIEM Helps Decode Compliance | Huntress</title>
        <link>https://www.huntress.com/blog/from-mandates-to-assurance-how-managed-siem-helps-decode-compliance-across-the-globe</link>
        <guid>https://www.huntress.com/blog/from-mandates-to-assurance-how-managed-siem-helps-decode-compliance-across-the-globe</guid>
        <description>Understand how Managed SIEM supports your compliance journey worldwide.</description>
        <pubDate>2024-12-26T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F4df5f690264c46cbbc72b1b81fc9771b" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F4df5f690264c46cbbc72b1b81fc9771b"/>
      </item>
      <item>
        <title>Analyzing Initial Access Across Today&#39;s Business Environment | Huntress</title>
        <link>https://www.huntress.com/blog/analyzing-initial-access-across-todays-business-environment</link>
        <guid>https://www.huntress.com/blog/analyzing-initial-access-across-todays-business-environment</guid>
        <description>Learn more about the initial access techniques observed by the Huntress SOC and Tactical Response teams! Gain valuable insights to help you protect your environment.</description>
        <pubDate>2024-12-19T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F3a54b96d4f5541e0914f82c006f1976b" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F3a54b96d4f5541e0914f82c006f1976b"/>
      </item>
      <item>
        <title>When and Where SIEM Fits in Healthcare IT Settings | Huntress</title>
        <link>https://www.huntress.com/blog/first-do-no-harm-when-and-where-siem-fits-in-healthcare-it-settings</link>
        <guid>https://www.huntress.com/blog/first-do-no-harm-when-and-where-siem-fits-in-healthcare-it-settings</guid>
        <description>Understanding SIEM’s benefits, limitations, and best applications in a strong healthcare security stack</description>
        <pubDate>2024-12-18T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F1b363440e2724b4c972075fc09cfdc94" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F1b363440e2724b4c972075fc09cfdc94"/>
      </item>
      <item>
        <title>Does Santa Like NordVPN? | Huntress</title>
        <link>https://www.huntress.com/blog/mommy-does-santa-like-nordvpn</link>
        <guid>https://www.huntress.com/blog/mommy-does-santa-like-nordvpn</guid>
        <description>Huntress Managed ITDR uncovers risks behind popular VPNs and proxies like NordVPN, Mullvad, and more—helping you steer clear of hackers this holiday season.</description>
        <pubDate>2024-12-16T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fd5835479203f4b0c859521de48677778" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fd5835479203f4b0c859521de48677778"/>
      </item>
      <item>
        <title>Cleo Malichus Malware Analysis CVE-2024-55956| Huntress</title>
        <link>https://www.huntress.com/blog/cleo-software-vulnerability-malware-analysis</link>
        <guid>https://www.huntress.com/blog/cleo-software-vulnerability-malware-analysis</guid>
        <description>Team Huntress has analyzed Cleo&#39;s software vulnerability CVE-2024-55956. Take a look at the technical breakdown of a new family of malware we’ve named Malichus.</description>
        <pubDate>2024-12-11T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fae88520124c34fc5a7a321fb2c5745a9" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fae88520124c34fc5a7a321fb2c5745a9"/>
      </item>
      <item>
        <title>2024 Wrapped: Huntress Managed SAT Edition | Huntress</title>
        <link>https://www.huntress.com/blog/2024-wrapped-huntress-managed-sat-edition</link>
        <guid>https://www.huntress.com/blog/2024-wrapped-huntress-managed-sat-edition</guid>
        <description>With 2024 ending, let’s look back at everything new from Huntress Managed SAT this past year.</description>
        <pubDate>2024-12-08T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fa771db805a584f95bd8b9196f483b90f" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fa771db805a584f95bd8b9196f483b90f"/>
      </item>
      <item>
        <title>Managed SIEM and the Art of Perfecting Cyber Defense | Huntress</title>
        <link>https://www.huntress.com/blog/managed-siem-and-the-art-of-perfecting-cyber-defense</link>
        <guid>https://www.huntress.com/blog/managed-siem-and-the-art-of-perfecting-cyber-defense</guid>
        <description>How Huntress Managed SIEM turns signal recognition into defensive mastery.</description>
        <pubDate>2024-12-05T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fd35fba4fcb434f3c8f9d615c09d988c5" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fd35fba4fcb434f3c8f9d615c09d988c5"/>
      </item>
      <item>
        <title>Relevancy of Huntress Managed Security Awareness Training Episodes| Huntress</title>
        <link>https://www.huntress.com/blog/trumans-take-a-product-researchers-insights-on-managed-learning</link>
        <guid>https://www.huntress.com/blog/trumans-take-a-product-researchers-insights-on-managed-learning</guid>
        <description>In this new blog series, we’ll explore the managed episodes from Huntress Managed SAT, dive into the topics, and gain insight into why these episodes are relevant right now.</description>
        <pubDate>2024-12-02T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fded060b8ff79455982aacc3033e39931" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fded060b8ff79455982aacc3033e39931"/>
      </item>
      <item>
        <title>Know Thy Enemy: A Novel November Case | Huntress</title>
        <link>https://www.huntress.com/blog/know-thy-enemy-a-novel-november-case-on-persistent-remote-access</link>
        <guid>https://www.huntress.com/blog/know-thy-enemy-a-novel-november-case-on-persistent-remote-access</guid>
        <description>In this blog, Huntress SOC investigators unravel the lateral movement and persistence of an interesting threat actor and their novel infrastructure</description>
        <pubDate>2024-11-25T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7345981665e34e4780ff76dcd1e1714f" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7345981665e34e4780ff76dcd1e1714f"/>
      </item>
      <item>
        <title>You Can Run, but You Can’t Hide: Defender Exclusions | Huntress</title>
        <link>https://www.huntress.com/blog/you-can-run-but-you-cant-hide-defender-exclusions</link>
        <guid>https://www.huntress.com/blog/you-can-run-but-you-cant-hide-defender-exclusions</guid>
        <description>Understand Windows Defender AntiVirus exclusions and how adversaries might leverage this capability to bypass scans.</description>
        <pubDate>2024-11-21T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb4ebc0447fc34db1a4ca274e87f1ca92" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb4ebc0447fc34db1a4ca274e87f1ca92"/>
      </item>
      <item>
        <title>Make Your Microsoft Security Tools Come to Life With Huntress | Huntress</title>
        <link>https://www.huntress.com/blog/make-your-microsoft-security-tools-come-to-life-with-huntress</link>
        <guid>https://www.huntress.com/blog/make-your-microsoft-security-tools-come-to-life-with-huntress</guid>
        <description>Huntress joins the Microsoft Intelligent Security Association to enhance Microsoft tools for SMBs, delivering stronger defenses against today’s most advanced cyber threats.</description>
        <pubDate>2024-11-19T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7c359a07c3f545c0b1b0d418d7966492" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7c359a07c3f545c0b1b0d418d7966492"/>
      </item>
      <item>
        <title>Silencing the EDR Silencers | Huntress</title>
        <link>https://www.huntress.com/blog/silencing-the-edr-silencers</link>
        <guid>https://www.huntress.com/blog/silencing-the-edr-silencers</guid>
        <description>Discover how adversaries are using tools like EDRSilencer to tamper with EDR communications and learn how you can fight back.</description>
        <pubDate>2024-11-18T14:37:44Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F948a594740d14aeebdbbad48fcac5a15" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F948a594740d14aeebdbbad48fcac5a15"/>
      </item>
      <item>
        <title>To MFA or Not To MFA: How Multi-factor Authentication Saves the SMB | Huntress</title>
        <link>https://www.huntress.com/blog/to-mfa-or-not-to-mfa-how-multi-factor-authentication-saves-the-smb</link>
        <guid>https://www.huntress.com/blog/to-mfa-or-not-to-mfa-how-multi-factor-authentication-saves-the-smb</guid>
        <description>MFA could be the thing that stops your payroll money from disappearing in a wire transaction. So why do we treat it as an optional inconvenience?</description>
        <pubDate>2024-11-18T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F6b3a1bef4d434b0d8d1000182ca38853" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F6b3a1bef4d434b0d8d1000182ca38853"/>
      </item>
      <item>
        <title>It’s Not Safe To Pay SafePa</title>
        <link>https://www.huntress.com/blog/its-not-safe-to-pay-safepay</link>
        <guid>https://www.huntress.com/blog/its-not-safe-to-pay-safepay</guid>
        <description>Huntress has observed Akira ransomware affiliates in action, as well as ReadText34 and INC ransomware being deployed.</description>
        <pubDate>2024-11-14T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F8c4bb86da7d2431687b255736f552d6a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F8c4bb86da7d2431687b255736f552d6a"/>
      </item>
      <item>
        <title>WTF is ITDR? | Huntress</title>
        <link>https://www.huntress.com/blog/wtf-is-itdr</link>
        <guid>https://www.huntress.com/blog/wtf-is-itdr</guid>
        <description>ITDR is the latest must-know acronym. But what is it? And why does it matter? Let Huntress break down the essentials of identity threat detection and response, and learn why it’s critical for your defenses.</description>
        <pubDate>2024-11-13T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F8a55c26e8990439597aad508ffafb109" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F8a55c26e8990439597aad508ffafb109"/>
      </item>
      <item>
        <title>A Parent&#39;s Guide to Securing Children&#39;s Tech Gifts | Huntress</title>
        <link>https://www.huntress.com/blog/a-parents-guide-to-securing-childrens-tech-gifts</link>
        <guid>https://www.huntress.com/blog/a-parents-guide-to-securing-childrens-tech-gifts</guid>
        <description>Safeguard holiday tech gifts for kids this season—secure their devices, protect privacy, and build lifelong safety habits. Feat. resources from our exclusive Fireside Chat.</description>
        <pubDate>2024-11-13T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0c70cf6028fe46619e12295634feefe9" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0c70cf6028fe46619e12295634feefe9"/>
      </item>
      <item>
        <title>Turning TTPs into CTF Challenges: Huntress CTF 2024 Retro | Huntress</title>
        <link>https://www.huntress.com/blog/turning-ttps-into-ctf-challenges-huntress-ctf-2024-retro</link>
        <guid>https://www.huntress.com/blog/turning-ttps-into-ctf-challenges-huntress-ctf-2024-retro</guid>
        <description>Explore the highlights of Huntress Capture the Flag 2024, where teams cracked complex cyber challenges in a month-long journey of reverse engineering and malware analysis.</description>
        <pubDate>2024-11-12T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ff45076bf161c421ca3146f6b2f9d73d3" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ff45076bf161c421ca3146f6b2f9d73d3"/>
      </item>
      <item>
        <title>Lead the Pack with SAT Leaderboards | Huntress</title>
        <link>https://www.huntress.com/blog/lead-the-pack-with-sat-leaderboards</link>
        <guid>https://www.huntress.com/blog/lead-the-pack-with-sat-leaderboards</guid>
        <description>Leaderboards and Manager Notifications are the new way to motivate learners and track progress in Huntress Managed SAT.</description>
        <pubDate>2024-11-07T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F413dcb3020574ed2a3c4cff3b5a25e53" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F413dcb3020574ed2a3c4cff3b5a25e53"/>
      </item>
      <item>
        <title>Cybersecurity standards raised by the Health Infrastructure Security and Accountability Act | Huntress</title>
        <link>https://www.huntress.com/blog/wake-up-call-for-healthcare-cybersecurity</link>
        <guid>https://www.huntress.com/blog/wake-up-call-for-healthcare-cybersecurity</guid>
        <description>Discover how the Health Infrastructure Security and Accountability Act aims to enforce stricter cybersecurity standards across the healthcare sector.</description>
        <pubDate>2024-11-06T06:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5d000229f5b84e6da1733d04aec65309" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5d000229f5b84e6da1733d04aec65309"/>
      </item>
      <item>
        <title>The Evolution of the Huntress Neighborhood Watch Program | Huntress</title>
        <link>https://www.huntress.com/blog/the-evolution-of-the-huntress-neighborhood-watch-program</link>
        <guid>https://www.huntress.com/blog/the-evolution-of-the-huntress-neighborhood-watch-program</guid>
        <description>Explore how the Huntress Neighborhood Watch Program has grown and how it empowers MSPs with Managed ITDR, Managed EDR, and more.</description>
        <pubDate>2024-11-05T19:57:41Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fd08d3d36dbec48778cfe3ae40f272dd6" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fd08d3d36dbec48778cfe3ae40f272dd6"/>
      </item>
      <item>
        <title>Protect Yourself from Political Donation Scams | Huntress</title>
        <link>https://www.huntress.com/blog/protect-yourself-from-political-donation-scams</link>
        <guid>https://www.huntress.com/blog/protect-yourself-from-political-donation-scams</guid>
        <description>Don’t let fraud disrupt your civic duty. Learn how to spot and avoid political donation scams that target voters through robocalls, fake websites, and deepfakes.</description>
        <pubDate>2024-10-24T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5af93f6275a24a16b2f72d4621254960" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5af93f6275a24a16b2f72d4621254960"/>
      </item>
      <item>
        <title>Ask the Mac Guy: What&#39;s the Deal with Full Disk Access for Mac? | Huntress</title>
        <link>https://www.huntress.com/blog/ask-the-mac-guy-whats-the-deal-with-full-disk-access</link>
        <guid>https://www.huntress.com/blog/ask-the-mac-guy-whats-the-deal-with-full-disk-access</guid>
        <description>Learn about the importance of Full Disk Access for Mac, its role in macOS security, and how it affects app performance and functionality.</description>
        <pubDate>2024-10-23T18:18:23Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb9552362a4394e0dafb3a120587fe1f0" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb9552362a4394e0dafb3a120587fe1f0"/>
      </item>
      <item>
        <title>Thank You for Helping Us Earn Another Inc. Power Partner Award in Cybersecurity | Huntress</title>
        <link>https://www.huntress.com/blog/thank-you-for-helping-us-earn-another-inc-power-partner-award-in-cybersecurity</link>
        <guid>https://www.huntress.com/blog/thank-you-for-helping-us-earn-another-inc-power-partner-award-in-cybersecurity</guid>
        <description>Huntress has earned an Inc. Power Partner Award for 2024. This is our second year receiving this honor, and it’s all due to our partners.</description>
        <pubDate>2024-10-22T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7850bd6acbb141789fc6a6adc7643ddf" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7850bd6acbb141789fc6a6adc7643ddf"/>
      </item>
      <item>
        <title>Detecting Malicious Use of LOLBins, Pt. II | Huntress</title>
        <link>https://www.huntress.com/blog/detecting-malicious-use-of-lolbins-pt-ii</link>
        <guid>https://www.huntress.com/blog/detecting-malicious-use-of-lolbins-pt-ii</guid>
        <description>Rhetoric within the cybersecurity community has leaned heavily towards threat actor use of LOLBins as a means of “hiding amongst the noise” of normal, administrative and operational activity. However, as Huntress SOC analysts can attest, this is often far from the case.</description>
        <pubDate>2024-10-17T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F3cfabadccae34608ad242034e4792c08" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F3cfabadccae34608ad242034e4792c08"/>
      </item>
      <item>
        <title>Inside Adversary-in-the-Middle Attacks | Huntress</title>
        <link>https://www.huntress.com/blog/unmasking-the-central-villain-inside-adversary-in-the-middle-attacks</link>
        <guid>https://www.huntress.com/blog/unmasking-the-central-villain-inside-adversary-in-the-middle-attacks</guid>
        <description>Discover how Adversary-in-the-Middle attacks silently hijack your sessions, and learn how to spot and prevent AiTM with tips from the experts at Huntress.</description>
        <pubDate>2024-10-15T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F9e92b4b433de4dd6a6cd44a951bdbbfe" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F9e92b4b433de4dd6a6cd44a951bdbbfe"/>
      </item>
      <item>
        <title>What is Behavioral Analysis in Cybersecurity? | Huntress</title>
        <link>https://www.huntress.com/blog/what-is-behavioral-analysis-in-cybersecurity</link>
        <guid>https://www.huntress.com/blog/what-is-behavioral-analysis-in-cybersecurity</guid>
        <description>Behavioral analysis is one of the most powerful ways to hunt down attackers. However, it’s a somewhat misunderstood element—it’s the human element that catches what AI and systems miss. Let’s uncover it and figure out where and how it fits in.</description>
        <pubDate>2024-10-10T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe0d10ad50ec949058f6153bb9eeea297" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe0d10ad50ec949058f6153bb9eeea297"/>
      </item>
      <item>
        <title>Prevent Business Email Compromise Attacks | Huntress</title>
        <link>https://www.huntress.com/blog/prevent-business-email-compromise-attacks</link>
        <guid>https://www.huntress.com/blog/prevent-business-email-compromise-attacks</guid>
        <description>Learn how to prevent business email compromise attacks and learn how to communicate this emerging cyber threat to your employees.</description>
        <pubDate>2024-10-08T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>Top 3 Cybersecurity Threats of 2024 (So Far) | Huntress</title>
        <link>https://www.huntress.com/blog/top-3-cybersecurity-threats-of-2024-so-far-what-you-need-to-know</link>
        <guid>https://www.huntress.com/blog/top-3-cybersecurity-threats-of-2024-so-far-what-you-need-to-know</guid>
        <description>Get to know 2024’s three biggest cyber threats—RMM abuse, BYOVD attacks, and WebDAV abuse—and learn how to defend your business from these rising risks.</description>
        <pubDate>2024-10-08T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fdcaa7c3f438d47178c75d6316f550a86" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fdcaa7c3f438d47178c75d6316f550a86"/>
      </item>
      <item>
        <title>NERC CIP Training Requirements | Huntress</title>
        <link>https://www.huntress.com/blog/nerc-cip-training-requirements</link>
        <guid>https://www.huntress.com/blog/nerc-cip-training-requirements</guid>
        <description>Learn about the NERC CIP training requirements for NERC CIP-004 R2 in the Huntress Blog. Understand what you must do to stay compliant and what auditors will review.</description>
        <pubDate>2024-10-07T19:02:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>NERC CIP-014 Standard Explained | Huntress</title>
        <link>https://www.huntress.com/blog/nerc-cip-014-standard-explained</link>
        <guid>https://www.huntress.com/blog/nerc-cip-014-standard-explained</guid>
        <description>Huntress explains the NERC CIP-014 standard, why it was created, and how it increases the physical security of electric utilities across North America.</description>
        <pubDate>2024-10-07T18:41:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>What is the Trigger Event for Implementing Security Awareness Training? | Huntress</title>
        <link>https://www.huntress.com/blog/what-is-the-trigger-event-for-implementing-security-awareness-training</link>
        <guid>https://www.huntress.com/blog/what-is-the-trigger-event-for-implementing-security-awareness-training</guid>
        <description>Discover the key triggers for implementing effective security awareness training in your organization. Learn how to enhance employee vigilance, reduce security risks, and foster a culture of cybersecurity awareness by visiting the Huntress Blog.</description>
        <pubDate>2024-10-07T06:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>Hunting for M365 Password Spraying | Huntress</title>
        <link>https://www.huntress.com/blog/hunting-for-m365-password-spraying</link>
        <guid>https://www.huntress.com/blog/hunting-for-m365-password-spraying</guid>
        <description>Join Huntress Threat Hunters as they unpack the password-spraying techniques of threat actors, exposing how they target everything from small businesses to giants like Microsoft.</description>
        <pubDate>2024-10-03T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F68a2fb626acf4a2288c7342a792de965" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F68a2fb626acf4a2288c7342a792de965"/>
      </item>
      <item>
        <title>One Order of Tips, Tricks &amp; Hot Takes for Cybersecurity Awareness Month 2024 | Huntress</title>
        <link>https://www.huntress.com/blog/one-order-of-tips-tricks-hot-takes-for-cybersecurity-awareness-month-2024</link>
        <guid>https://www.huntress.com/blog/one-order-of-tips-tricks-hot-takes-for-cybersecurity-awareness-month-2024</guid>
        <description>Our hottest security tips, tricks, and opinions to kick this Cybersecurity Awareness Month off right.</description>
        <pubDate>2024-10-01T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F87d3c21c1082407b916c65a6f5fe728c" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F87d3c21c1082407b916c65a6f5fe728c"/>
      </item>
      <item>
        <title>Friendly Reminder: SAT Can Be Enjoyable | Huntress</title>
        <link>https://www.huntress.com/blog/friendly-reminder-sat-can-be-enjoyable</link>
        <guid>https://www.huntress.com/blog/friendly-reminder-sat-can-be-enjoyable</guid>
        <description>Huntress made security awareness training (SAT) engaging, relatable, and enjoyable with Managed SAT. Instead of long, dull training sessions, you gain animated, story-based episodes that captivate your learners and improve your organization’s security posture.</description>
        <pubDate>2024-09-26T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc3b7e8245438434b980586ef0ce1071d" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc3b7e8245438434b980586ef0ce1071d"/>
      </item>
      <item>
        <title>Unlocking SIEM: The Role of Smart Filtering | Huntress</title>
        <link>https://www.huntress.com/blog/unlocking-siem-the-role-of-smart-filtering</link>
        <guid>https://www.huntress.com/blog/unlocking-siem-the-role-of-smart-filtering</guid>
        <description>Learn how our Smart Filtering Engine changes the game on how you view log data ingestion and management.</description>
        <pubDate>2024-09-25T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fa9e3308f9a9b49948941ad9954aef1f9" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fa9e3308f9a9b49948941ad9954aef1f9"/>
      </item>
      <item>
        <title>ReadText34 Ransomware Incident | Huntress</title>
        <link>https://www.huntress.com/blog/readtext34-ransomware-incident</link>
        <guid>https://www.huntress.com/blog/readtext34-ransomware-incident</guid>
        <description>Huntress analysts see a number of attacks on a daily and weekly basis, some of which include ransomware attacks. Now and again, Huntress analysts will observe a ransomware attack that stands out in some novel manner.</description>
        <pubDate>2024-09-22T16:48:35Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F30de9da86e004e768c68b57db1b4c801" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F30de9da86e004e768c68b57db1b4c801"/>
      </item>
      <item>
        <title>Akira Ransomware Indicators | Huntress</title>
        <link>https://www.huntress.com/blog/akira-ransomware-indicators</link>
        <guid>https://www.huntress.com/blog/akira-ransomware-indicators</guid>
        <description>Tracking various indicators associated with different attacks, Huntress analysts have been able to identify specific indicators (threat actor workstation names, passwords associated with new user account creation or current account modification, CloudFlare tunnel tokens) that are associated with Akira ransomware infections. By detecting these indicators much earlier in the attack chain, organizations can inhibit or even obviate file encryption malware deployment.</description>
        <pubDate>2024-09-20T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5ca2a70d87c548d6bfdda4279eb9fd2e" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5ca2a70d87c548d6bfdda4279eb9fd2e"/>
      </item>
      <item>
        <title>Making Sense of Alphabet Soup: 16 Security Terms and Acronyms You Should Know | Huntress</title>
        <link>https://www.huntress.com/blog/making-sense-of-alphabet-soup-16-security-terms-and-acronyms-you-should-know</link>
        <guid>https://www.huntress.com/blog/making-sense-of-alphabet-soup-16-security-terms-and-acronyms-you-should-know</guid>
        <description>Read up on the key cybersecurity terms and acronyms every security professional should know and understand.</description>
        <pubDate>2024-09-18T18:32:35Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F73de42097e0742f98c8e9f993ec610e5" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F73de42097e0742f98c8e9f993ec610e5"/>
      </item>
      <item>
        <title>The State of the Dark Web | Huntress</title>
        <link>https://www.huntress.com/blog/the-state-of-the-dark-web</link>
        <guid>https://www.huntress.com/blog/the-state-of-the-dark-web</guid>
        <description>Grab some popcorn and hold onto your seats: we’re headed back to the dark web.</description>
        <pubDate>2024-09-18T18:25:29Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F96af9bfc1d3a400a8c2058d5fdee3971" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F96af9bfc1d3a400a8c2058d5fdee3971"/>
      </item>
      <item>
        <title>Cracks in the Foundation: Intrusions of FOUNDATION Accounting Software | Huntress</title>
        <link>https://www.huntress.com/blog/cracks-in-the-foundation-intrusions-of-foundation-accounting-software</link>
        <guid>https://www.huntress.com/blog/cracks-in-the-foundation-intrusions-of-foundation-accounting-software</guid>
        <description>Threat actors have been successful in gaining entry using accounting software commonly used by construction companies.</description>
        <pubDate>2024-09-17T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F75ef07880d154900a8ce94d203d9d760" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F75ef07880d154900a8ce94d203d9d760"/>
      </item>
      <item>
        <title>The Top 3 Cyber Challenges for Mid-Market Businesses | Huntress</title>
        <link>https://www.huntress.com/blog/the-top-3-cyber-challenges-for-mid-market-businesses</link>
        <guid>https://www.huntress.com/blog/the-top-3-cyber-challenges-for-mid-market-businesses</guid>
        <description>Uncover top cyber challenges for mid-sized businesses in 2023; from lack of time and skills, human vulnerabilities, and budget constraints.</description>
        <pubDate>2024-09-16T17:49:30Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fdfedf6624461416c99d7815e5f62badf" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fdfedf6624461416c99d7815e5f62badf"/>
      </item>
      <item>
        <title>Are Biometrics the Unsung Hero or the Ultimate Villain in Cybersecurity? | Huntress</title>
        <link>https://www.huntress.com/blog/are-biometrics-the-unsung-hero-or-the-ultimate-villain-in-cybersecurity</link>
        <guid>https://www.huntress.com/blog/are-biometrics-the-unsung-hero-or-the-ultimate-villain-in-cybersecurity</guid>
        <description>Biometrics: the hero and villain of cybersecurity. Discover how this cutting-edge tech boosts security while posing serious risks. Is it a game-changer or a ticking time bomb? Let’s break it down.</description>
        <pubDate>2024-09-15T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fdfae8d20cd204bc99e4e604d8531c051" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fdfae8d20cd204bc99e4e604d8531c051"/>
      </item>
      <item>
        <title>MSPCFO: Identifying Operational Improvements from Huntress | Huntress</title>
        <link>https://www.huntress.com/blog/mspcfo-identifying-operational-improvements</link>
        <guid>https://www.huntress.com/blog/mspcfo-identifying-operational-improvements</guid>
        <description>See the research that highlights how MSPs experience reduced time and effort spent on ticket management, cost savings, and boosted efficiency with Huntress.
</description>
        <pubDate>2024-09-10T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>Will Patients’ Data Ever Be Safe if We Let GPTs Into Healthcare? | Huntress</title>
        <link>https://www.huntress.com/blog/will-patients-data-ever-be-safe-if-we-let-gpts-into-healthcare</link>
        <guid>https://www.huntress.com/blog/will-patients-data-ever-be-safe-if-we-let-gpts-into-healthcare</guid>
        <description>Are GPTs safe for healthcare? Discover expert opinions on AI’s role in enhancing patient care while ensuring data integrity with Huntress.</description>
        <pubDate>2024-09-10T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc045cacf56eb4d0faa68069b498fef63" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc045cacf56eb4d0faa68069b498fef63"/>
      </item>
      <item>
        <title>You’re the “Why” Behind the Huntress Hub | Huntress</title>
        <link>https://www.huntress.com/blog/youre-the-why-behind-the-huntress-hub</link>
        <guid>https://www.huntress.com/blog/youre-the-why-behind-the-huntress-hub</guid>
        <description>Huntress Hub is here. It’s your all-in-one portal for resources, training, and marketing tools to empower your cybersecurity journey. Simplify workflows, boost productivity, and grow your business with ease.</description>
        <pubDate>2024-09-10T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F933af88220ae4911a73f41e011e28056" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F933af88220ae4911a73f41e011e28056"/>
      </item>
      <item>
        <title>Chaos to Clarity: How Our Community Helped Transform SIEM | Huntress</title>
        <link>https://www.huntress.com/blog/chaos-to-clarity-how-our-community-helped-transform-siem</link>
        <guid>https://www.huntress.com/blog/chaos-to-clarity-how-our-community-helped-transform-siem</guid>
        <description>Our community’s support drove the development of Huntress Managed SIEM, a groundbreaking solution that simplifies management, cuts through noise, and ensures consistent pricing.</description>
        <pubDate>2024-09-05T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fa19ea035cb2044d6b16ba0d5895282de" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fa19ea035cb2044d6b16ba0d5895282de"/>
      </item>
      <item>
        <title>Phishing in the Fast Lane | Huntress</title>
        <link>https://www.huntress.com/blog/phishing-in-the-fast-lane-the-attackers-eye-view</link>
        <guid>https://www.huntress.com/blog/phishing-in-the-fast-lane-the-attackers-eye-view</guid>
        <description>Join Huntress team members as they walk through some of the most malicious phishing techniques, presented from the attacker&#39;s perspective.</description>
        <pubDate>2024-09-03T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fee4b74ed7c9140cdaa04df57c3a0ac17" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fee4b74ed7c9140cdaa04df57c3a0ac17"/>
      </item>
      <item>
        <title>Advanced Persistent Threat Targeting Vietnamese Human Rights Defenders | Huntress</title>
        <link>https://www.huntress.com/blog/advanced-persistent-threat-targeting-vietnamese-human-rights-defenders</link>
        <guid>https://www.huntress.com/blog/advanced-persistent-threat-targeting-vietnamese-human-rights-defenders</guid>
        <description>Huntress identified an intrusion against a non-profit supporting Vietnamese human rights that’s likely spanned years. Jump in as we provide a thorough analysis of this malicious threat actor.</description>
        <pubDate>2024-08-28T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc982305c972442e783080a6301652175" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc982305c972442e783080a6301652175"/>
      </item>
      <item>
        <title>Which States Are Most at Risk for Cyberattacks on Government and Infrastructure? | Huntress</title>
        <link>https://www.huntress.com/blog/which-states-are-most-at-risk-for-cyberattacks-on-government-and-infrastructure</link>
        <guid>https://www.huntress.com/blog/which-states-are-most-at-risk-for-cyberattacks-on-government-and-infrastructure</guid>
        <description>Cyberattacks on U.S. government and critical infrastructure surged in 2023, with over 420 million global attacks. Learn which states are most affected and discover how Huntress can help protect your organization</description>
        <pubDate>2024-08-26T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F3dfb6818c0d14ec6b196900e5329786f" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F3dfb6818c0d14ec6b196900e5329786f"/>
      </item>
      <item>
        <title>Remote Work Security | Huntress</title>
        <link>https://www.huntress.com/blog/remote-work-security-follow-imanis-journey-in-our-latest-huntress-sat-episode</link>
        <guid>https://www.huntress.com/blog/remote-work-security-follow-imanis-journey-in-our-latest-huntress-sat-episode</guid>
        <description>Join Imani on her adventures as she learns how to remain secure in remote work environments with our latest Huntress SAT episode!</description>
        <pubDate>2024-08-22T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fcc40a94adda0446a95a0c23bbabb9ea7" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fcc40a94adda0446a95a0c23bbabb9ea7"/>
      </item>
      <item>
        <title>Unwanted Access: Protecting Against the Growing Threat of Session Hijacking and Credential Theft | Huntress</title>
        <link>https://www.huntress.com/blog/unwanted-access-protecting-against-the-growing-threat-of-session-hijacking-and-credential-theft</link>
        <guid>https://www.huntress.com/blog/unwanted-access-protecting-against-the-growing-threat-of-session-hijacking-and-credential-theft</guid>
        <description>Discover how our new Unwanted Access capability strengthens your defenses against session hijacking and credential theft. Dive in and learn how to minimize risks and protect your business-critical assets from evolving cyber threats.</description>
        <pubDate>2024-08-21T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F954867b0031c402b88d6c5cd12caf490?format=webp" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F954867b0031c402b88d6c5cd12caf490?format=webp"/>
      </item>
      <item>
        <title>Don&#39;t Get Your Security from Your RMM Provider: The Risks You Should Know | Huntress</title>
        <link>https://www.huntress.com/blog/dont-get-your-security-from-your-rmm-provider-the-risks-you-should-know</link>
        <guid>https://www.huntress.com/blog/dont-get-your-security-from-your-rmm-provider-the-risks-you-should-know</guid>
        <description>Here’s why purchasing your cybersecurity products and services through your RMM provider isn’t always the best value. Learn how to avoid common pitfalls and choose more effective EDR and MDR solutions.</description>
        <pubDate>2024-08-05T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fd023ea0160e54e1d8a1442acacf0687f" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fd023ea0160e54e1d8a1442acacf0687f"/>
      </item>
      <item>
        <title>SlashAndGrab: The ConnectWise ScreenConnect Vulnerability Explained | Huntress</title>
        <link>https://www.huntress.com/blog/slashandgrab-the-connectwise-screenconnect-vulnerability-explained</link>
        <guid>https://www.huntress.com/blog/slashandgrab-the-connectwise-screenconnect-vulnerability-explained</guid>
        <description>Huntress gives you a non-technical breakdown of the SlashAndGab ConnectWise ScreenConnect Vulnerability; dig into the insights on how we discovered it and supported the community along the way.</description>
        <pubDate>2024-08-03T20:24:06Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F990366170f29410f99d025ec45c78cea" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F990366170f29410f99d025ec45c78cea"/>
      </item>
      <item>
        <title>Huntress Is Now a CVE Numbering Authority. But What Does That Mean? | Huntress</title>
        <link>https://www.huntress.com/blog/huntress-is-now-a-cve-numbering-authority-but-what-does-that-mean</link>
        <guid>https://www.huntress.com/blog/huntress-is-now-a-cve-numbering-authority-but-what-does-that-mean</guid>
        <description>Huntress is officially a CVE Numbering Authority. Stay tuned as we keep our eye out for new vulnerabilities in cyberspace.</description>
        <pubDate>2024-08-01T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F68a3c816663148028beae240da9d714b" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F68a3c816663148028beae240da9d714b"/>
      </item>
      <item>
        <title>Huntress Recognized with 44 New G2 Leader Badges for Summer 2024 | Huntress</title>
        <link>https://www.huntress.com/blog/huntress-recognized-with-44-new-g2-leader-badges-for-summer-2024</link>
        <guid>https://www.huntress.com/blog/huntress-recognized-with-44-new-g2-leader-badges-for-summer-2024</guid>
        <description>Huntress Managed EDR was featured in 50 unique G2 reports, earning over 44 Leader badges. Learn why we’re retaining our #1 rank for the 9th quarter in a row.</description>
        <pubDate>2024-07-30T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F171ed972e25946f2b10ed6a72ae3ce27" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F171ed972e25946f2b10ed6a72ae3ce27"/>
      </item>
      <item>
        <title>When Trust Becomes a Trap: How Huntress Foiled a Medical Software Update Hack | Huntress</title>
        <link>https://www.huntress.com/blog/when-trust-becomes-a-trap-how-huntress-foiled-a-medical-software-update-hack</link>
        <guid>https://www.huntress.com/blog/when-trust-becomes-a-trap-how-huntress-foiled-a-medical-software-update-hack</guid>
        <description>Hackers cloned a legitimate medical image viewer site to distribute malware, but thanks to Huntress, the threat was detected in time. Dive into the incident and see how we uncovered the deception and averted disaster.</description>
        <pubDate>2024-07-23T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F14232db0890c4cd59e9a69129879e528" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F14232db0890c4cd59e9a69129879e528"/>
      </item>
      <item>
        <title>Fake Browser Updates Lead to BOINC Volunteer Computing Software | Huntress</title>
        <link>https://www.huntress.com/blog/fake-browser-updates-lead-to-boinc-volunteer-computing-software</link>
        <guid>https://www.huntress.com/blog/fake-browser-updates-lead-to-boinc-volunteer-computing-software</guid>
        <description>Huntress has observed new behaviors in conjunction with the malware SocGholish. Read on to understand the implications of this threat and how you can better protect yourself.</description>
        <pubDate>2024-07-17T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F46821a7ffeb74beebb0c59cacb60d8eb" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F46821a7ffeb74beebb0c59cacb60d8eb"/>
      </item>
      <item>
        <title>Understanding the Recent Surge in Cybersecurity Threats to Dental Practices | Huntress</title>
        <link>https://www.huntress.com/blog/understanding-the-recent-surge-in-cybersecurity-threats-to-dental-practices</link>
        <guid>https://www.huntress.com/blog/understanding-the-recent-surge-in-cybersecurity-threats-to-dental-practices</guid>
        <description>Learn why the FBI recently warned dental practices of potential cyberattacks and discover how Huntress Security Awareness Training can help prevent them.</description>
        <pubDate>2024-07-16T06:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe108e6853e68444b9806f597ea2372f0" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe108e6853e68444b9806f597ea2372f0"/>
      </item>
      <item>
        <title>9 Pro Tips for Better Endpoint Security | Huntress</title>
        <link>https://www.huntress.com/blog/9-pro-tips-for-better-endpoint-security</link>
        <guid>https://www.huntress.com/blog/9-pro-tips-for-better-endpoint-security</guid>
        <description>Secure endpoints are critical to your cyber defenses. Here’s a list of endpoint security tips every IT and security professional should know.</description>
        <pubDate>2024-07-10T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F52795e34d40e40268814e7f7f33c1e5b" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F52795e34d40e40268814e7f7f33c1e5b"/>
      </item>
      <item>
        <title>Is There an Effective Way to Defend Against Cyber Threats to Critical Infrastructure? | Huntress</title>
        <link>https://www.huntress.com/blog/effective-ways-to-defend-against-cyber-threats-to-critical-infrastructure</link>
        <guid>https://www.huntress.com/blog/effective-ways-to-defend-against-cyber-threats-to-critical-infrastructure</guid>
        <description>Learn about the current state of cyber threats to critical infrastructure and find out how state and local governments can protect against devastating breaches.</description>
        <pubDate>2024-07-05T06:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fabd8d9aede2c4b789ce5390dc0f49cf9" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fabd8d9aede2c4b789ce5390dc0f49cf9"/>
      </item>
      <item>
        <title>Hackers Are Hiding in Plain Sight: Insights from Our 2024 Cyber Threat Report | Huntress</title>
        <link>https://www.huntress.com/blog/hackers-are-hiding-in-plain-sight-insights-from-our-2024-cyber-threat-report</link>
        <guid>https://www.huntress.com/blog/hackers-are-hiding-in-plain-sight-insights-from-our-2024-cyber-threat-report</guid>
        <description>Cybercriminals are now blending into legitimate systems. Huntress’ 2024 Cyber Threat Report reveals the latest unsettling trends and tactics we observed, including the misuse of remote monitoring tools and cloud storage services.</description>
        <pubDate>2024-07-02T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ffb27c3778d924c56a5a56183d4c9faaf" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ffb27c3778d924c56a5a56183d4c9faaf"/>
      </item>
      <item>
        <title>How Accidental or Intentional Data Loss Can Be Equally Debilitating for Healthcare | Huntress</title>
        <link>https://www.huntress.com/blog/dont-lose-it-how-accidental-or-intentional-data-loss-can-be-equally-debilitating-for-healthcare</link>
        <guid>https://www.huntress.com/blog/dont-lose-it-how-accidental-or-intentional-data-loss-can-be-equally-debilitating-for-healthcare</guid>
        <description>Healthcare must protect sensitive data from accidental equipment loss, data theft, and insider attacks. Learn practical steps and solutions to enhance your security and maintain patient trust.</description>
        <pubDate>2024-06-26T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7914585752554ea487af45279cd53c6d" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7914585752554ea487af45279cd53c6d"/>
      </item>
      <item>
        <title>Huntress and Our Culture of BElonging | Huntress</title>
        <link>https://www.huntress.com/blog/building-a-culture-of-belonging-the-huntress-way</link>
        <guid>https://www.huntress.com/blog/building-a-culture-of-belonging-the-huntress-way</guid>
        <description>Huntress Chief People Officer Todd Riesterer discusses how we curate a culture of BElonging, built on pillars of humaneness, equity, and diversity.</description>
        <pubDate>2024-06-24T15:57:30Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F085510bbae4a4c7a954c3e341150dbdb" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F085510bbae4a4c7a954c3e341150dbdb"/>
      </item>
      <item>
        <title>Auto-Remediations: Save Precious Time on Low-Level Incidents | Huntress</title>
        <link>https://www.huntress.com/blog/auto-remediations-save-precious-time-on-low-level-incidents</link>
        <guid>https://www.huntress.com/blog/auto-remediations-save-precious-time-on-low-level-incidents</guid>
        <description>Learn about Huntress&#39; latest feature, Auto-Remediations for Low-severity Incidents, which can help save time by instantly remediating low-severity threats.</description>
        <pubDate>2024-06-24T15:13:13Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F803c65418a734dccb066d727947e867f" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F803c65418a734dccb066d727947e867f"/>
      </item>
      <item>
        <title>Tailored Cybersecurity Solutions vs. Cybersecurity Bundles like K365 | Huntress</title>
        <link>https://www.huntress.com/blog/dont-fall-for-the-ol-bundle-trick</link>
        <guid>https://www.huntress.com/blog/dont-fall-for-the-ol-bundle-trick</guid>
        <description>Here’s why bundling cybersecurity products and services like Kaseya K365 aren’t always the best value for your organization. Learn how to avoid common pitfalls and choose more effective EDR and MDR solutions.</description>
        <pubDate>2024-06-24T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F027e78d457da437180050fc0e11a95e2" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F027e78d457da437180050fc0e11a95e2"/>
      </item>
      <item>
        <title>Here’s to the Future: Our Latest Funding Will Fuel Big Innovations, Bold Acquisitions, and a More Secure Global Community | Huntress</title>
        <link>https://www.huntress.com/blog/heres-to-the-future-our-latest-funding-will-fuel-big-innovations-bold-acquisitions-and-a-more-secure-global-community</link>
        <guid>https://www.huntress.com/blog/heres-to-the-future-our-latest-funding-will-fuel-big-innovations-bold-acquisitions-and-a-more-secure-global-community</guid>
        <description>Huntress CEO Kyle Hanslovan highlights the cybersecurity leader&#39;s Series D funding and how this investment will benefit partners moving forward.</description>
        <pubDate>2024-06-18T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0c440ffacfb84c10aecefda74dd77e27" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0c440ffacfb84c10aecefda74dd77e27"/>
      </item>
      <item>
        <title>Debunking 5 Major macOS Myths | Huntress</title>
        <link>https://www.huntress.com/blog/debunking-5-major-macos-myths</link>
        <guid>https://www.huntress.com/blog/debunking-5-major-macos-myths</guid>
        <description>Let Huntress debunk the biggest Mac security myths. macOS is now a popular target for hackers, so learn the truth about its vulnerabilities and discover practical steps to enhance protection against cyber threats.</description>
        <pubDate>2024-06-13T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ffa32688dade4476195faca559a75d84b" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ffa32688dade4476195faca559a75d84b"/>
      </item>
      <item>
        <title>Mistakes to Mastery: Get to Know Phishing Defense Coaching from Huntress SAT | Huntress</title>
        <link>https://www.huntress.com/blog/mistakes-to-mastery-get-to-know-phishing-defense-coaching-from-huntress-sat</link>
        <guid>https://www.huntress.com/blog/mistakes-to-mastery-get-to-know-phishing-defense-coaching-from-huntress-sat</guid>
        <description>Get to know Phishing Defense Coaching, the latest addition to Huntress SAT. This personalized feature helps teach learners how phishing simulations tricked them so they can better identify potential threats.</description>
        <pubDate>2024-06-12T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fd4ba919f78d6477f9da952451100dfa5" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fd4ba919f78d6477f9da952451100dfa5"/>
      </item>
      <item>
        <title>Examining the Impact of Ransomware on the Healthcare Sector and New HHS Guidelines | Huntress</title>
        <link>https://www.huntress.com/blog/examining-the-impact-of-ransomware-on-the-healthcare-sector-and-new-hhs-guidelines</link>
        <guid>https://www.huntress.com/blog/examining-the-impact-of-ransomware-on-the-healthcare-sector-and-new-hhs-guidelines</guid>
        <description>Learn what’s causing a surge in ransomware attacks on healthcare organizations and find out how new guidelines from HHS are addressing the problem.</description>
        <pubDate>2024-06-08T06:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc4c960b435b145eb9b58b811b5a58825" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc4c960b435b145eb9b58b811b5a58825"/>
      </item>
      <item>
        <title>Healthcare in the Crosshairs: Insights from Our 2024 Cyber Threat Report | Huntress</title>
        <link>https://www.huntress.com/blog/healthcare-in-the-crosshairs-insights-from-our-2024-cyber-threat-report</link>
        <guid>https://www.huntress.com/blog/healthcare-in-the-crosshairs-insights-from-our-2024-cyber-threat-report</guid>
        <description>Explore the latest ransomware and BEC threats targeting healthcare today. And learn how to navigate emerging threats with insights from our 2024 Cyber Threat Report.</description>
        <pubDate>2024-06-06T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F4f213a2f836d4b168fe1ff34509d9f27" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F4f213a2f836d4b168fe1ff34509d9f27"/>
      </item>
      <item>
        <title>Macs Need Security Too: Announcing Huntress Managed EDR for macOS | Huntress</title>
        <link>https://www.huntress.com/blog/macs-need-security-too-announcing-huntress-managed-edr-for-macos</link>
        <guid>https://www.huntress.com/blog/macs-need-security-too-announcing-huntress-managed-edr-for-macos</guid>
        <description>As macOS adoption rises, so too do cyber threats against it. That’s why Huntress developed our Managed EDR for macOS, a security solution tailored to the unique challenges of macOS environments.</description>
        <pubDate>2024-06-04T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F8776f7e3be07409f8ff2305f076568d5" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F8776f7e3be07409f8ff2305f076568d5"/>
      </item>
      <item>
        <title>Attack Behaviors | Huntress</title>
        <link>https://www.huntress.com/blog/attack-behaviors</link>
        <guid>https://www.huntress.com/blog/attack-behaviors</guid>
        <description>In the cybersecurity community, we may hear analysts say, “Oh, threat actors change their tactics…”, and at times, they may include the word “always” as part of that statement. However, the question at hand is, “Does the data really show that to be the case?” What are we truly seeing in real-world incidents?</description>
        <pubDate>2024-05-30T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F85009c62fd064e97a4dbe36a5dbd9da0" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F85009c62fd064e97a4dbe36a5dbd9da0"/>
      </item>
      <item>
        <title>The Rise of Social Engineering Across Healthcare | Huntress</title>
        <link>https://www.huntress.com/blog/deceitful-tactics-and-honest-mistakes-remedying-human-error-amid-the-rise-of-social-engineering-across-healthcare</link>
        <guid>https://www.huntress.com/blog/deceitful-tactics-and-honest-mistakes-remedying-human-error-amid-the-rise-of-social-engineering-across-healthcare</guid>
        <description>Understand the impact of human error across healthcare, and discover how Huntress’ managed solutions can better defend your organization from social engineering scams.</description>
        <pubDate>2024-05-28T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F312b6dc77dd94e25b84cf71842e01238" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F312b6dc77dd94e25b84cf71842e01238"/>
      </item>
      <item>
        <title>Smuggler’s Gambit: Uncovering HTML Smuggling Adversary in the Middle Tradecraft | Huntress</title>
        <link>https://www.huntress.com/blog/smugglers-gambit-uncovering-html-smuggling-adversary-in-the-middle-tradecraft</link>
        <guid>https://www.huntress.com/blog/smugglers-gambit-uncovering-html-smuggling-adversary-in-the-middle-tradecraft</guid>
        <description>Blowing the lid off of interesting adversary-in-the-middle tradecraft observed in the Huntress partner identities.</description>
        <pubDate>2024-05-23T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F2a4e1c54eac043039b8cebb153c020d3" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F2a4e1c54eac043039b8cebb153c020d3"/>
      </item>
      <item>
        <title>Insights from Our 2024 Cyber Threat Report | Huntress</title>
        <link>https://www.huntress.com/blog/a-surge-in-ransomware-insights-from-our-2024-cyber-threat-report</link>
        <guid>https://www.huntress.com/blog/a-surge-in-ransomware-insights-from-our-2024-cyber-threat-report</guid>
        <description>Explore the interesting changes in the world of ransomware and more key findings from Huntress&#39; 2024 Cyber Threat Report.</description>
        <pubDate>2024-05-22T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb6e31ab7a0dd4a37bfb2f928a5ebf70a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb6e31ab7a0dd4a37bfb2f928a5ebf70a"/>
      </item>
      <item>
        <title>Time to Act: Gaining the Edge with Huntress Response Capabilities | Huntress</title>
        <link>https://www.huntress.com/blog/time-to-act-gaining-the-edge-with-huntress-response-capabilities</link>
        <guid>https://www.huntress.com/blog/time-to-act-gaining-the-edge-with-huntress-response-capabilities</guid>
        <description>Discover how Huntress MDR can respond swiftly to cyber threats and give you the critical time advantage in your ongoing battle against attackers.</description>
        <pubDate>2024-05-14T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe74092374c2043848a8796e3a5e6db98" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe74092374c2043848a8796e3a5e6db98"/>
      </item>
      <item>
        <title>Active Remediation: Proactive Response with Huntress Managed EDR | Huntress</title>
        <link>https://www.huntress.com/blog/active-remediation-proactive-incident-response-with-huntress-managed-edr</link>
        <guid>https://www.huntress.com/blog/active-remediation-proactive-incident-response-with-huntress-managed-edr</guid>
        <description>Learn how you can streamline incident response with Huntress Managed EDR&#39;s Active Remediation. Sleep soundly while we thwart threats on your behalf.</description>
        <pubDate>2024-05-13T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb0377c1627754ebb819d2aa4c6f706a1" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb0377c1627754ebb819d2aa4c6f706a1"/>
      </item>
      <item>
        <title>From South Park to Curriculaville: Meet Jeff Gill, Emmy Award Winner and Huntress SAT Animator | Huntress</title>
        <link>https://www.huntress.com/blog/from-south-park-to-curriculaville-meet-jeff-gill-emmy-award-winner-and-huntress-sat-animator</link>
        <guid>https://www.huntress.com/blog/from-south-park-to-curriculaville-meet-jeff-gill-emmy-award-winner-and-huntress-sat-animator</guid>
        <description>Get to know Jeff Gill, Emmy award-winning storyteller and Huntress Security Awareness Training animator.</description>
        <pubDate>2024-05-08T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fccf84021ede940788bf1de22d8565b70" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fccf84021ede940788bf1de22d8565b70"/>
      </item>
      <item>
        <title>Healthcare Held Hostage: Fighting the Plague of Ransomware | Huntress</title>
        <link>https://www.huntress.com/blog/healthcare-held-hostage-fighting-the-plague-of-ransomware</link>
        <guid>https://www.huntress.com/blog/healthcare-held-hostage-fighting-the-plague-of-ransomware</guid>
        <description>Ransomware is spreading like wildfire. Learn about its growing threat to healthcare, its impact on patient care, and how Huntress managed solutions can better protect your organization from cyberattacks.</description>
        <pubDate>2024-05-03T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F9d1a3a000c0f440fb6ed5fe835bfa0de" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F9d1a3a000c0f440fb6ed5fe835bfa0de"/>
      </item>
      <item>
        <title>LOLBin to INC Ransomware</title>
        <link>https://www.huntress.com/blog/lolbin-to-inc-ransomware</link>
        <guid>https://www.huntress.com/blog/lolbin-to-inc-ransomware</guid>
        <description>Huntress has observed INC ransomware deployed in the past but recent activity indicates a possible continued shift in/or improvement of tactics employed by these threat actors.</description>
        <pubDate>2024-05-01T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F2f8a9e370288493f864de7c0028d3a07" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F2f8a9e370288493f864de7c0028d3a07"/>
      </item>
      <item>
        <title>The Undeniable Benefits of Healthcare Security Awareness Training | Huntress</title>
        <link>https://www.huntress.com/blog/the-undeniable-benefits-of-healthcare-security-awareness-training</link>
        <guid>https://www.huntress.com/blog/the-undeniable-benefits-of-healthcare-security-awareness-training</guid>
        <description>Discover the benefits of healthcare security awareness training and find out how Huntress can empower your organization with a culture of security.</description>
        <pubDate>2024-04-30T06:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F9e7ffe1517474143aed6bc9a402e4e02" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F9e7ffe1517474143aed6bc9a402e4e02"/>
      </item>
      <item>
        <title>LightSpy Malware Variant Targeting macOS | Huntress</title>
        <link>https://www.huntress.com/blog/lightspy-malware-variant-targeting-macos</link>
        <guid>https://www.huntress.com/blog/lightspy-malware-variant-targeting-macos</guid>
        <description>There&#39;s a new variant of LightSpy malware targeting macOS. Here, Huntress&#39; macOS researchers dive into the macOS variant of the LightSpy malware, after gaps in recent reports stating that the LightSpy malware strictly targets iOS.</description>
        <pubDate>2024-04-25T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7e3661055a1a42f8812db8bdb233c48c" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7e3661055a1a42f8812db8bdb233c48c"/>
      </item>
      <item>
        <title>It Costs How Much?!? The Financial Pitfalls of Cyberattacks on SMBs | Huntress</title>
        <link>https://www.huntress.com/blog/it-costs-how-much-the-financial-pitfalls-of-cyberattacks-on-smbs</link>
        <guid>https://www.huntress.com/blog/it-costs-how-much-the-financial-pitfalls-of-cyberattacks-on-smbs</guid>
        <description>Learn how managed EDRs can help SMBs offset limited cybersecurity budgets, thwart cyberattacks, and save money for the long term.</description>
        <pubDate>2024-04-19T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F2b8dc823c87f4eb39ce1d0ebbd704fdc" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F2b8dc823c87f4eb39ce1d0ebbd704fdc"/>
      </item>
      <item>
        <title>Huntress Snags Over 40 Leader Badges in G2 Spring 2024 Reports | Huntress</title>
        <link>https://www.huntress.com/blog/huntress-snags-over-40-leader-badges-in-g2-spring-2024-reports</link>
        <guid>https://www.huntress.com/blog/huntress-snags-over-40-leader-badges-in-g2-spring-2024-reports</guid>
        <description>Huntress receives huge honors in latest G2 Spring 2024 Reports, earning 42 leader badges.</description>
        <pubDate>2024-04-10T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F56c66070f4034b7282cf57e77594675b" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F56c66070f4034b7282cf57e77594675b"/>
      </item>
      <item>
        <title>Interconnected Devices Inject Risk into Patient Safety | Huntress</title>
        <link>https://www.huntress.com/blog/interconnected-devices-inject-risk-into-patient-safety</link>
        <guid>https://www.huntress.com/blog/interconnected-devices-inject-risk-into-patient-safety</guid>
        <description>By adopting a managed EDR and partnering with experts like Huntress, healthcare providers can safeguard patient data and ensure uninterrupted patient care.</description>
        <pubDate>2024-04-08T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28267a59397449cc8ed32589a4988ece" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28267a59397449cc8ed32589a4988ece"/>
      </item>
      <item>
        <title>Analyzing a Malicious Advanced IP Scanner Google Ad Redirection | Huntress</title>
        <link>https://www.huntress.com/blog/analyzing-a-malicious-advanced-ip-scanner-google-ad-redirection</link>
        <guid>https://www.huntress.com/blog/analyzing-a-malicious-advanced-ip-scanner-google-ad-redirection</guid>
        <description>Threat actors have been using malicious versions of Advanced IP Scanner to compromise their targets via malvertising campaigns. Let’s analyze one.</description>
        <pubDate>2024-04-01T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fbcf0d2526e264a05ac8ef9edaeca7337" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fbcf0d2526e264a05ac8ef9edaeca7337"/>
      </item>
      <item>
        <title>MSSQL to ScreenConnect | Huntress</title>
        <link>https://www.huntress.com/blog/mssql-to-screenconnect</link>
        <guid>https://www.huntress.com/blog/mssql-to-screenconnect</guid>
        <description>Huntress continues to see MSSQL server systems being attacked, and in recent incidents have seen overlap with previous incidents, not only in the use of LOLBins, but also in IP addresses used by the threat actor.</description>
        <pubDate>2024-03-28T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F1b94ddbeb3ce41dabc857f1074f10100" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F1b94ddbeb3ce41dabc857f1074f10100"/>
      </item>
      <item>
        <title>How Huntress Managed EDR Stands Against the Competition | Huntress</title>
        <link>https://www.huntress.com/blog/put-a-soc-in-it--how-huntress-managed-edr-stands-against-the-competition</link>
        <guid>https://www.huntress.com/blog/put-a-soc-in-it--how-huntress-managed-edr-stands-against-the-competition</guid>
        <description>Depending on which EDR solution you choose, capabilities and outcomes can differ greatly. Huntress looks at what differentiates Huntress Managed EDR from competitors, reviewing key features and benefits.</description>
        <pubDate>2024-03-26T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F11cb58e4e11849699f7e3a8befbe656d" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F11cb58e4e11849699f7e3a8befbe656d"/>
      </item>
      <item>
        <title>7 Don’ts of Security Awareness Training</title>
        <link>https://www.huntress.com/blog/seven-donts-of-security-awareness-training</link>
        <guid>https://www.huntress.com/blog/seven-donts-of-security-awareness-training</guid>
        <description>Many security awareness training solutions aren’t easy to manage, and worse, they affect knowledge retention. Let’s review the common SAT features that diminish your ability to improve your security posture.</description>
        <pubDate>2024-03-21T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F9d47a80b33f1476ca8dc544626fa01ff" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F9d47a80b33f1476ca8dc544626fa01ff"/>
      </item>
      <item>
        <title>Managing Attack Surface | Huntress</title>
        <link>https://www.huntress.com/blog/managing-attack-surface</link>
        <guid>https://www.huntress.com/blog/managing-attack-surface</guid>
        <description>Huntress recently detected interesting activity on an endpoint; a threat actor was attempting to establish a foothold on an endpoint by using commands issued via MSSQL to upload a reverse shell accessible from the web server. All attempts were obviated by MAV and process detections, but boy-howdy, did they try!</description>
        <pubDate>2024-03-20T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F12f16ad9399b4bffaf8ae48bdc1632d8" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F12f16ad9399b4bffaf8ae48bdc1632d8"/>
      </item>
      <item>
        <title>Using Backup Utilities for Data Exfiltration | Huntress</title>
        <link>https://www.huntress.com/blog/using-backup-utilities-for-data-exfiltration</link>
        <guid>https://www.huntress.com/blog/using-backup-utilities-for-data-exfiltration</guid>
        <description>“Double extortion” attacks, often perpetrated by ransomware threat actors, include data exfiltration prior to file encryption. Huntress analysts have observed various means of data exfiltration, but recently observed the use of a legitimate backup application seen by others to be associated with a Noberus/ALPHV ransomware affiliate.</description>
        <pubDate>2024-03-13T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F29c2e4e886cf4e68ac4efec6bc580743" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F29c2e4e886cf4e68ac4efec6bc580743"/>
      </item>
      <item>
        <title>Full Transparency: Controlling Apple&#39;s TCC (Part 2) | Huntress</title>
        <link>https://www.huntress.com/blog/full-transparency-controlling-apples-tcc-part-ii</link>
        <guid>https://www.huntress.com/blog/full-transparency-controlling-apples-tcc-part-ii</guid>
        <description>The primary goal of Apple&#39;s Transparency, Consent, and Control (TCC) is to empower users with transparency regarding how their data is accessed and used by applications. In this Part 2, dig even deeper into the mechanism that runs TCC and what&#39;s happening in the background.</description>
        <pubDate>2024-03-11T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ff93cb63805ba4a0e9b9032af4948d4bc" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ff93cb63805ba4a0e9b9032af4948d4bc"/>
      </item>
      <item>
        <title>Time Travelers Busted: How to Detect Impossible Travel | Huntress</title>
        <link>https://www.huntress.com/blog/time-travelers-busted-how-to-detect-impossible-travel-</link>
        <guid>https://www.huntress.com/blog/time-travelers-busted-how-to-detect-impossible-travel-</guid>
        <description>Impossible Travel is one of the earliest indicators of user compromise, and it works against any user-centric event that can be tied back to a location. Huntress goes in-depth on this problem, explaining how it works, revealing challenges surrounding it, and offering real-world examples occurring within Microsoft 365.</description>
        <pubDate>2024-03-07T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F2ac671e78c094d16a7ebba01888f590b" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F2ac671e78c094d16a7ebba01888f590b"/>
      </item>
      <item>
        <title>Please Allow Me to (Re)introduce Myself: Huntress Security Awareness Training | Huntress</title>
        <link>https://www.huntress.com/blog/please-allow-me-to-re-introduce-myself-huntress-security-awareness-training</link>
        <guid>https://www.huntress.com/blog/please-allow-me-to-re-introduce-myself-huntress-security-awareness-training</guid>
        <description>Huntress has launched Huntress Security Awareness Training (SAT), a new and improved SAT solution tailored to the needs of underserved and resource-strapped organizations. It features memorable, story-driven episodes, making it easier for users to retain knowledge. And since it’s fully managed by Huntress, admins will enjoy it too. Most importantly, Huntress SAT was developed with one overall goal—elevate the security of your small- and medium-sized business (SMB).</description>
        <pubDate>2024-03-05T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F8a1953ffb5be4352aad6a8cf19732942" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F8a1953ffb5be4352aad6a8cf19732942"/>
      </item>
      <item>
        <title>Insights: RMM Tools | Huntress</title>
        <link>https://www.huntress.com/blog/insights-rmm-tools</link>
        <guid>https://www.huntress.com/blog/insights-rmm-tools</guid>
        <description>Over the past year, the Huntress team has posted a number of blog posts related to remote monitoring and management (RMM) tools being installed or abused by threat actors.</description>
        <pubDate>2024-03-04T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fbe8427e469084e3a92ea0de860bbc2b2" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fbe8427e469084e3a92ea0de860bbc2b2"/>
      </item>
      <item>
        <title>Navigate SocGholish with Huntress | Huntress</title>
        <link>https://www.huntress.com/blog/navigating-the-maze-of-socgholish-with-huntress-a-practical-guide</link>
        <guid>https://www.huntress.com/blog/navigating-the-maze-of-socgholish-with-huntress-a-practical-guide</guid>
        <description>In an era where cyber threats like SocGholish are becoming increasingly sophisticated, understanding and combating these attacks is crucial for digital safety. This post delves into leveraging Huntress for effectively handling SocGholish threats, outlining a step-by-step approach for IT professionals.</description>
        <pubDate>2024-03-01T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F118901b8791f417da6ec41ddad9d76dc" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F118901b8791f417da6ec41ddad9d76dc"/>
      </item>
      <item>
        <title>Attacking MSSQL Servers, Pt. II | Huntress</title>
        <link>https://www.huntress.com/blog/attacking-mssql-servers-pt-ii</link>
        <guid>https://www.huntress.com/blog/attacking-mssql-servers-pt-ii</guid>
        <description>The publication of the first blog post led a Huntress SOC analyst to identify and escalate a second, similar incident. A deeper investigation into the activity made it clear that the Huntress SOC had obviated several Trigona ransomware attacks, protecting customers from the impact of a ransomware infection.</description>
        <pubDate>2024-02-29T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F01d1f45496f64ddd98baa12e9f0bc631" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F01d1f45496f64ddd98baa12e9f0bc631"/>
      </item>
      <item>
        <title>BlackCat Ransomware Affiliate TTPs | Huntress</title>
        <link>https://www.huntress.com/blog/blackcat-ransomware-affiliate-ttps</link>
        <guid>https://www.huntress.com/blog/blackcat-ransomware-affiliate-ttps</guid>
        <description>This blog post provides a detailed look at the TTPs of a ransomware affiliate operator. In this case, the endpoint had been moved to another infrastructure (as illustrated by various command lines, and confirmed by the partner), so while Huntress SOC analysts reported the activity to the partner, no Huntress customer was impacted by the ransomware deployment.</description>
        <pubDate>2024-02-28T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F25b475fe5eb74f7db9c817843c41d6cd" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F25b475fe5eb74f7db9c817843c41d6cd"/>
      </item>
      <item>
        <title>SlashAndGrab: ScreenConnect Post-Exploitation in the Wild (CVE-2024-1709 &amp; CVE-2024-1708) | Huntress</title>
        <link>https://www.huntress.com/blog/slashandgrab-screen-connect-post-exploitation-in-the-wild-cve-2024-1709-cve-2024-1708</link>
        <guid>https://www.huntress.com/blog/slashandgrab-screen-connect-post-exploitation-in-the-wild-cve-2024-1709-cve-2024-1708</guid>
        <description>Adversaries have been VERY busy in the wake of the ScreenConnect vulnerabilities (CVE-2024-1709 &amp; CVE-2024-1708). Here’s all the post-exploitation details, tradecraft, and tactics we’ve observed so far!</description>
        <pubDate>2024-02-23T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F80ef8e38bd3148448ed2054c48b41c1e" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F80ef8e38bd3148448ed2054c48b41c1e"/>
      </item>
      <item>
        <title>Guide: How to Know if your ScreenConnect Server is Hacked | Huntress</title>
        <link>https://www.huntress.com/blog/how-to-know-if-your-screenconnect-server-is-hacked</link>
        <guid>https://www.huntress.com/blog/how-to-know-if-your-screenconnect-server-is-hacked</guid>
        <description>Huntress Guide: Review this guide on how to tell which ScreenConnect Server autoruns are found on your endpoint so you can quickly find and remove them.</description>
        <pubDate>2024-02-23T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F2181cc924f734a728104bc5577431f7f" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F2181cc924f734a728104bc5577431f7f"/>
      </item>
      <item>
        <title>Understanding the ConnectWise ScreenConnect CVE-2024-1709 &amp; CVE-2024-1708 | Huntress</title>
        <link>https://www.huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass</link>
        <guid>https://www.huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass</guid>
        <description>This blog discusses the Huntress Team&#39;s analysis efforts of the two vulnerabilities and software weaknesses in ConnectWise ScreenConnect (CVE-2024-1708 and CVE-2024-1709) and the technical details behind this attack.</description>
        <pubDate>2024-02-21T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F3517e48d4e8646bcbe6699c59e52a929" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F3517e48d4e8646bcbe6699c59e52a929"/>
      </item>
      <item>
        <title>Detection Guidance for ConnectWise CWE-288 | Huntress</title>
        <link>https://www.huntress.com/blog/detection-guidance-for-connectwise-cwe-288-2</link>
        <guid>https://www.huntress.com/blog/detection-guidance-for-connectwise-cwe-288-2</guid>
        <description>Stay secure with Huntress! Learn about critical vulnerabilities tied to ConnectWise, including CWE-288 authentication bypass. Patch now to version 23.9.8 for protection.</description>
        <pubDate>2024-02-20T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F63cc1f588ffb40b4b91542d85e4f8f94" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F63cc1f588ffb40b4b91542d85e4f8f94"/>
      </item>
      <item>
        <title>Vulnerability Reproduced: Immediately Patch ScreenConnect 23.9.8 | Huntress</title>
        <link>https://www.huntress.com/blog/vulnerability-reproduced-immediately-patch-screenconnect-23-9-8</link>
        <guid>https://www.huntress.com/blog/vulnerability-reproduced-immediately-patch-screenconnect-23-9-8</guid>
        <description>Huntress has validated the vulnerabilities referred to in the latest February 19 ConnectWise ScreenConnect advisory. For on-premise users, it is our strongest recommendation to patch and update to ScreenConnect version 23.9.8 immediately.</description>
        <pubDate>2024-02-19T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F099ddd5c09894f86b541c6aaa075d69f" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F099ddd5c09894f86b541c6aaa075d69f"/>
      </item>
      <item>
        <title>Solving Endpoint Security Challenges with a Managed EDR | Huntress</title>
        <link>https://www.huntress.com/blog/solving-endpoint-security-challenges-with-a-managed-edr</link>
        <guid>https://www.huntress.com/blog/solving-endpoint-security-challenges-with-a-managed-edr</guid>
        <description>Endpoint detection and response (EDR) is an essential endpoint security solution, but without the right time, resources, and knowledge to remediate threats, your EDR can quickly become a nuisance.</description>
        <pubDate>2024-02-16T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb92e68ba0e2944d1b2f75246c0678fa6" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb92e68ba0e2944d1b2f75246c0678fa6"/>
      </item>
      <item>
        <title>The Health Sector is Under Attack. But You Can Fight Back. | Huntress</title>
        <link>https://www.huntress.com/blog/the-health-sector-is-under-attack-but-you-can-fight-back-</link>
        <guid>https://www.huntress.com/blog/the-health-sector-is-under-attack-but-you-can-fight-back-</guid>
        <description>Healthcare organizations are facing cyber threats at an alarming rate, and as the U.S. Department of Health and Human Services (HHS) introduces new measures for cybersecurity, it’s also time for small- and mid-sized organizations to be proactive in their defense.</description>
        <pubDate>2024-02-15T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F8d66e33e0ca340a397ae23e77f3db904" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F8d66e33e0ca340a397ae23e77f3db904"/>
      </item>
      <item>
        <title>Threat Intel Accelerates Detection and Response | Huntress</title>
        <link>https://www.huntress.com/blog/threat-intel-accelerates-detection-and-response</link>
        <guid>https://www.huntress.com/blog/threat-intel-accelerates-detection-and-response</guid>
        <description>Evidence of a pre-existing exploit was rendered when the Huntress agent was added to an endpoint. Within minutes, and in part through the use of previously published threat intelligence, analysts were able to identify the issue and make recommendations to the customer to remediate the root cause.</description>
        <pubDate>2024-02-14T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F6b0d044dba4345dd95d042faa5bc3e90" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F6b0d044dba4345dd95d042faa5bc3e90"/>
      </item>
      <item>
        <title>Attacking MSSQL Servers | Huntress</title>
        <link>https://www.huntress.com/blog/attacking-mssql-servers</link>
        <guid>https://www.huntress.com/blog/attacking-mssql-servers</guid>
        <description>In addition to social engineering attacks, threat actors target organizations&#39; attack surface, looking for exposed services and applications to gain access into an infrastructure. Microsoft SQL database servers have long been a target for attackers.</description>
        <pubDate>2024-02-08T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F6d3d563587b54d0cbbb261296562c60d" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F6d3d563587b54d0cbbb261296562c60d"/>
      </item>
      <item>
        <title>RATs! Remote Management Software from the Hacker’s Perspective | Huntress</title>
        <link>https://www.huntress.com/blog/rats-remote-management-software-from-the-hackers-perspective</link>
        <guid>https://www.huntress.com/blog/rats-remote-management-software-from-the-hackers-perspective</guid>
        <description>Tips and tricks to hunt down RMM abuse. Remote access tools for persistence. Are RMMs really just command and control? January’s Tradecraft Tuesday was wild. Here’s the recap.</description>
        <pubDate>2024-02-06T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F61abfd64774b4c6fb658278ac427b2f1" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F61abfd64774b4c6fb658278ac427b2f1"/>
      </item>
      <item>
        <title>Threat Advisory: Possible AnyDesk Stolen Code Signing Certificate | Huntress</title>
        <link>https://www.huntress.com/blog/threat-advisory-possible-anydesk-stolen-code-signing-certificate</link>
        <guid>https://www.huntress.com/blog/threat-advisory-possible-anydesk-stolen-code-signing-certificate</guid>
        <description>Huntress is tracking concerns regarding the AnyDesk remote control software and provider.</description>
        <pubDate>2024-02-02T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F50e490882aeb4dffaaba99787d03e5f1" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F50e490882aeb4dffaaba99787d03e5f1"/>
      </item>
      <item>
        <title>Ransomware Deployment Attempts Via TeamViewer | Huntress</title>
        <link>https://www.huntress.com/blog/ransomware-deployment-attempts-via-teamviewer</link>
        <guid>https://www.huntress.com/blog/ransomware-deployment-attempts-via-teamviewer</guid>
        <description>Huntress analysts continue to observe access to endpoints via legacy TeamViewer installations, and/or compromised TeamViewer credentials.</description>
        <pubDate>2024-01-17T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F1b781e1223a341589b9482a6d8192af1" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F1b781e1223a341589b9482a6d8192af1"/>
      </item>
      <item>
        <title>Full Transparency: Controlling Apple&#39;s TCC | Huntress</title>
        <link>https://www.huntress.com/blog/full-transparency-controlling-apples-tcc</link>
        <guid>https://www.huntress.com/blog/full-transparency-controlling-apples-tcc</guid>
        <description>Dive into Apple&#39;s TCC framework, decoding its role in user privacy. Explore permissions, challenges, and the encryption safeguarding sensitive data.</description>
        <pubDate>2024-01-16T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F1dcf01b98d6d4740b3ccd3f57a9e260d" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F1dcf01b98d6d4740b3ccd3f57a9e260d"/>
      </item>
      <item>
        <title>Securing Healthcare: Handling Cyber Threats with Care | Huntress</title>
        <link>https://www.huntress.com/blog/securing-healthcare-handling-cyber-threats-with-care</link>
        <guid>https://www.huntress.com/blog/securing-healthcare-handling-cyber-threats-with-care</guid>
        <description>What’s the key to navigating healthcare cybersecurity? This blog decodes today’s healthcare threat landscape and defensive strategies for patient well-being.</description>
        <pubDate>2024-01-12T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ffd2dfb15efe545e0ba448ef25b82d375" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ffd2dfb15efe545e0ba448ef25b82d375"/>
      </item>
      <item>
        <title>Empowering the Hunt: All Your Security in One Place | Huntress</title>
        <link>https://www.huntress.com/blog/empowering-the-hunt-all-your-security-in-one-place</link>
        <guid>https://www.huntress.com/blog/empowering-the-hunt-all-your-security-in-one-place</guid>
        <description>Huntress unveils a powerful new platform UI for 2024! From SOC insights to triage feeds, all your security insights are now in a unified interface in the Huntress platform.</description>
        <pubDate>2024-01-04T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5be012932bcf415ca293941fa8798796" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5be012932bcf415ca293941fa8798796"/>
      </item>
      <item>
        <title>Navigating Cybersecurity Challenges in Healthcare | Huntress</title>
        <link>https://www.huntress.com/blog/doing-more-with-less-navigating-cybersecurity-challenges-in-healthcare</link>
        <guid>https://www.huntress.com/blog/doing-more-with-less-navigating-cybersecurity-challenges-in-healthcare</guid>
        <description>Discover essential strategies for healthcare cybersecurity in our latest blog. Learn how to navigate challenges, optimize resources, and safeguard patient data.</description>
        <pubDate>2024-01-02T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fa275b1a03f9642408ae2e584973f74b7" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fa275b1a03f9642408ae2e584973f74b7"/>
      </item>
      <item>
        <title>Combating Emerging Microsoft 365 Tradecraft: Initial Access | Huntress</title>
        <link>https://www.huntress.com/blog/combating-emerging-microsoft-365-tradecraft-initial-access</link>
        <guid>https://www.huntress.com/blog/combating-emerging-microsoft-365-tradecraft-initial-access</guid>
        <description>Threats evolve, and so does Huntress. Let’s talk about evolving our approach to hitting the hackers where it hurts on Microsoft 365.</description>
        <pubDate>2023-12-27T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ffe638c9c588646feaf6a8a288f30a233" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ffe638c9c588646feaf6a8a288f30a233"/>
      </item>
      <item>
        <title>What Does the Future Hold for Today’s Cybersecurity Leaders? | Huntress</title>
        <link>https://www.huntress.com/blog/what-does-the-future-hold-for-todays-cybersecurity-leaders</link>
        <guid>https://www.huntress.com/blog/what-does-the-future-hold-for-todays-cybersecurity-leaders</guid>
        <description>From budget constraints to the rise of AI - discover how CISOs and cybersecurity leaders navigated challenges in 2023 and gain insights for success in 2024.</description>
        <pubDate>2023-12-26T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F51be2278e46b48f9a05104ff9980501b" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F51be2278e46b48f9a05104ff9980501b"/>
      </item>
      <item>
        <title>Effortless Phishing Simulations Now Part of Huntress Managed Security Awareness Training | Huntress</title>
        <link>https://www.huntress.com/blog/effortless-phishing-simulations-now-part-of-huntress-security-awareness-training</link>
        <guid>https://www.huntress.com/blog/effortless-phishing-simulations-now-part-of-huntress-security-awareness-training</guid>
        <description>Read about our newest addition to Huntress Managed SAT, Managed Phishing, offering you expert-backed, hassle-free simulated phishing campaigns.</description>
        <pubDate>2023-12-23T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F478dc4adf7ad49a3adea5f767e5f6d03" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F478dc4adf7ad49a3adea5f767e5f6d03"/>
      </item>
      <item>
        <title>Teach Yourself to Phish: The Strategy Behind Phishing Simulations | Huntress</title>
        <link>https://www.huntress.com/blog/teach-yourself-to-phish-the-strategy-behind-phishing-simulations</link>
        <guid>https://www.huntress.com/blog/teach-yourself-to-phish-the-strategy-behind-phishing-simulations</guid>
        <description>Get ready for a phishing trip! Learn about the strategy behind phishing simulations and how it can help your organization build resilience against real phishing threats.</description>
        <pubDate>2023-12-19T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F09add75cae7a41c0ae1910efa03219e3" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F09add75cae7a41c0ae1910efa03219e3"/>
      </item>
      <item>
        <title>Curling for Data: A Dive into a Threat Actor&#39;s Malicious TTPs | Huntress</title>
        <link>https://www.huntress.com/blog/curling-for-data-a-dive-into-a-threat-actors-malicious-ttps</link>
        <guid>https://www.huntress.com/blog/curling-for-data-a-dive-into-a-threat-actors-malicious-ttps</guid>
        <description>Huntress analysts recently observed a novel set of tactics, techniques, and procedures used by a threat actor for data collection and exfiltration.</description>
        <pubDate>2023-12-14T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F9015de9002d942d6aa19c7bb7953cff0" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F9015de9002d942d6aa19c7bb7953cff0"/>
      </item>
      <item>
        <title>Orienting Intelligence Requirements to the Small Business Space</title>
        <link>https://www.huntress.com/blog/orienting-intelligence-requirements-to-the-small-business-space</link>
        <guid>https://www.huntress.com/blog/orienting-intelligence-requirements-to-the-small-business-space</guid>
        <description>Discover how to streamline small business intelligence for practical decision-making, balance benefits, and explore cost-effective outsourcing solutions.</description>
        <pubDate>2023-12-12T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fd9524d8c3c4a44fd9273d89f6646a761" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fd9524d8c3c4a44fd9273d89f6646a761"/>
      </item>
      <item>
        <title>Exploring the Value of Indicators In Small Business Defense</title>
        <link>https://www.huntress.com/blog/exploring-the-value-of-indicators-in-small-business-defense</link>
        <guid>https://www.huntress.com/blog/exploring-the-value-of-indicators-in-small-business-defense</guid>
        <description>Discover how leveraging technical indicators can boost cybersecurity effectiveness and empower small business defense. Read on for practical insights.</description>
        <pubDate>2023-12-07T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc298d5d90dfc4e7ea2902f7181f58f4a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc298d5d90dfc4e7ea2902f7181f58f4a"/>
      </item>
      <item>
        <title>Huntress MDR for Microsoft 365 Update | Huntress</title>
        <link>https://www.huntress.com/blog/huntress-mdr-for-microsoft-365-update</link>
        <guid>https://www.huntress.com/blog/huntress-mdr-for-microsoft-365-update</guid>
        <description>An update on our MDR for Microsoft 365 product, some recent improvements, and what fixes and features are coming soon.</description>
        <pubDate>2023-12-06T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F3db1bf193c174f8ca2ec2c71fbcdb4a4" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F3db1bf193c174f8ca2ec2c71fbcdb4a4"/>
      </item>
      <item>
        <title>CIS Controls Security Awareness Training | Huntress</title>
        <link>https://www.huntress.com/blog/cis-controls-security-awareness-training</link>
        <guid>https://www.huntress.com/blog/cis-controls-security-awareness-training</guid>
        <description>Learn more about how Huntress&#39; Managed Security Awareness Program can help your employees follow CIS control requirements.</description>
        <pubDate>2023-12-04T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>macOS Terms and Trends You Should Know About | Huntress</title>
        <link>https://www.huntress.com/blog/macos-terms-and-trends-you-should-know-about</link>
        <guid>https://www.huntress.com/blog/macos-terms-and-trends-you-should-know-about</guid>
        <description>A look inside the evolving landscape of macOS malware. Dive into the current state of macOS threats and learn from a glossary of essential macOS terms.</description>
        <pubDate>2023-11-30T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F1cba0e62bf2f481380cd231f18444ef2" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F1cba0e62bf2f481380cd231f18444ef2"/>
      </item>
      <item>
        <title>MFT Exploitation and Adversary Operations | Huntress</title>
        <link>https://www.huntress.com/blog/mft-exploitation-and-adversary-operations</link>
        <guid>https://www.huntress.com/blog/mft-exploitation-and-adversary-operations</guid>
        <description>Dive into our analysis of the CVE-2023-43117 threat in CrushFTP and the growing popularity of MFT application exploitation as a tactic for adversaries.</description>
        <pubDate>2023-11-29T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fa9d0be34f034482b94390536159179be" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fa9d0be34f034482b94390536159179be"/>
      </item>
      <item>
        <title>Can’t Touch This: Data Exfiltration via Finger</title>
        <link>https://www.huntress.com/blog/cant-touch-this-data-exfiltration-via-finger</link>
        <guid>https://www.huntress.com/blog/cant-touch-this-data-exfiltration-via-finger</guid>
        <description>Threat actors frequently make use of native utilities during incidents. However, this blog post discusses a rarely-observed means of data exfiltration.</description>
        <pubDate>2023-11-28T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb627c4c3972c430f93f4e6569d4dc8c9" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb627c4c3972c430f93f4e6569d4dc8c9"/>
      </item>
      <item>
        <title>Key Insights from Huntress’ SMB Threat Report</title>
        <link>https://www.huntress.com/blog/navigating-the-smb-threat-landscape-key-insights-from-huntress-smb-threat-report</link>
        <guid>https://www.huntress.com/blog/navigating-the-smb-threat-landscape-key-insights-from-huntress-smb-threat-report</guid>
        <description>Navigate the SMB threat landscape with Huntress’ SMB Threat Report. Gain insights into evolving cyber threats targeting SMBs. Read on for key insights.</description>
        <pubDate>2023-11-21T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F25d75ed735a34023a4e0b3e874210f25" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F25d75ed735a34023a4e0b3e874210f25"/>
      </item>
      <item>
        <title>Critical Vulnerability: SysAid CVE-2023-47246 | Huntress</title>
        <link>https://www.huntress.com/blog/critical-vulnerability-sysaid-cve-2023-47246</link>
        <guid>https://www.huntress.com/blog/critical-vulnerability-sysaid-cve-2023-47246</guid>
        <description>Huntress has analyzed the emerging SysAid CVE-2023-47246 vulnerability and recreated the attack chain with a proof-of-concept exploit.</description>
        <pubDate>2023-11-10T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F39765c339323415db27f417a6053d769" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F39765c339323415db27f417a6053d769"/>
      </item>
      <item>
        <title>Bitter Pill: Pharmaceutical Vendor Linked to Pharmacy and Health Clinic Cyberattack | Huntress</title>
        <link>https://www.huntress.com/blog/third-party-pharmaceutical-vendor-linked-to-pharmacy-and-health-clinic-cyberattack</link>
        <guid>https://www.huntress.com/blog/third-party-pharmaceutical-vendor-linked-to-pharmacy-and-health-clinic-cyberattack</guid>
        <description>Huntress has uncovered a series of unauthorized access, revealing a threat actor using ScreenConnect to infiltrate multiple healthcare organizations.</description>
        <pubDate>2023-11-09T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F25ff9dea87e247f99c8d7af3e7f3965a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F25ff9dea87e247f99c8d7af3e7f3965a"/>
      </item>
      <item>
        <title>Confluence to Cerber: Exploitation of ​​CVE-2023-22518</title>
        <link>https://www.huntress.com/blog/confluence-to-cerber-exploitation-of-cve-2023-22518-for-ransomware-deployment</link>
        <guid>https://www.huntress.com/blog/confluence-to-cerber-exploitation-of-cve-2023-22518-for-ransomware-deployment</guid>
        <description>CVE-2023-22518 is being exploited in Confluence for Cerber ransomware deployment. Read up on Huntress’ observations and mitigation guidance.</description>
        <pubDate>2023-11-07T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb73610978122483c936fea1a6d0e0789" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb73610978122483c936fea1a6d0e0789"/>
      </item>
      <item>
        <title>Critical Vulnerability: Exploitation of Apache ActiveMQ CVE-2023-46604 | Huntress</title>
        <link>https://www.huntress.com/blog/critical-vulnerability-exploitation-of-apache-activemq-cve-2023-46604</link>
        <guid>https://www.huntress.com/blog/critical-vulnerability-exploitation-of-apache-activemq-cve-2023-46604</guid>
        <description>CVE-2023-46604 is a critical remote code execution vulnerability in Apache ActiveMQ. Patch now to avoid any potential adversary exploitation.</description>
        <pubDate>2023-11-02T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F3cbf8a517a0740c990ffc9ab6ee03ef5" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F3cbf8a517a0740c990ffc9ab6ee03ef5"/>
      </item>
      <item>
        <title>The Hackers in the Arena: The Huntress CTF Retrospective | Huntress</title>
        <link>https://www.huntress.com/blog/the-hackers-in-the-arena-the-huntress-ctf-retrospective</link>
        <guid>https://www.huntress.com/blog/the-hackers-in-the-arena-the-huntress-ctf-retrospective</guid>
        <description>This blog post is a retrospective on the Huntress team&#39;s month-long Capture the Flag (CTF) event, highlighting diverse challenges and hacker camaraderie.</description>
        <pubDate>2023-10-31T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F8cc348dae854416daf0669867f382868" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F8cc348dae854416daf0669867f382868"/>
      </item>
      <item>
        <title>Exposed Passwords on Endpoints Are More Common Than You Think</title>
        <link>https://www.huntress.com/blog/exposed-passwords-on-endpoints-are-more-common-than-you-think</link>
        <guid>https://www.huntress.com/blog/exposed-passwords-on-endpoints-are-more-common-than-you-think</guid>
        <description>Discover the alarming prevalence of exposed passwords on endpoints and how to safeguard your credentials. Learn from Huntress&#39; findings and insights.</description>
        <pubDate>2023-10-25T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb46f3abb88c84a6c949bd0c02df6d3b4" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb46f3abb88c84a6c949bd0c02df6d3b4"/>
      </item>
      <item>
        <title>5 Phishing Email Scams and How NOT To Fall For Them | Huntress</title>
        <link>https://www.huntress.com/blog/5-phishing-email-scams-and-how-not-to-fall-for-them</link>
        <guid>https://www.huntress.com/blog/5-phishing-email-scams-and-how-not-to-fall-for-them</guid>
        <description>Explore the art of phishing, learn how to spot common phishing scams and red flags, and understand the importance of security awareness training.</description>
        <pubDate>2023-10-18T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0314f7a8dc98420a9b76ef0056ab9637" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0314f7a8dc98420a9b76ef0056ab9637"/>
      </item>
      <item>
        <title>Huntress Managed ITDR (formerly MDR for Microsoft 365): The Full Story | Huntress</title>
        <link>https://www.huntress.com/blog/huntress-mdr-for-microsoft-365-the-full-story</link>
        <guid>https://www.huntress.com/blog/huntress-mdr-for-microsoft-365-the-full-story</guid>
        <description>Read up on how and why Huntress built its Managed ITDR (formerly MDR for Microsoft 365) solution to help combat the growing threat of business email compromise (BEC).</description>
        <pubDate>2023-10-16T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F8fa42a739de04e82bdeed34f0559e257" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F8fa42a739de04e82bdeed34f0559e257"/>
      </item>
      <item>
        <title>Why Are You Still Paying for Antivirus? | Huntress</title>
        <link>https://www.huntress.com/blog/why-are-you-still-paying-for-antivirus</link>
        <guid>https://www.huntress.com/blog/why-are-you-still-paying-for-antivirus</guid>
        <description>Is it worth ditching your legacy antivirus solution? This blog takes a hard look at what matters most in AV and endpoint protection tools.</description>
        <pubDate>2023-10-11T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F26a8d3e0460145848bdfa36af5d96dc0" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F26a8d3e0460145848bdfa36af5d96dc0"/>
      </item>
      <item>
        <title>3 Hot Takes and Tips for Cybersecurity Awareness Month 2023 | Huntress</title>
        <link>https://www.huntress.com/blog/3-hot-takes-and-tips-for-cybersecurity-awareness-month-2023</link>
        <guid>https://www.huntress.com/blog/3-hot-takes-and-tips-for-cybersecurity-awareness-month-2023</guid>
        <description>In the spirit of Cybersecurity Awareness Month, use these cybersecurity tips to take your security hygiene and cyber knowledge up a notch.</description>
        <pubDate>2023-10-10T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc191a6dcc8664c7ca83e61169b7dad97" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc191a6dcc8664c7ca83e61169b7dad97"/>
      </item>
      <item>
        <title>3 Hot Takes and Tips for Cybersecurity Awareness Month 2023 | Huntress</title>
        <link>https://www.huntress.com/blog/3-hot-takes-and-tips-for-cybersecurity-awareness-month-2023</link>
        <guid>https://www.huntress.com/blog/3-hot-takes-and-tips-for-cybersecurity-awareness-month-2023</guid>
        <description>In the spirit of Cybersecurity Awareness Month, use these cybersecurity tips to take your security hygiene and cyber knowledge up a notch.</description>
        <pubDate>2023-10-10T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc191a6dcc8664c7ca83e61169b7dad97" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc191a6dcc8664c7ca83e61169b7dad97"/>
      </item>
      <item>
        <title>Pairing SOCs with Automation: You Won’t Be Replaced by a Robot Yet | Huntress</title>
        <link>https://www.huntress.com/blog/pairing-socs-with-automation-you-wont-be-replaced-by-a-robot-yet</link>
        <guid>https://www.huntress.com/blog/pairing-socs-with-automation-you-wont-be-replaced-by-a-robot-yet</guid>
        <description>We can use automation, detection and response, and open-source software to solve common SOC challenges. Read about simple approaches for SOC automation.</description>
        <pubDate>2023-10-05T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F86631fd2d46b483396b19ea3a2bee919" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F86631fd2d46b483396b19ea3a2bee919"/>
      </item>
      <item>
        <title>Ask the Mac Guy: Do I Need AV on My Mac? | Huntress</title>
        <link>https://www.huntress.com/blog/ask-the-mac-guy-do-i-need-av-on-mac</link>
        <guid>https://www.huntress.com/blog/ask-the-mac-guy-do-i-need-av-on-mac</guid>
        <description>In this blog, our Mac expert answers the existential question: As a Mac user, do you need to use an antivirus (AV) to protect your Mac?</description>
        <pubDate>2023-10-03T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ff7ee5021f72e4e8fa30db5453cf188c4" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ff7ee5021f72e4e8fa30db5453cf188c4"/>
      </item>
      <item>
        <title>Critical Vulnerabilities: WS_FTP Exploitation | Huntress</title>
        <link>https://www.huntress.com/blog/critical-vulnerabilities-ws-ftp-exploitation</link>
        <guid>https://www.huntress.com/blog/critical-vulnerabilities-ws-ftp-exploitation</guid>
        <description>Huntress is actively investigating numerous vulnerabilities affecting the WS_FTP Server Ad Hoc Transfer Module observed in the wild.</description>
        <pubDate>2023-10-02T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F005233716c0a4fdfa093612c1836f91a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F005233716c0a4fdfa093612c1836f91a"/>
      </item>
      <item>
        <title>Critical Vulnerability: WebP Heap Buffer Overflow (CVE-2023-4863) | Huntress</title>
        <link>https://www.huntress.com/blog/critical-vulnerability-webp-heap-buffer-overflow-cve-2023-4863</link>
        <guid>https://www.huntress.com/blog/critical-vulnerability-webp-heap-buffer-overflow-cve-2023-4863</guid>
        <description>Huntress is tracking a new critical vulnerability seen in the wild that affects anything using the libwebp WebP image library. Here’s what we know so far.</description>
        <pubDate>2023-09-28T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F1c92190b9fdf4fa48d21a9e969247946" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F1c92190b9fdf4fa48d21a9e969247946"/>
      </item>
      <item>
        <title>Humans vs. AI: The Critical Role of Human Expertise in Cybersecurity</title>
        <link>https://www.huntress.com/blog/humans-vs-ai-the-critical-role-of-human-expertise-in-cybersecurity</link>
        <guid>https://www.huntress.com/blog/humans-vs-ai-the-critical-role-of-human-expertise-in-cybersecurity</guid>
        <description>Can AI ever fully replace humans in cybersecurity? We argue that human-powered security is the key to staying one step ahead of today’s threats.</description>
        <pubDate>2023-09-28T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fccba753ddc5b42e3b3629587da22e195" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fccba753ddc5b42e3b3629587da22e195"/>
      </item>
      <item>
        <title>Netscaler Exploitation to Social Engineering: Mapping Convergence of Adversary Tradecraft Across Victims | Huntress</title>
        <link>https://www.huntress.com/blog/netscaler-exploitation-to-social-engineering-mapping-convergence-of-adversary-tradecraft-across-victims</link>
        <guid>https://www.huntress.com/blog/netscaler-exploitation-to-social-engineering-mapping-convergence-of-adversary-tradecraft-across-victims</guid>
        <description>The following is an analysis by the Huntress team of several recent intrusions connected to the Netscaler exploitation.</description>
        <pubDate>2023-09-26T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F529129733bdd44b2b906cc7a9cd8beef" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F529129733bdd44b2b906cc7a9cd8beef"/>
      </item>
      <item>
        <title>Introducing Incident Notification: A Game Changer for Critical Incident Response | Huntress</title>
        <link>https://www.huntress.com/blog/introducing-incident-notification-a-game-changer-for-critical-incident-response</link>
        <guid>https://www.huntress.com/blog/introducing-incident-notification-a-game-changer-for-critical-incident-response</guid>
        <description>Read about Huntress&#39; newest feature, Incident Notification, which allows us to instantly alert partners to critical incidents via SMS text or phone call.</description>
        <pubDate>2023-09-22T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F567595c668f44e2eab743948ee535ff4" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F567595c668f44e2eab743948ee535ff4"/>
      </item>
      <item>
        <title>Understanding Evil: How to Reverse Engineer Malware | Huntress</title>
        <link>https://www.huntress.com/blog/understanding-evil-how-to-reverse-engineer-malware</link>
        <guid>https://www.huntress.com/blog/understanding-evil-how-to-reverse-engineer-malware</guid>
        <description>Dive into the fundamentals of reverse engineering malware and understanding how malicious software works.</description>
        <pubDate>2023-09-21T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe928907ab6824c8fadd566bad2d82a7f" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe928907ab6824c8fadd566bad2d82a7f"/>
      </item>
      <item>
        <title>Enhancing Cybersecurity for MSPs in Australia and New Zealand | Huntress</title>
        <link>https://www.huntress.com/blog/enhancing-cybersecurity-for-msps-in-australia-and-new-zealand</link>
        <guid>https://www.huntress.com/blog/enhancing-cybersecurity-for-msps-in-australia-and-new-zealand</guid>
        <description>Read expert tips about how MSPs in Australia and New Zealand can elevate their cybersecurity offerings and have better sales conversations with customers.</description>
        <pubDate>2023-09-20T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fdc10c63b75b447eda39c96ba38065f43" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fdc10c63b75b447eda39c96ba38065f43"/>
      </item>
      <item>
        <title>Spidering Through Identity for Profit and Disruption | Huntress</title>
        <link>https://www.huntress.com/blog/spidering-through-identity-for-profit-and-disruption</link>
        <guid>https://www.huntress.com/blog/spidering-through-identity-for-profit-and-disruption</guid>
        <description>Dive into the recent Las Vegas casino cyberattacks linked to Scattered Spider, and learn how organizations can defend against such identify-based attacks.</description>
        <pubDate>2023-09-14T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F9ee13d11d03745dbba82e2c47644e664" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F9ee13d11d03745dbba82e2c47644e664"/>
      </item>
      <item>
        <title>Evolution of USB-Borne Malware, Raspberry Robin | Huntress</title>
        <link>https://www.huntress.com/blog/evolution-of-usb-borne-malware-raspberry-robin</link>
        <guid>https://www.huntress.com/blog/evolution-of-usb-borne-malware-raspberry-robin</guid>
        <description>A deep dive into the USB-borne Raspberry Robin malware and how Huntress Managed EDR and Managed Antivirus can detect and mitigate this threat.</description>
        <pubDate>2023-09-07T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F910ca2efd7a140dcbd73aa6b531310ef" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F910ca2efd7a140dcbd73aa6b531310ef"/>
      </item>
      <item>
        <title>Ask the Mac Guy: Best Practices for Securing Macs | Huntress</title>
        <link>https://www.huntress.com/blog/ask-the-mac-guy-best-practices-for-securing-macs</link>
        <guid>https://www.huntress.com/blog/ask-the-mac-guy-best-practices-for-securing-macs</guid>
        <description>Tips from a Mac expert. Discover the best practices users and administrators can use to secure your Mac devices or your Mac fleet.</description>
        <pubDate>2023-09-05T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb1b1397cf2ba4595b15f196ab55b79c3" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb1b1397cf2ba4595b15f196ab55b79c3"/>
      </item>
      <item>
        <title>How Huntress Transformed Its Detection Engine</title>
        <link>https://www.huntress.com/blog/how-huntress-transformed-its-detection-engine</link>
        <guid>https://www.huntress.com/blog/how-huntress-transformed-its-detection-engine</guid>
        <description>The blog post discusses the evolution of Huntress&#39; data analysis in response to scaling challenges and how we transitioned to a custom detection engine.</description>
        <pubDate>2023-08-31T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F2283372b349944eb9e4ed515587e2d06" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F2283372b349944eb9e4ed515587e2d06"/>
      </item>
      <item>
        <title>Qakbot Malware Takedown and Defending Forward | Huntress</title>
        <link>https://www.huntress.com/blog/qakbot-malware-takedown-and-defending-forward</link>
        <guid>https://www.huntress.com/blog/qakbot-malware-takedown-and-defending-forward</guid>
        <description>With the FBI&#39;s takedown of Qakbot malware, we&#39;re sharing how the Huntress team developed our own Qakbot vaccine and our commitment to defend forward.</description>
        <pubDate>2023-08-30T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F8aeceda69ecf4d1fa1ebc59d17c2c743" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F8aeceda69ecf4d1fa1ebc59d17c2c743"/>
      </item>
      <item>
        <title>Threat Hunting and Tactical Malware Analysis | Huntress</title>
        <link>https://www.huntress.com/blog/threat-hunting-and-tactical-malware-analysis</link>
        <guid>https://www.huntress.com/blog/threat-hunting-and-tactical-malware-analysis</guid>
        <description>Dive into the basics of threat hunting and tactical malware analysis, and learn how these two practices go hand in hand in cybersecurity.</description>
        <pubDate>2023-08-29T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F21e2ecd2cbcb4c459e334985bcc33ca0" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F21e2ecd2cbcb4c459e334985bcc33ca0"/>
      </item>
      <item>
        <title>Best Practices to Reduce Your Attack Surface</title>
        <link>https://www.huntress.com/blog/best-practices-to-reduce-your-attack-surface</link>
        <guid>https://www.huntress.com/blog/best-practices-to-reduce-your-attack-surface</guid>
        <description>Read expert insights on how to strengthen your cybersecurity strategy with asset inventory and attack surface reduction.</description>
        <pubDate>2023-08-23T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F64080726eb2c4eab87e38430974405e2" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F64080726eb2c4eab87e38430974405e2"/>
      </item>
      <item>
        <title>Ask the Mac Guy: macOS Security Myths | Huntress</title>
        <link>https://www.huntress.com/blog/ask-the-mac-guy-macos-security-myths</link>
        <guid>https://www.huntress.com/blog/ask-the-mac-guy-macos-security-myths</guid>
        <description>Discover the truth about macOS security. The Huntress Mac Guy answers common macOS security questions like why you should protect your Mac computers.</description>
        <pubDate>2023-08-22T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F8619b8d4f81e420e9894956f876314bb" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F8619b8d4f81e420e9894956f876314bb"/>
      </item>
      <item>
        <title>Gone Phishing: An Analysis of a Targeted User Attack | Huntress</title>
        <link>https://www.huntress.com/blog/gone-phishing-an-analysis-of-a-targeted-user-attack</link>
        <guid>https://www.huntress.com/blog/gone-phishing-an-analysis-of-a-targeted-user-attack</guid>
        <description>Get an inside look at how threat actors use phishing and social engineering tactics to target users and infiltrate organizations.</description>
        <pubDate>2023-08-17T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F61a874d8805a46d1871d3da12990f109" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F61a874d8805a46d1871d3da12990f109"/>
      </item>
      <item>
        <title>Traditional Antivirus vs. Managed Antivirus | Huntress</title>
        <link>https://www.huntress.com/blog/traditional-antivirus-vs-managed-antivirus</link>
        <guid>https://www.huntress.com/blog/traditional-antivirus-vs-managed-antivirus</guid>
        <description>Learn why traditional antivirus falls short against today&#39;s cyber threats on its own and how Huntress offers proactive, effective protection.</description>
        <pubDate>2023-08-16T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fbcda806d56ff4eb9a398d810a09f00f5" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fbcda806d56ff4eb9a398d810a09f00f5"/>
      </item>
      <item>
        <title>Investigating New INC Ransom Group Activity | Huntress</title>
        <link>https://www.huntress.com/blog/investigating-new-inc-ransom-group-activity</link>
        <guid>https://www.huntress.com/blog/investigating-new-inc-ransom-group-activity</guid>
        <description>The Huntress team investigated a ransomware attack of a new INC Ransom threat actor group. Here is the activity we observed.</description>
        <pubDate>2023-08-11T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ffb83832053a04c2f8cb0ff34d2496262" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ffb83832053a04c2f8cb0ff34d2496262"/>
      </item>
      <item>
        <title>Identity: The Third Phase of Security Operations | Huntress</title>
        <link>https://www.huntress.com/blog/identity-the-third-phase-of-security-operations</link>
        <guid>https://www.huntress.com/blog/identity-the-third-phase-of-security-operations</guid>
        <description>We’ve entered the era of identity security. Are you ready? Explore how to counter evolving threats and protect identities with confidence.</description>
        <pubDate>2023-08-10T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F259f35439ee24099b09cef2b4a2f667d" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F259f35439ee24099b09cef2b4a2f667d"/>
      </item>
      <item>
        <title>How Security-Centric Procedures and Training Helped Huntress Catch a $100,000 BEC Scam | Huntress</title>
        <link>https://www.huntress.com/blog/how-security-centric-procedures-and-training-helped-huntress-catch-a-100000-bec-scam</link>
        <guid>https://www.huntress.com/blog/how-security-centric-procedures-and-training-helped-huntress-catch-a-100000-bec-scam</guid>
        <description>Discover how Huntress caught an attempted business email compromise (BEC) scam that would have cost the company more than $100,000 had it gone undetected.</description>
        <pubDate>2023-08-09T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F82fa8d259fc146d7b8fba9ee7aa9bb74" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F82fa8d259fc146d7b8fba9ee7aa9bb74"/>
      </item>
      <item>
        <title>How Businesses Should Be Scaling Their Security</title>
        <link>https://www.huntress.com/blog/beyond-antivirus-how-businesses-should-be-scaling-their-security</link>
        <guid>https://www.huntress.com/blog/beyond-antivirus-how-businesses-should-be-scaling-their-security</guid>
        <description>Discover how today&#39;s businesses can conquer security challenges, strengthen defenses and evolve their security beyond traditional antivirus measures.</description>
        <pubDate>2023-08-08T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5a66394ead404efc93a893da472c19f4" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5a66394ead404efc93a893da472c19f4"/>
      </item>
      <item>
        <title>Another PaperCut: CVE-2023-39143 Remote Code Execution | Huntress</title>
        <link>https://www.huntress.com/blog/another-papercut-cve-2023-39143-remote-code-execution</link>
        <guid>https://www.huntress.com/blog/another-papercut-cve-2023-39143-remote-code-execution</guid>
        <description>Huntress is tracking a new PaperCut vulnerability, CVE-2023-39143, which allows full remote code execution on unpatched servers.</description>
        <pubDate>2023-08-05T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fcf17bbe0f7e345ccb0096f04b886e559" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fcf17bbe0f7e345ccb0096f04b886e559"/>
      </item>
      <item>
        <title>Legitimate Apps as Traitorware for Persistent Microsoft 365 Compromise</title>
        <link>https://www.huntress.com/blog/legitimate-apps-as-traitorware-for-persistent-microsoft-365-compromise</link>
        <guid>https://www.huntress.com/blog/legitimate-apps-as-traitorware-for-persistent-microsoft-365-compromise</guid>
        <description>Dive into how Huntress caught a threat actor adding several legitimate email apps to maintain persistent access to a compromised Microsoft 365 environment.</description>
        <pubDate>2023-08-03T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F895dbb3510164c60b815f6021ae61e60" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F895dbb3510164c60b815f6021ae61e60"/>
      </item>
      <item>
        <title>Breaking Down the Threat Hunting Process | Huntress</title>
        <link>https://www.huntress.com/blog/breaking-down-the-threat-hunting-process</link>
        <guid>https://www.huntress.com/blog/breaking-down-the-threat-hunting-process</guid>
        <description>Discover the key phases of the threat hunting process and how threat hunters structure their hunts to proactively seek out threats.</description>
        <pubDate>2023-08-02T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fd4bc24687ce04f1f93ce1cb31bfe0e73" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fd4bc24687ce04f1f93ce1cb31bfe0e73"/>
      </item>
      <item>
        <title>Why Huntress Trusts Microsoft Defender Antivirus (And You Should Too) | Huntress</title>
        <link>https://www.huntress.com/blog/why-huntress-trusts-microsoft-defender-antivirus-and-you-should-too</link>
        <guid>https://www.huntress.com/blog/why-huntress-trusts-microsoft-defender-antivirus-and-you-should-too</guid>
        <description>Is it worth switching to Microsoft Defender Antivirus? Spoiler alert: We think yes! Explore why Defender is a solid AV solution.</description>
        <pubDate>2023-08-01T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5099a932412d4ed49e98959fd7f7e68f" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5099a932412d4ed49e98959fd7f7e68f"/>
      </item>
      <item>
        <title>Business Email Compromise via Azure Administrative Privileges | Huntress</title>
        <link>https://www.huntress.com/blog/business-email-compromise-via-azure-administrative-privileges</link>
        <guid>https://www.huntress.com/blog/business-email-compromise-via-azure-administrative-privileges</guid>
        <description>Explore how Huntress stopped a massive business email compromise (BEC) attack targeting multiple user accounts within a single organization.</description>
        <pubDate>2023-07-27T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F218eeaf77e8043379bf21663bb0bd77a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F218eeaf77e8043379bf21663bb0bd77a"/>
      </item>
      <item>
        <title>The Power of Cyber Insurance: What Every MSP Should Know | Huntress</title>
        <link>https://www.huntress.com/blog/the-power-of-cyber-insurance-what-every-msp-should-know</link>
        <guid>https://www.huntress.com/blog/the-power-of-cyber-insurance-what-every-msp-should-know</guid>
        <description>This blog post provides a comprehensive overview of the importance, benefits and challenges of cyber insurance that every MSP should be aware of.</description>
        <pubDate>2023-07-25T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fd7713e4bf99c477cb67c7bb313965ac4" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fd7713e4bf99c477cb67c7bb313965ac4"/>
      </item>
      <item>
        <title>Celebrating One Year of Security Awareness Training</title>
        <link>https://www.huntress.com/blog/celebrating-one-year-of-security-awareness-training</link>
        <guid>https://www.huntress.com/blog/celebrating-one-year-of-security-awareness-training</guid>
        <description>Dive into the improvements and progress we’ve made with Huntress Security Awareness Training since acquiring Curricula one year ago.</description>
        <pubDate>2023-07-19T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fef463ac03b114bb99428ee7c0ea0f3c8" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fef463ac03b114bb99428ee7c0ea0f3c8"/>
      </item>
      <item>
        <title>Thwarting Financial Fraud: Shutting Down Hackers in Microsoft 365 | Huntress</title>
        <link>https://www.huntress.com/blog/thwarting-financial-fraud-shutting-down-hackers-in-microsoft-365</link>
        <guid>https://www.huntress.com/blog/thwarting-financial-fraud-shutting-down-hackers-in-microsoft-365</guid>
        <description>In this blog, explore how Huntress caught an attempt at financial fraud through business email compromise (BEC) in Microsoft 365.</description>
        <pubDate>2023-07-13T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F38ae70b81bf94a049b4123124af1e6db" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F38ae70b81bf94a049b4123124af1e6db"/>
      </item>
      <item>
        <title>Move It on Over: Reflecting on the MOVEit Exploitation | Huntress</title>
        <link>https://www.huntress.com/blog/move-it-on-over-reflecting-on-the-moveit-exploitation</link>
        <guid>https://www.huntress.com/blog/move-it-on-over-reflecting-on-the-moveit-exploitation</guid>
        <description>In this blog, we explore the long-term impact of the MOVEit exploitation and how defenders can stay vigilant and learn from the past.</description>
        <pubDate>2023-07-07T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F46ad452f48d547b48c45bc7d8521266c" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F46ad452f48d547b48c45bc7d8521266c"/>
      </item>
      <item>
        <title>Threat Hunting for Business Email Compromise Through User Agents | Huntress</title>
        <link>https://www.huntress.com/blog/threat-hunting-for-business-email-compromise-through-user-agents</link>
        <guid>https://www.huntress.com/blog/threat-hunting-for-business-email-compromise-through-user-agents</guid>
        <description>Can we use anomalous user agents to detect potential business email compromise (BEC) in Microsoft 365? Explore what we found through threat hunting for BEC.</description>
        <pubDate>2023-07-06T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb96a43c2f94645248bad2e0c3aa74b1b" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb96a43c2f94645248bad2e0c3aa74b1b"/>
      </item>
      <item>
        <title>dmXProtect: Stop, Drop, Shut Malware Down</title>
        <link>https://www.huntress.com/blog/dmxprotect-stop-drop-shut-malware-down-before-it-opens-up-shop</link>
        <guid>https://www.huntress.com/blog/dmxprotect-stop-drop-shut-malware-down-before-it-opens-up-shop</guid>
        <description>Do you need third-party security for macOS? Discover if Apple’s malware prevention products, XProtect and XProtect Remediator, are good enough solutions to keep users safe.</description>
        <pubDate>2023-06-28T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F8876f49b05f84927bc48bb15637f6404" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F8876f49b05f84927bc48bb15637f6404"/>
      </item>
      <item>
        <title>One MSP, Three Microsoft 365 Compromises, 72 Hours | Huntress</title>
        <link>https://www.huntress.com/blog/one-msp-three-microsoft-365-compromises-72-hours</link>
        <guid>https://www.huntress.com/blog/one-msp-three-microsoft-365-compromises-72-hours</guid>
        <description>Discover how Huntress Managed Identity Threat Detection and Response identified three business email compromise (BEC) attacks within 72 hours of each other.</description>
        <pubDate>2023-06-27T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fbbffa4d42e5a4a7982fb611f548d073c" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fbbffa4d42e5a4a7982fb611f548d073c"/>
      </item>
      <item>
        <title>How To Speak To SMBs About Cybersecurity | Huntress</title>
        <link>https://www.huntress.com/blog/how-to-speak-to-smbs-about-cybersecurity</link>
        <guid>https://www.huntress.com/blog/how-to-speak-to-smbs-about-cybersecurity</guid>
        <description>Need help approaching the security sales conversation? Use these tips to walk into your next client meeting armed with points for selling cybersecurity.</description>
        <pubDate>2023-06-20T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F69260823e6b7448cb19554813e0053c9" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F69260823e6b7448cb19554813e0053c9"/>
      </item>
      <item>
        <title>Understanding Granular Delegated Admin Privileges (GDAP) and Its Operational Impact | Huntress</title>
        <link>https://www.huntress.com/blog/understanding-gdap-and-its-operational-impact</link>
        <guid>https://www.huntress.com/blog/understanding-gdap-and-its-operational-impact</guid>
        <description>Everything you need to know about Microsoft&#39;s authentication control, Granular Delegated Admin Privileges (GDAP).</description>
        <pubDate>2023-06-13T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ff40011a91c144e8e84385f299b1b4496" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ff40011a91c144e8e84385f299b1b4496"/>
      </item>
      <item>
        <title>Calm In The Storm: Reviewing Volt Typhoon</title>
        <link>https://www.huntress.com/blog/calm-in-the-storm-reviewing-volt-typhoon</link>
        <guid>https://www.huntress.com/blog/calm-in-the-storm-reviewing-volt-typhoon</guid>
        <description>Explore the recent disclosures concerning Volt Typhoon, a threat actor engaged in the widespread exploitation of external-facing services and network appliances.</description>
        <pubDate>2023-06-08T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fef0b9dc97f4043aaaf11700e9a15a062" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fef0b9dc97f4043aaaf11700e9a15a062"/>
      </item>
      <item>
        <title>Beware of Traitorware: Using Splunk for Persistence</title>
        <link>https://www.huntress.com/blog/beware-of-traitorware-using-splunk-for-persistence</link>
        <guid>https://www.huntress.com/blog/beware-of-traitorware-using-splunk-for-persistence</guid>
        <description>This blog illustrates how the Splunk Universal Forwarder (UF) can be used as traitorware for persistence and remote code execution.</description>
        <pubDate>2023-06-06T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0d4743597b1b4234973cd48950c00af1" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0d4743597b1b4234973cd48950c00af1"/>
      </item>
      <item>
        <title>MOVEit Transfer Critical Vulnerability CVE-2023-34362 Rapid Response</title>
        <link>https://www.huntress.com/blog/moveit-transfer-critical-vulnerability-rapid-response</link>
        <guid>https://www.huntress.com/blog/moveit-transfer-critical-vulnerability-rapid-response</guid>
        <description>Our team is tracking in-the-wild exploitation of a zero-day vulnerability against Progress&#39; MOVEit Transfer web application that allows for escalated privileges and unauthorized access.</description>
        <pubDate>2023-06-01T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F9bb5aa551a934332ad337f4f4a2c4294" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F9bb5aa551a934332ad337f4f4a2c4294"/>
      </item>
      <item>
        <title>Threat Advisory: XMRig Cryptomining By Way Of TeamViewer</title>
        <link>https://www.huntress.com/blog/threat-advisory-xmrig-crypto-mining-by-way-of-teamviewer</link>
        <guid>https://www.huntress.com/blog/threat-advisory-xmrig-crypto-mining-by-way-of-teamviewer</guid>
        <description>Huntress has recently seen an uptick in compromised TeamViewer accounts being used to install the XMRig cryptocurrency miner. Dive into the analysis here.</description>
        <pubDate>2023-05-30T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F462dc47b239e4791b19fc0dd5232a024" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F462dc47b239e4791b19fc0dd5232a024"/>
      </item>
      <item>
        <title>The Battle for macOS Management: MDM vs. RMM | Huntress</title>
        <link>https://www.huntress.com/blog/the-battle-for-macos-management-mdm-vs-rmm</link>
        <guid>https://www.huntress.com/blog/the-battle-for-macos-management-mdm-vs-rmm</guid>
        <description>Explore the two primary methods for managing macOS devices, MDM (Mobile Device Management) and RMM (Remote Monitoring and Management).</description>
        <pubDate>2023-05-23T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F77203de081df44ee84cda153d48cd538" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F77203de081df44ee84cda153d48cd538"/>
      </item>
      <item>
        <title>New Investment Fuels Our Mission To Enable SMBs to Better Protect Their Business Assets | Huntress</title>
        <link>https://www.huntress.com/blog/new-investment-fuels-our-mission-to-enable-smbs-to-better-protect-their-business-assets</link>
        <guid>https://www.huntress.com/blog/new-investment-fuels-our-mission-to-enable-smbs-to-better-protect-their-business-assets</guid>
        <description>Huntress has raised $60M in Series C funding, led by Sapphire Ventures with participation from existing investors Forgepoint Capital and JMI Equity.</description>
        <pubDate>2023-05-16T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F274cc6579d124b08be9dda020cfc4465" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F274cc6579d124b08be9dda020cfc4465"/>
      </item>
      <item>
        <title>Advanced CyberChef Tips: AsyncRAT Loader | Huntress</title>
        <link>https://www.huntress.com/blog/advanced-cyberchef-tips-asyncrat-loader</link>
        <guid>https://www.huntress.com/blog/advanced-cyberchef-tips-asyncrat-loader</guid>
        <description>Need some CyberChef tips? You&#39;ve come to the right blog.</description>
        <pubDate>2023-05-09T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F18dea642c9f6405991173434dc351c2a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F18dea642c9f6405991173434dc351c2a"/>
      </item>
      <item>
        <title>The Power of People: Inside Huntress EDR and 24/7 Operations | Huntress</title>
        <link>https://www.huntress.com/blog/the-power-of-people-inside-huntress-edr-24x7-operations</link>
        <guid>https://www.huntress.com/blog/the-power-of-people-inside-huntress-edr-24x7-operations</guid>
        <description>Watch the webinar recording for an overview of the Huntress platform for our community—and how our human analysts make all the difference.</description>
        <pubDate>2023-05-02T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Faa3abf9dccc341baa3a1338184002c84" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Faa3abf9dccc341baa3a1338184002c84"/>
      </item>
      <item>
        <title>Endpoint Security In a macOS World | Huntress</title>
        <link>https://www.huntress.com/blog/endpoint-security-in-a-macos-world</link>
        <guid>https://www.huntress.com/blog/endpoint-security-in-a-macos-world</guid>
        <description>It would take hours to cover everything endpoint security can do, but this blog covers it in a few aspects: a high-level overview, a deeper dive and how detection engineers can leverage it.</description>
        <pubDate>2023-04-25T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ff5db97f44e8340bfb65c50cc78ca6a61" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ff5db97f44e8340bfb65c50cc78ca6a61"/>
      </item>
      <item>
        <title>Critical Vulnerabilities in PaperCut Print Management Software | Huntress</title>
        <link>https://www.huntress.com/blog/critical-vulnerabilities-in-papercut-print-management-software</link>
        <guid>https://www.huntress.com/blog/critical-vulnerabilities-in-papercut-print-management-software</guid>
        <description>Our team is tracking in-the-wild exploitation of zero-day vulnerabilities against PaperCut MF/NG which allow for unauthenticated remote code execution due to an authentication bypass.</description>
        <pubDate>2023-04-21T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F566f9354e9c74b35b974dc37c0f27f27" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F566f9354e9c74b35b974dc37c0f27f27"/>
      </item>
      <item>
        <title>Bringing the Hunt to Australia and New Zealand | Huntress</title>
        <link>https://www.huntress.com/blog/huntress-australia-new-zealand-msp</link>
        <guid>https://www.huntress.com/blog/huntress-australia-new-zealand-msp</guid>
        <description>Huntress is bringing the hunt to Australia and New Zealand! Hear from the Regional Director of Huntress ANZ what this expansion means.</description>
        <pubDate>2023-04-13T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F9bc70af628ba4b99be00f9023f4f9d24" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F9bc70af628ba4b99be00f9023f4f9d24"/>
      </item>
      <item>
        <title>Traitorware and Living Off the Land: Using Splunk to Exfiltrate Data | Huntress</title>
        <link>https://www.huntress.com/blog/traitorware-and-living-off-the-land-using-splunk-to-exfiltrate-data</link>
        <guid>https://www.huntress.com/blog/traitorware-and-living-off-the-land-using-splunk-to-exfiltrate-data</guid>
        <description>Your security tools are just as likely to be attacked as anything else. This blog dives into traitorware and how it&#39;s used to live off the land.</description>
        <pubDate>2023-04-11T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F9fdd48c132d3480eadf99500c9c5994d" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F9fdd48c132d3480eadf99500c9c5994d"/>
      </item>
      <item>
        <title>Huntress Is SOC2, GDPR and CCPA Compliant! | Huntress</title>
        <link>https://www.huntress.com/blog/huntress-is-soc2-gdpr-and-ccpa-compliant</link>
        <guid>https://www.huntress.com/blog/huntress-is-soc2-gdpr-and-ccpa-compliant</guid>
        <description>Huntress is SOC2, GDPR and CCPA Compliant. Read what this means for us—and for our partners.</description>
        <pubDate>2023-04-06T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F8ee80d57592d4952ae376ef180cd07e0" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F8ee80d57592d4952ae376ef180cd07e0"/>
      </item>
      <item>
        <title>Huntress Heads Into Q2 Serving More SMBs and 2 Million Endpoints | Huntress</title>
        <link>https://www.huntress.com/blog/huntress-heads-into-q2-serving-more-smbs-and-2-million-endpoints</link>
        <guid>https://www.huntress.com/blog/huntress-heads-into-q2-serving-more-smbs-and-2-million-endpoints</guid>
        <description>We&#39;re so excited to say we&#39;re now securing more than two million endpoints!</description>
        <pubDate>2023-04-04T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F9cfe762896b84b82b254106847158307" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F9cfe762896b84b82b254106847158307"/>
      </item>
      <item>
        <title>Contextualizing Events &amp; Enabling Defense: What 3CX Means | Huntress</title>
        <link>https://www.huntress.com/blog/contextualizing-events-enabling-defense-what-3cx-means</link>
        <guid>https://www.huntress.com/blog/contextualizing-events-enabling-defense-what-3cx-means</guid>
        <description>In this blog, we contextualize the events and talk about enabling defense from the 3CX compromise.</description>
        <pubDate>2023-03-31T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe0fc7299da514f0abbfe2da5a378bb1e" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe0fc7299da514f0abbfe2da5a378bb1e"/>
      </item>
      <item>
        <title>3CX VoIP Software Compromise &amp; Supply Chain Threats | Huntress</title>
        <link>https://www.huntress.com/blog/3cx-voip-software-compromise-supply-chain-threats</link>
        <guid>https://www.huntress.com/blog/3cx-voip-software-compromise-supply-chain-threats</guid>
        <description>The 3CX VoIP Desktop Application has been compromised to deliver malware via legitimate 3CX updates. Huntress has been investigating this incident and working to validate and assess the current supply chain threat to the security community.</description>
        <pubDate>2023-03-30T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Faa804d6290ce4d829d1e73da99a0c9d8" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Faa804d6290ce4d829d1e73da99a0c9d8"/>
      </item>
      <item>
        <title>Mid-Sized Businesses vs. The Threat Landscape in 2023 | Huntress</title>
        <link>https://www.huntress.com/blog/mid-sized-businesses-vs-the-threat-landscape-in-2023</link>
        <guid>https://www.huntress.com/blog/mid-sized-businesses-vs-the-threat-landscape-in-2023</guid>
        <description>A survey of mid-sized businesses revealed common cybersecurity vulnerabilities. Learn what they are and how to improve your security posture in 2023.</description>
        <pubDate>2023-03-28T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5f852aa02c324bf0bd08a62fe0d00b5a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5f852aa02c324bf0bd08a62fe0d00b5a"/>
      </item>
      <item>
        <title>macOS (Not)ifications | Huntress</title>
        <link>https://www.huntress.com/blog/macos-notifications</link>
        <guid>https://www.huntress.com/blog/macos-notifications</guid>
        <description>In this blog, we dive into macOS notifications—and the intentional design behind them.</description>
        <pubDate>2023-03-21T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fdad2aa8e61d7471fa23435ae3805477a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fdad2aa8e61d7471fa23435ae3805477a"/>
      </item>
      <item>
        <title>Everything We Know About CVE-2023-23397 | Huntress</title>
        <link>https://www.huntress.com/blog/everything-we-know-about-cve-2023-23397</link>
        <guid>https://www.huntress.com/blog/everything-we-know-about-cve-2023-23397</guid>
        <description>Huntress is tracking CVE-2023-23397, a 0-day that impacts Microsoft Outlook and requires no user interaction to expose user credential hashes.</description>
        <pubDate>2023-03-17T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F34c0ceb8b996430a8481741d22181131" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F34c0ceb8b996430a8481741d22181131"/>
      </item>
      <item>
        <title>Addressing Initial Access | Huntress</title>
        <link>https://www.huntress.com/blog/addressing-initial-access</link>
        <guid>https://www.huntress.com/blog/addressing-initial-access</guid>
        <description>Series of blog posts that share the breadth and depth of Huntress’ experience to assist others in reducing their attack surface, and inhibiting or even obviating cyber attacks.</description>
        <pubDate>2023-03-16T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fbe999d11243f4569929bf0e05f7d8b70" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fbe999d11243f4569929bf0e05f7d8b70"/>
      </item>
      <item>
        <title>Veeam Backup &amp; Replication CVE-2023-27532 Response | Huntress</title>
        <link>https://www.huntress.com/blog/veeam-backup-replication-cve-2023-27532-response</link>
        <guid>https://www.huntress.com/blog/veeam-backup-replication-cve-2023-27532-response</guid>
        <description>We cover CVE-2023-27532, a vulnerability in the Veeam Backup &amp; Replication component that allowed an unauthenticated user to retrieve host credentials.</description>
        <pubDate>2023-03-13T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe44ad7a45e8c479b945d118b1ea3e29f" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe44ad7a45e8c479b945d118b1ea3e29f"/>
      </item>
      <item>
        <title>How To Get Buy-In for an EDR Purchase</title>
        <link>https://www.huntress.com/blog/how-to-get-buy-in-for-an-edr-purchase</link>
        <guid>https://www.huntress.com/blog/how-to-get-buy-in-for-an-edr-purchase</guid>
        <description>EDR is a baseline for security controls these days. Learn which questions to ask and answers to give when seeking buy-in to add or replace an EDR in your security stack.</description>
        <pubDate>2023-03-07T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ff4a852a2844e42868764ba218ec34781" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ff4a852a2844e42868764ba218ec34781"/>
      </item>
      <item>
        <title>What Endpoint Detection and Response (EDR) Looks Like Under the Hood | Huntress</title>
        <link>https://www.huntress.com/blog/endpoint-detection-and-response-edr-under-the-hood</link>
        <guid>https://www.huntress.com/blog/endpoint-detection-and-response-edr-under-the-hood</guid>
        <description>We’re going to try to cut through the noise and shed some light on EDR to understand the variance, capability, and efficacy of EDR solutions in the market.</description>
        <pubDate>2023-02-23T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0d12559decfd47c78c8bda87635f9f07" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0d12559decfd47c78c8bda87635f9f07"/>
      </item>
      <item>
        <title>Built-in macOS Security Tools | Huntress</title>
        <link>https://www.huntress.com/blog/built-in-macos-security-tools</link>
        <guid>https://www.huntress.com/blog/built-in-macos-security-tools</guid>
        <description>We discuss some of our favorite and most interesting built-in macOS security tools.</description>
        <pubDate>2023-02-21T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F2fb7800ba33b4952a2a980beb9215cd5" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F2fb7800ba33b4952a2a980beb9215cd5"/>
      </item>
      <item>
        <title>Not All Managed Is Created Equally | Huntress</title>
        <link>https://www.huntress.com/blog/not-all-managed-is-created-equally</link>
        <guid>https://www.huntress.com/blog/not-all-managed-is-created-equally</guid>
        <description>A lot of companies use the word managed, leading to the idea that all solutions are the same when it comes to being managed; however, similar doesn’t mean the same.</description>
        <pubDate>2023-02-14T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F37deed8824234973836e7028a765614f" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F37deed8824234973836e7028a765614f"/>
      </item>
      <item>
        <title>Choosing the Right EDR: Managed vs. Unmanaged</title>
        <link>https://www.huntress.com/blog/choosing-the-right-edr-managed-vs-unmanaged</link>
        <guid>https://www.huntress.com/blog/choosing-the-right-edr-managed-vs-unmanaged</guid>
        <description>Your company needs an EDR solution, but where do you start? Do you need managed EDR or unmanaged EDR? Find out which is best for you in this blog.</description>
        <pubDate>2023-02-09T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0f83c3b196cc4d33a41fe3009a03032f" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0f83c3b196cc4d33a41fe3009a03032f"/>
      </item>
      <item>
        <title>Investigating Intrusions From Intriguing Exploits</title>
        <link>https://www.huntress.com/blog/investigating-intrusions-from-intriguing-exploits</link>
        <guid>https://www.huntress.com/blog/investigating-intrusions-from-intriguing-exploits</guid>
        <description>On 02 February 2023, an alert triggered in a Huntress-protected environment. We dive into triaging the threat in this blog.</description>
        <pubDate>2023-02-08T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fbe4643d6c1604a05aa07f6173798929d" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fbe4643d6c1604a05aa07f6173798929d"/>
      </item>
      <item>
        <title>Ave Maria and the Chambers of Warzone RAT | Huntress</title>
        <link>https://www.huntress.com/blog/ave-maria-and-the-chambers-of-warzone-rat</link>
        <guid>https://www.huntress.com/blog/ave-maria-and-the-chambers-of-warzone-rat</guid>
        <description>Helping analysts develop a better understanding of the elastic search syntax.</description>
        <pubDate>2023-01-31T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F46469630afee4a6c8931e7cf49d7e4c1" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F46469630afee4a6c8931e7cf49d7e4c1"/>
      </item>
      <item>
        <title>The Methods Behind a Huntress Managed Antivirus Investigation | Huntress</title>
        <link>https://www.huntress.com/blog/the-methods-behind-a-huntress-managed-antivirus-investigation</link>
        <guid>https://www.huntress.com/blog/the-methods-behind-a-huntress-managed-antivirus-investigation</guid>
        <description>In this blog, we’ll go on a short journey of how we dissected a vague Managed Antivirus alert and offer some ideas and methods for security analysts.</description>
        <pubDate>2023-01-19T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F4cfc4fc0dfaa4cdb9454fff460b282f0" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F4cfc4fc0dfaa4cdb9454fff460b282f0"/>
      </item>
      <item>
        <title>Why Having Backups Isn&#39;t Enough | Huntress</title>
        <link>https://www.huntress.com/blog/why-having-backups-isnt-enough</link>
        <guid>https://www.huntress.com/blog/why-having-backups-isnt-enough</guid>
        <description>Having backups is only one component of a solid business continuity and disaster recovery plan.</description>
        <pubDate>2023-01-17T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fdd5174b3b3614992933f27396ad22bed" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fdd5174b3b3614992933f27396ad22bed"/>
      </item>
      <item>
        <title>Insistence on Persistence | Huntress</title>
        <link>https://www.huntress.com/blog/insistence-on-persistence</link>
        <guid>https://www.huntress.com/blog/insistence-on-persistence</guid>
        <description>In this blog, we&#39;ll explore our new Mac agent, what we look for and why—and where we’re heading.</description>
        <pubDate>2023-01-10T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fdcb70cce029146a19a03ba9349b876fc" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fdcb70cce029146a19a03ba9349b876fc"/>
      </item>
      <item>
        <title>Managed Endpoint Detection and Response (EDR) in Action | Huntress</title>
        <link>https://www.huntress.com/blog/managed-endpoint-detection-and-response-edr-in-action</link>
        <guid>https://www.huntress.com/blog/managed-endpoint-detection-and-response-edr-in-action</guid>
        <description>In this blog, we expose how hackers go after the most vulnerable and critical aspects of an endpoint and how managed EDR can help stop attacks in their tracks.</description>
        <pubDate>2023-01-05T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fd4373882d2f8437caf2f09c6d502c04d" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fd4373882d2f8437caf2f09c6d502c04d"/>
      </item>
      <item>
        <title>Going the Distance: Cyber Predictions for 2023 | Huntress</title>
        <link>https://www.huntress.com/blog/going-the-distance-cyber-predictions-for-2023</link>
        <guid>https://www.huntress.com/blog/going-the-distance-cyber-predictions-for-2023</guid>
        <description>Two of Huntress’ heavy hitters John Hammond and Dray Agha lace up their gloves to join the good fight and add their predictions for 2023.</description>
        <pubDate>2023-01-03T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fd703e799fc8d40ccb86ac7c157896c78" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fd703e799fc8d40ccb86ac7c157896c78"/>
      </item>
      <item>
        <title>OWASSRF Explained: Analyzing the Microsoft Exchange RCE Vulnerability | Huntress</title>
        <link>https://www.huntress.com/blog/owassrf-explained-analyzing-the-microsoft-exchange-rce-vulnerability</link>
        <guid>https://www.huntress.com/blog/owassrf-explained-analyzing-the-microsoft-exchange-rce-vulnerability</guid>
        <description>Huntress&#39; analysis of a new exploit chain (called OWASSRF) that can lead to critical remote code execution on unpatched Exchange hosts.</description>
        <pubDate>2022-12-29T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5aaa40fdca1f4bd49ee65b03ceea71bc" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5aaa40fdca1f4bd49ee65b03ceea71bc"/>
      </item>
      <item>
        <title>Using Shodan Images to Hunt Down Ransomware Groups | Huntress</title>
        <link>https://www.huntress.com/blog/using-shodan-images-to-hunt-down-ransomware-groups</link>
        <guid>https://www.huntress.com/blog/using-shodan-images-to-hunt-down-ransomware-groups</guid>
        <description>In this blog, we’re going to focus on how Shodan helps us unveil some of the infrastructure that supports ransomware actors.</description>
        <pubDate>2022-12-20T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F8da8666985c44bc98939616f025ba856" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F8da8666985c44bc98939616f025ba856"/>
      </item>
      <item>
        <title>Overblown Claims of Vulnerabilities, Exploits, &amp; Severity | Huntress</title>
        <link>https://www.huntress.com/blog/clearing-the-air-overblown-claims-of-vulnerabilities-exploits-severity</link>
        <guid>https://www.huntress.com/blog/clearing-the-air-overblown-claims-of-vulnerabilities-exploits-severity</guid>
        <description>Our team has been tracking conversations surrounding ConnectWise Control vulnerabilities and alleged exploitation. We politely disagree with the threat and criticality presented by the security researcher.</description>
        <pubDate>2022-12-14T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb6d01f1c19644bda8ae743229ed3e418" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb6d01f1c19644bda8ae743229ed3e418"/>
      </item>
      <item>
        <title>The Value of Managed EDR for the Modern MSP | Huntress</title>
        <link>https://www.huntress.com/blog/the-value-of-managed-edr-for-the-modern-msp</link>
        <guid>https://www.huntress.com/blog/the-value-of-managed-edr-for-the-modern-msp</guid>
        <description>Our partners at Clear Guidance Partners experienced the value of our EDR capabilities in real-time, pitting them against an active ransomware attack.</description>
        <pubDate>2022-12-13T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F4aa245fc1b234acab0d8ac48d601fb89" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F4aa245fc1b234acab0d8ac48d601fb89"/>
      </item>
      <item>
        <title>Defense Evasion: Defenders Strike Back! | Huntress</title>
        <link>https://www.huntress.com/blog/defense-evasion-defenders-strike-back</link>
        <guid>https://www.huntress.com/blog/defense-evasion-defenders-strike-back</guid>
        <description>In the last blog of our defense evasion series, we&#39;ll cover granular advice for monitoring and detecting defense evasion.</description>
        <pubDate>2022-12-06T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7852660d92cf4be7bc134a5c27af7c2f" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7852660d92cf4be7bc134a5c27af7c2f"/>
      </item>
      <item>
        <title>Incident Response: A Choose Your Own Adventure Exercise</title>
        <link>https://www.huntress.com/blog/incident-response-choose-your-own-adventure-exercise</link>
        <guid>https://www.huntress.com/blog/incident-response-choose-your-own-adventure-exercise</guid>
        <description>Incident response is a lot like a choose your own adventure exercise. We cover the ground rules and talk about some incidents we’ve helped partners with.</description>
        <pubDate>2022-11-29T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F381c6599a6b14eabbd1b789cb73e3bf3" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F381c6599a6b14eabbd1b789cb73e3bf3"/>
      </item>
      <item>
        <title>Threat Advisory: Qakbot Activity Is Rising | Huntress</title>
        <link>https://www.huntress.com/blog/threat-advisory-qakbot-activity-is-rising</link>
        <guid>https://www.huntress.com/blog/threat-advisory-qakbot-activity-is-rising</guid>
        <description>We&#39;re seeing a rise in Qakbot activity. Here&#39;s what you need to know to keep your environments safe.</description>
        <pubDate>2022-11-22T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fa67efcdf9d624f5c99932fa25cb644e7" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fa67efcdf9d624f5c99932fa25cb644e7"/>
      </item>
      <item>
        <title>Tradecraft, Shenanigans and Spice: hack_it 2022 Recap | Huntress</title>
        <link>https://www.huntress.com/blog/tradecraft-shenanigans-and-spice-hack-it-2022-recap</link>
        <guid>https://www.huntress.com/blog/tradecraft-shenanigans-and-spice-hack-it-2022-recap</guid>
        <description>hack_it 2022 was jam-packed with hacker tradecraft, shady shenanigans, and—as always—a little spice. Check out our favorite moments and highlights!</description>
        <pubDate>2022-11-17T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb6c71f4dbb064459adb19ac1c256a8fb" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb6c71f4dbb064459adb19ac1c256a8fb"/>
      </item>
      <item>
        <title>Do You Have a Security Hygiene Checklist in Place?</title>
        <link>https://www.huntress.com/blog/do-you-have-a-security-hygiene-checklist-in-place</link>
        <guid>https://www.huntress.com/blog/do-you-have-a-security-hygiene-checklist-in-place</guid>
        <description>A strong security foundation is the cornerstone of any MSP’s success. Learn how to build this foundation—even if you&#39;re new to cybersecurity.</description>
        <pubDate>2022-11-15T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F514d5be47a094b23a276280f5dbb0a50" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F514d5be47a094b23a276280f5dbb0a50"/>
      </item>
      <item>
        <title>Creating macOS Ransomware | Huntress</title>
        <link>https://www.huntress.com/blog/creating-macos-ransomware</link>
        <guid>https://www.huntress.com/blog/creating-macos-ransomware</guid>
        <description>With the beta release of the Huntress macOS agent, we wanted to share some of the Apple-y stuff we’ve been up to behind the scenes.</description>
        <pubDate>2022-11-08T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fedbb71dd1616458aaad97a1bb56dcee6" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fedbb71dd1616458aaad97a1bb56dcee6"/>
      </item>
      <item>
        <title>macOS Support Is Here! | Huntress</title>
        <link>https://www.huntress.com/blog/macos-support-is-here</link>
        <guid>https://www.huntress.com/blog/macos-support-is-here</guid>
        <description>We&#39;re excited to announce the general availability of the Huntress macOS agent! And don&#39;t worry – Persistent Footholds are just the beginning.</description>
        <pubDate>2022-11-01T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fadd5dbf566bd43568bec29e4a49a5273" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fadd5dbf566bd43568bec29e4a49a5273"/>
      </item>
      <item>
        <title>ConnectWise/R1Soft Server Backup Manager Remote Code Execution &amp; Supply Chain Risks | Huntress</title>
        <link>https://www.huntress.com/blog/critical-vulnerability-disclosure-connectwise-r1soft-server-backup-manager-remote-code-execution-supply-chain-risks</link>
        <guid>https://www.huntress.com/blog/critical-vulnerability-disclosure-connectwise-r1soft-server-backup-manager-remote-code-execution-supply-chain-risks</guid>
        <description>Huntress has validated an initial report for an authentication bypass and sensitive file leak present in the Java framework “ZK”, used within the ConnectWise R1Soft software Server Backup Manager SE.</description>
        <pubDate>2022-10-31T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fd22cc6a1d3554987ab6fa69e6cfa4ba1" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fd22cc6a1d3554987ab6fa69e6cfa4ba1"/>
      </item>
      <item>
        <title>Huntress Myths and Misconceptions | Huntress</title>
        <link>https://www.huntress.com/blog/clearing-the-air-huntress-myths-and-misconceptions</link>
        <guid>https://www.huntress.com/blog/clearing-the-air-huntress-myths-and-misconceptions</guid>
        <description>We’ve been seeing some misinformation being spread around with regards to the Huntress technology stack/capabilities we possess today. We’re here to provide clarity.</description>
        <pubDate>2022-10-27T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fde2cdc62950049cdb6cb70d89ec280b0" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fde2cdc62950049cdb6cb70d89ec280b0"/>
      </item>
      <item>
        <title>Cybersecurity Basics: A Chat With Syncro | Huntress</title>
        <link>https://www.huntress.com/blog/a-cybersecurity-chat-with-syncro</link>
        <guid>https://www.huntress.com/blog/a-cybersecurity-chat-with-syncro</guid>
        <description>Read our webinar recap to learn what Henry Washburn of Huntress and Ian Alexander of Syncro outlined to help MSPs protect SMBs from cybersecurity threats.</description>
        <pubDate>2022-10-25T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F091bb2c6c77847d387775470d29dcbf1" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F091bb2c6c77847d387775470d29dcbf1"/>
      </item>
      <item>
        <title>Making Cybersecurity Accessible for Women | Huntress</title>
        <link>https://www.huntress.com/blog/making-cybersecurity-accessible-for-women</link>
        <guid>https://www.huntress.com/blog/making-cybersecurity-accessible-for-women</guid>
        <description>We’ve got a problem in cybersecurity that needs to be addressed—and it has to do with accessibility to women.</description>
        <pubDate>2022-10-18T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7e226bb763234b0396ac8c998c076f20" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7e226bb763234b0396ac8c998c076f20"/>
      </item>
      <item>
        <title>A Sneak Peek at hack_it 2022 | Huntress</title>
        <link>https://www.huntress.com/blog/a-sneak-peek-at-hack-it-2022</link>
        <guid>https://www.huntress.com/blog/a-sneak-peek-at-hack-it-2022</guid>
        <description>Our workshop dedicated to hacker tradecraft is back November 14-16. Mark your calendars, sign up today and don&#39;t forget your hacker hat!</description>
        <pubDate>2022-10-04T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F68b014fa1b414ba9b80ce48c7dbca09a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F68b014fa1b414ba9b80ce48c7dbca09a"/>
      </item>
      <item>
        <title>New 0-Day Vulnerabilities Found in Microsoft Exchange | Huntress</title>
        <link>https://www.huntress.com/blog/new-0-day-vulnerabilities-found-in-microsoft-exchange</link>
        <guid>https://www.huntress.com/blog/new-0-day-vulnerabilities-found-in-microsoft-exchange</guid>
        <description>The Huntress team is currently investigating new 0-day vulnerabilities in Microsoft Exchange servers, piggybacking on ProxyShell and ProxyLogon.</description>
        <pubDate>2022-09-29T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F69e5d025478f4a6eb039a5bfd32578a4" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F69e5d025478f4a6eb039a5bfd32578a4"/>
      </item>
      <item>
        <title>Bug Bounties for the 99%</title>
        <link>https://www.huntress.com/blog/bug-bounties-for-the-99</link>
        <guid>https://www.huntress.com/blog/bug-bounties-for-the-99</guid>
        <description>Bug bounty programs are everywhere for enterprise organizations. But where does that leave the 99%—those under-resourced small to mid-sized businesses?</description>
        <pubDate>2022-09-27T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fa1d4c95dfd5b4a95aa09c68af41dea2d" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fa1d4c95dfd5b4a95aa09c68af41dea2d"/>
      </item>
      <item>
        <title>Back to Basics: Protecting Your Endpoints With Managed EDR and ITDR</title>
        <link>https://www.huntress.com/blog/back-to-basics-protecting-your-endpoints-with-edr-and-mdr</link>
        <guid>https://www.huntress.com/blog/back-to-basics-protecting-your-endpoints-with-edr-and-mdr</guid>
        <description>Protecting your servers just isn’t enough to keep bad actors out. Protecting the workstation is often an overlooked but critical step to security.</description>
        <pubDate>2022-09-20T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7ba92afebe3847ba97c2b050cd3e1d6d" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7ba92afebe3847ba97c2b050cd3e1d6d"/>
      </item>
      <item>
        <title>Unraveling a Reverse Shell with Managed EDR | Huntress</title>
        <link>https://www.huntress.com/blog/unraveling-a-reverse-shell-with-process-insights</link>
        <guid>https://www.huntress.com/blog/unraveling-a-reverse-shell-with-process-insights</guid>
        <description>Read about our journey to unravel a PowerShell reverse shell—and how our Managed EDR feature tipped us off that something wasn’t right.</description>
        <pubDate>2022-09-13T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F463a9c60afd045efbc8bd62ff60a2e66" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F463a9c60afd045efbc8bd62ff60a2e66"/>
      </item>
      <item>
        <title>Evolving Endpoint Protection and the Next Iteration of Huntress</title>
        <link>https://www.huntress.com/blog/checking-the-edr-box-evolving-endpoint-protection-and-the-next-iteration-of-huntress</link>
        <guid>https://www.huntress.com/blog/checking-the-edr-box-evolving-endpoint-protection-and-the-next-iteration-of-huntress</guid>
        <description>Discover how Process Insights brings new managed EDR functionality to The Huntress Managed Security Platform to help you detect cyberattacks as they happen.</description>
        <pubDate>2022-08-30T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ff89d0a14f06048a0b9132573dd464520" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ff89d0a14f06048a0b9132573dd464520"/>
      </item>
      <item>
        <title>How Progressive Computing Combated a Large-Scale Cyberattack | Huntress</title>
        <link>https://www.huntress.com/blog/how-progressive-computing-combated-a-large-scale-cyberattack</link>
        <guid>https://www.huntress.com/blog/how-progressive-computing-combated-a-large-scale-cyberattack</guid>
        <description>Learn how Progressive Computing fought through a mass-scale attack and came out on the other side scarred, but wiser and stronger.</description>
        <pubDate>2022-08-23T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F867f921665164579b802913ca6b26b55" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F867f921665164579b802913ca6b26b55"/>
      </item>
      <item>
        <title>Gifting User Passwords to Adversaries With NPPSPY | Huntress</title>
        <link>https://www.huntress.com/blog/cleartext-shenanigans-gifting-user-passwords-to-adversaries-with-nppspy</link>
        <guid>https://www.huntress.com/blog/cleartext-shenanigans-gifting-user-passwords-to-adversaries-with-nppspy</guid>
        <description>We unravel an investigation that details one way threat actors are able to gather cleartext passwords via NPPSPY.</description>
        <pubDate>2022-08-16T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F03a9a263cfe64038a9a1389cf7762d4f" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F03a9a263cfe64038a9a1389cf7762d4f"/>
      </item>
      <item>
        <title>Don’t Get Schooled: How to Catch a Phish | Huntress</title>
        <link>https://www.huntress.com/blog/dont-get-schooled-how-to-catch-a-phish</link>
        <guid>https://www.huntress.com/blog/dont-get-schooled-how-to-catch-a-phish</guid>
        <description>This blog explores phishing and smishing, diving into how to analyze text messages for their validity and legitimacy.</description>
        <pubDate>2022-08-09T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe147cbdb4a0a4f00aa472de8857df05c" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe147cbdb4a0a4f00aa472de8857df05c"/>
      </item>
      <item>
        <title>Huntress’ Commitment to the Cybersecurity Community | Huntress</title>
        <link>https://www.huntress.com/blog/huntress-commitment-to-the-cybersecurity-community</link>
        <guid>https://www.huntress.com/blog/huntress-commitment-to-the-cybersecurity-community</guid>
        <description>We founded Huntress with a commitment to elevating the cybersecurity community as a guiding principle. Here are some of the ways we strive to make a difference.</description>
        <pubDate>2022-08-02T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fdede31c9d0ea4d61b187b989fd44a8a0" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fdede31c9d0ea4d61b187b989fd44a8a0"/>
      </item>
      <item>
        <title>Practical Tips for Conducting Digital Forensics Investigations | Huntress</title>
        <link>https://www.huntress.com/blog/practical-tips-for-conducting-digital-forensics-investigations</link>
        <guid>https://www.huntress.com/blog/practical-tips-for-conducting-digital-forensics-investigations</guid>
        <description>A digital forensics investigation can be tedious. Fortunately, there are some efficient ways that you can still achieve success as an investigator.</description>
        <pubDate>2022-07-26T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ff77778c9b6bf4e9394a117e928dc5a7f" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ff77778c9b6bf4e9394a117e928dc5a7f"/>
      </item>
      <item>
        <title>Behind the Scenes: Crushing Cybercriminals with MAV | Huntress</title>
        <link>https://www.huntress.com/blog/behind-the-scenes-crushing-cybercriminals-with-mav</link>
        <guid>https://www.huntress.com/blog/behind-the-scenes-crushing-cybercriminals-with-mav</guid>
        <description>This blog is a follow-up on our How to Crush Cybercriminals with Managed Antivirus webinar. We&#39;ll dive deeper through a threat analysis lens.</description>
        <pubDate>2022-07-21T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F546ebbf00682463fbe78617d032ad2f5" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F546ebbf00682463fbe78617d032ad2f5"/>
      </item>
      <item>
        <title>Putting the Dee(Dee) in Defense: Huntress Acquires Curricula | Huntress</title>
        <link>https://www.huntress.com/blog/putting-the-deedee-in-defense-huntress-acquires-curricula</link>
        <guid>https://www.huntress.com/blog/putting-the-deedee-in-defense-huntress-acquires-curricula</guid>
        <description>We&#39;re continuing to deliver on our promise to secure the 99% by acquiring Curricula: a story-based security awareness training platform.</description>
        <pubDate>2022-07-19T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fa82c776ef3ad421591bfc33fe297c6b2" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fa82c776ef3ad421591bfc33fe297c6b2"/>
      </item>
      <item>
        <title>Introducing the Huntress Neighborhood Watch Program | Huntress</title>
        <link>https://www.huntress.com/blog/introducing-the-huntress-neighborhood-watch-program</link>
        <guid>https://www.huntress.com/blog/introducing-the-huntress-neighborhood-watch-program</guid>
        <description>Learn about Huntress’ Neighborhood Watch Program: a collection of programs and resources designed to help elevate the broader security community.</description>
        <pubDate>2022-07-12T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0846b76d22b14796a54f182f251b7ebb" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0846b76d22b14796a54f182f251b7ebb"/>
      </item>
      <item>
        <title>Four Sneaky Attacker Evasion Techniques You Should Know About | Huntress</title>
        <link>https://www.huntress.com/blog/four-sneaky-attacker-evasion-techniques-you-should-know-about</link>
        <guid>https://www.huntress.com/blog/four-sneaky-attacker-evasion-techniques-you-should-know-about</guid>
        <description>Learn about four of the most prominent attacker evasion techniques that hackers use—and how you can defend your environments against them.</description>
        <pubDate>2022-07-05T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F01f3df01d41346bfa038f75cfd74ec67" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F01f3df01d41346bfa038f75cfd74ec67"/>
      </item>
      <item>
        <title>Fighting Log4Shell with Huntress Managed EDR | Huntress</title>
        <link>https://www.huntress.com/blog/all-in-a-days-work-fighting-log4shell-with-process-insights</link>
        <guid>https://www.huntress.com/blog/all-in-a-days-work-fighting-log4shell-with-process-insights</guid>
        <description>Read how our ThreatOps team used Huntress Managed EDR and Managed Antivirus to stop bad actors who were exploiting Log4Shell vulnerabilities.</description>
        <pubDate>2022-06-28T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F1821a1c036f849d0989e68c9231f585d" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F1821a1c036f849d0989e68c9231f585d"/>
      </item>
      <item>
        <title>Diversity in Security Awareness Training Content</title>
        <link>https://www.huntress.com/blog/diversity-in-security-awareness-training-content</link>
        <guid>https://www.huntress.com/blog/diversity-in-security-awareness-training-content</guid>
        <description>Enhance your organization&#39;s security posture with our Diversity Security Awareness Training content. Explore engaging modules designed to foster inclusivity while equipping your team with essential skills to identify and mitigate security threats.</description>
        <pubDate>2022-06-22T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>How to Crush Cybercriminals with Managed Antivirus | Huntress</title>
        <link>https://www.huntress.com/blog/how-to-crush-cybercriminals-with-managed-antivirus</link>
        <guid>https://www.huntress.com/blog/how-to-crush-cybercriminals-with-managed-antivirus</guid>
        <description>Dive into the types of threats we’ve thwarted with Managed Antivirus and how IT teams are seeing more value from making the switch.</description>
        <pubDate>2022-06-21T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F8df3ccb83aa54e018e75476f0326d779" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F8df3ccb83aa54e018e75476f0326d779"/>
      </item>
      <item>
        <title>Scaling To Protect the 99% | Huntress</title>
        <link>https://www.huntress.com/blog/scaling-to-protect-the-99</link>
        <guid>https://www.huntress.com/blog/scaling-to-protect-the-99</guid>
        <description>Learn about the latest platform changes and updates as Huntress continues to scale to protect the 99%.</description>
        <pubDate>2022-06-17T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F65872ed799514488b0c5287523afcf3b" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F65872ed799514488b0c5287523afcf3b"/>
      </item>
      <item>
        <title>Triangulation | Huntress</title>
        <link>https://www.huntress.com/blog/triangulation</link>
        <guid>https://www.huntress.com/blog/triangulation</guid>
        <description>This blog dives into triangulation as a guiding concept during investigations and reporting.</description>
        <pubDate>2022-06-14T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F767a1ac61c6a45b48fb456bf1bf32c25" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F767a1ac61c6a45b48fb456bf1bf32c25"/>
      </item>
      <item>
        <title>Recap: Navigating the NIST Cybersecurity Framework | Huntress</title>
        <link>https://www.huntress.com/blog/recap-navigating-the-nist-cybersecurity-framework</link>
        <guid>https://www.huntress.com/blog/recap-navigating-the-nist-cybersecurity-framework</guid>
        <description>If you follow the NIST cybersecurity framework, you&#39;ll ensure that your money is spent on the right areas to build an effective defense strategy.</description>
        <pubDate>2022-06-07T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F2ad580df1ff244f8bf2eaf93e9a568bb" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F2ad580df1ff244f8bf2eaf93e9a568bb"/>
      </item>
      <item>
        <title>Out of Sight, Top of Mind: Showing the Hidden Value of Cybersecurity | Huntress</title>
        <link>https://www.huntress.com/blog/out-of-sight-top-of-mind-showing-the-hidden-value-of-cybersecurity</link>
        <guid>https://www.huntress.com/blog/out-of-sight-top-of-mind-showing-the-hidden-value-of-cybersecurity</guid>
        <description>It can be difficult to demonstrate the value of cybersecurity when your stack is doing its job. Here is how you can show the hidden value of cybersecurity.</description>
        <pubDate>2022-05-31T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F8d44b7e1fe024895bc8205cc0caf6cdf" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F8d44b7e1fe024895bc8205cc0caf6cdf"/>
      </item>
      <item>
        <title>Rapid Response: Microsoft Office RCE - “Follina” MSDT Attack | Huntress</title>
        <link>https://www.huntress.com/blog/microsoft-office-remote-code-execution-follina-msdt-bug</link>
        <guid>https://www.huntress.com/blog/microsoft-office-remote-code-execution-follina-msdt-bug</guid>
        <description>A new attack vector enables hackers to more easily compromise users with malicious Microsoft Office documents.</description>
        <pubDate>2022-05-30T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F63bc16db8b0d4d94ab28499cbb537a68" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F63bc16db8b0d4d94ab28499cbb537a68"/>
      </item>
      <item>
        <title>The Mechanics of Defense Evasion | Huntress</title>
        <link>https://www.huntress.com/blog/the-mechanics-of-defense-evasion</link>
        <guid>https://www.huntress.com/blog/the-mechanics-of-defense-evasion</guid>
        <description>Continuing our blog series on defense evasion, this blog dives into some practical, real-world examples of defense evasion in action.</description>
        <pubDate>2022-05-24T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7541856186b84c68a5ff6024a12284dd" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7541856186b84c68a5ff6024a12284dd"/>
      </item>
      <item>
        <title>How Huntress Protects SMBs | Huntress</title>
        <link>https://www.huntress.com/blog/how-huntress-protects-smbs</link>
        <guid>https://www.huntress.com/blog/how-huntress-protects-smbs</guid>
        <description>Learn how The Huntress Managed Security Platform is built to equip SMBs with the ability to swiftly and accurately mitigate threats.</description>
        <pubDate>2022-05-17T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ff19b25cf6e7046d191ed143b8072afeb" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ff19b25cf6e7046d191ed143b8072afeb"/>
      </item>
      <item>
        <title>Huntress API Is Now in Public Beta!</title>
        <link>https://www.huntress.com/blog/huntress-api-is-now-in-public-beta</link>
        <guid>https://www.huntress.com/blog/huntress-api-is-now-in-public-beta</guid>
        <description>Read about our latest addition, API, and how it enables MSPs and IT administrators to monitor, manage and maintain their cybersecurity stack how they want.</description>
        <pubDate>2022-05-16T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F161b962824a24f4a8be7c630c4bfdabb" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F161b962824a24f4a8be7c630c4bfdabb"/>
      </item>
      <item>
        <title>Evicting the Adversary | Huntress</title>
        <link>https://www.huntress.com/blog/evicting-the-adversary</link>
        <guid>https://www.huntress.com/blog/evicting-the-adversary</guid>
        <description>This blog shows how to catch an adversary moving from machine to machine, how to terminate this movement and how to evict the adversary from your network.</description>
        <pubDate>2022-05-10T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F1ac3d2057e614668b20d567943c5ddb9" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F1ac3d2057e614668b20d567943c5ddb9"/>
      </item>
      <item>
        <title>One Year Later: Lessons Learned from the Colonial Pipeline Cyberattack | Huntress</title>
        <link>https://www.huntress.com/blog/one-year-later-lessons-learned-from-the-colonial-pipeline-cyberattack</link>
        <guid>https://www.huntress.com/blog/one-year-later-lessons-learned-from-the-colonial-pipeline-cyberattack</guid>
        <description>We recap some of the lessons we have learned over the past year thanks to the Colonial Pipeline attack.</description>
        <pubDate>2022-05-05T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5ee5e7b587b94607a7ddbee905434f5f" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5ee5e7b587b94607a7ddbee905434f5f"/>
      </item>
      <item>
        <title>What Is Defense Evasion? | Huntress</title>
        <link>https://www.huntress.com/blog/what-is-defense-evasion</link>
        <guid>https://www.huntress.com/blog/what-is-defense-evasion</guid>
        <description>An introduction to defense evasion as an attack tactic. Read on to explore what defense evasion is and why it’s important to understand how it’s used.</description>
        <pubDate>2022-05-03T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb9cb538d186745cebec6d423949f7ddf" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb9cb538d186745cebec6d423949f7ddf"/>
      </item>
      <item>
        <title>Bring Your Own Command &amp; Control (BYOC2)</title>
        <link>https://www.huntress.com/blog/bring-your-own-command-control-byoc2</link>
        <guid>https://www.huntress.com/blog/bring-your-own-command-control-byoc2</guid>
        <description>Sometimes hackers can be overly confident in their malware. Take a journey with us through a malware sample that contains no obfuscation whatsoever.</description>
        <pubDate>2022-04-26T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F06c436835520457facbf6697f6ada17c" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F06c436835520457facbf6697f6ada17c"/>
      </item>
      <item>
        <title>Breaking Down the NIST Cybersecurity Framework</title>
        <link>https://www.huntress.com/blog/breaking-down-the-nist-cybersecurity-framework</link>
        <guid>https://www.huntress.com/blog/breaking-down-the-nist-cybersecurity-framework</guid>
        <description>A comprehensive guide to the NIST cybersecurity framework, its five main functions and how you can use the NIST framework to improve your cybersecurity posture.</description>
        <pubDate>2022-04-14T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F45786cdd05b24c15a42af7c752538a1e" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F45786cdd05b24c15a42af7c752538a1e"/>
      </item>
      <item>
        <title>How Huntress Can Complement—Not Complicate—Your Security Stack | Huntress</title>
        <link>https://www.huntress.com/blog/how-huntress-can-complement-not-complicate-your-security-stack</link>
        <guid>https://www.huntress.com/blog/how-huntress-can-complement-not-complicate-your-security-stack</guid>
        <description>Learn why Huntress is built to complement—not complicate—our partners’ daily operations and deliver on our mission to secure the 99%.</description>
        <pubDate>2022-04-12T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0eafd0efce2a45dc9fb2ec8fc2fd3fd9" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0eafd0efce2a45dc9fb2ec8fc2fd3fd9"/>
      </item>
      <item>
        <title>Product Support the Huntress Way | Huntress</title>
        <link>https://www.huntress.com/blog/product-support-the-huntress-way</link>
        <guid>https://www.huntress.com/blog/product-support-the-huntress-way</guid>
        <description>We explore the third arm of our ThreatOps team—Support—and dive into how the team operates.</description>
        <pubDate>2022-04-05T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fce554b35a6cf4744ad6b9beba9ae8466" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fce554b35a6cf4744ad6b9beba9ae8466"/>
      </item>
      <item>
        <title>What’s Your Backup Plan? | Huntress</title>
        <link>https://www.huntress.com/blog/whats-your-backup-plan</link>
        <guid>https://www.huntress.com/blog/whats-your-backup-plan</guid>
        <description>This year for World Backup Day, we’ve asked our friends and backup/disaster recovery experts at Servosity to share their best “backup” tips.</description>
        <pubDate>2022-03-31T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fcd15e6490c1745daa772b1be1c30c74b" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fcd15e6490c1745daa772b1be1c30c74b"/>
      </item>
      <item>
        <title>A Day in the Life of a Security Researcher | Huntress</title>
        <link>https://www.huntress.com/blog/a-day-in-the-life-of-a-security-researcher</link>
        <guid>https://www.huntress.com/blog/a-day-in-the-life-of-a-security-researcher</guid>
        <description>Take a behind-the-scenes look at what our security researchers do in this Q&amp;A session.</description>
        <pubDate>2022-03-29T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0cc37fe3bb1845258e73879eca0a9000" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0cc37fe3bb1845258e73879eca0a9000"/>
      </item>
      <item>
        <title>A Day in the Life of a Threat Analyst | Huntress</title>
        <link>https://www.huntress.com/blog/a-day-in-the-life-of-a-threat-analyst</link>
        <guid>https://www.huntress.com/blog/a-day-in-the-life-of-a-threat-analyst</guid>
        <description>Hop behind the proverbial shoulders of one of our ThreatOps analysts and vicariously experience a day in his life.</description>
        <pubDate>2022-03-22T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F4829b23768064c6a92a161f856be6f2e" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F4829b23768064c6a92a161f856be6f2e"/>
      </item>
      <item>
        <title>What Is Endpoint Detection and Response? | Huntress</title>
        <link>https://www.huntress.com/blog/what-is-endpoint-detection-and-response</link>
        <guid>https://www.huntress.com/blog/what-is-endpoint-detection-and-response</guid>
        <description>What is endpoint detection and response (EDR) and why is it important? Dive into what EDR is, its history and what to look for in EDR solutions today.</description>
        <pubDate>2022-03-15T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F04e4427da6964d9494ca9fd0ab4d6f69" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F04e4427da6964d9494ca9fd0ab4d6f69"/>
      </item>
      <item>
        <title>Ending the Culture of Silence in Cybersecurity | Huntress</title>
        <link>https://www.huntress.com/blog/ending-the-culture-of-silence-in-cyber-security</link>
        <guid>https://www.huntress.com/blog/ending-the-culture-of-silence-in-cyber-security</guid>
        <description>Learn how to break the silence in cybersecurity culture and promote open communication to enhance your organization&#39;s security posture.</description>
        <pubDate>2022-03-14T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>An Inside Look at Huntress’ Platform Vision and Mission | Huntress</title>
        <link>https://www.huntress.com/blog/an-inside-look-at-huntress-platform-vision-and-mission</link>
        <guid>https://www.huntress.com/blog/an-inside-look-at-huntress-platform-vision-and-mission</guid>
        <description>In this blog, we get candid about our view of today’s security space. Plus, we share all the details on how and why we build security products the Huntress way.</description>
        <pubDate>2022-03-08T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0b5790fd3ef8411fa1b8ac558202387d" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0b5790fd3ef8411fa1b8ac558202387d"/>
      </item>
      <item>
        <title>Targeted APT Activity: BABYSHARK Is Out for Blood | Huntress</title>
        <link>https://www.huntress.com/blog/targeted-apt-activity-babyshark-is-out-for-blood</link>
        <guid>https://www.huntress.com/blog/targeted-apt-activity-babyshark-is-out-for-blood</guid>
        <description>We discovered malicious, targeted advanced persistent threat (APT) activity on a partner&#39;s system. Here, we dive into the BABYSHARK malware strain.</description>
        <pubDate>2022-03-01T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fd57bfd4fcc4b4b0f8685dcd9308d7d98" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fd57bfd4fcc4b4b0f8685dcd9308d7d98"/>
      </item>
      <item>
        <title>NERC CIP Cyber Security Awareness Program | Huntress</title>
        <link>https://www.huntress.com/blog/nerc-cip-cyber-security-awareness-program</link>
        <guid>https://www.huntress.com/blog/nerc-cip-cyber-security-awareness-program</guid>
        <description>CIP-004 R1 requires a NERC CIP Cyber Security Awareness Program for NERC entities. Low Impact Security Awareness Program requirement will also be discussed.</description>
        <pubDate>2022-02-22T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>Hackers No Hashing: Randomizing API Hashes to Evade Cobalt Strike Shellcode Detection</title>
        <link>https://www.huntress.com/blog/hackers-no-hashing-randomizing-api-hashes-to-evade-cobalt-strike-shellcode-detection</link>
        <guid>https://www.huntress.com/blog/hackers-no-hashing-randomizing-api-hashes-to-evade-cobalt-strike-shellcode-detection</guid>
        <description>Hackers could be outsmarting preventive tools by making trivial changes to default settings. We dive into our research in this blog.</description>
        <pubDate>2022-02-16T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F01b8bc30a8584736a5f685df0a4170eb" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F01b8bc30a8584736a5f685df0a4170eb"/>
      </item>
      <item>
        <title>Balancing the Scales of Cybersecurity and Insurance</title>
        <link>https://www.huntress.com/blog/balancing-the-scales-of-cybersecurity-and-insurance</link>
        <guid>https://www.huntress.com/blog/balancing-the-scales-of-cybersecurity-and-insurance</guid>
        <description>As the importance of cybersecurity insurance grows, we examine how insurance policies have influenced cybersecurity stacks and visa versa.</description>
        <pubDate>2022-02-09T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F505823b0d40344b49825d4def880b68c" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F505823b0d40344b49825d4def880b68c"/>
      </item>
      <item>
        <title>Leaving the Silo: MSP Vendors Give Back | Huntress</title>
        <link>https://www.huntress.com/blog/leaving-the-silo-msp-vendors-give-back</link>
        <guid>https://www.huntress.com/blog/leaving-the-silo-msp-vendors-give-back</guid>
        <description>Learn the latest about our initiative with the Dutch Institute for Vulnerability Disclosure and how you can get involved.</description>
        <pubDate>2022-02-03T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fca5a06da8450439c9797edd040124352" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fca5a06da8450439c9797edd040124352"/>
      </item>
      <item>
        <title>What Is Managed Detection and Response? | Huntress</title>
        <link>https://www.huntress.com/blog/what-is-managed-detection-and-response</link>
        <guid>https://www.huntress.com/blog/what-is-managed-detection-and-response</guid>
        <description>What is managed detection and response (MDR) and why is it so important? Dive into the benefits of MDR services and how it can address critical security gaps.</description>
        <pubDate>2022-02-01T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0beeb9f31d0e478f9ee5801e15008520" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0beeb9f31d0e478f9ee5801e15008520"/>
      </item>
      <item>
        <title>Threat Recap: Huntress Managed EDR Trial by Fire | Huntress</title>
        <link>https://www.huntress.com/blog/threat-recap-process-insights-trial-by-fire</link>
        <guid>https://www.huntress.com/blog/threat-recap-process-insights-trial-by-fire</guid>
        <description>See how Huntress Managed Endpoint Detection and Response (EDR) helped combat follow-on attacks against VMware Horizon servers in real-time.</description>
        <pubDate>2022-01-25T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F73a5098281284c26b06f8e2ae4fb416f" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F73a5098281284c26b06f8e2ae4fb416f"/>
      </item>
      <item>
        <title>A Journey Back to the World of MSP Security | Huntress</title>
        <link>https://www.huntress.com/blog/a-journey-back-to-the-world-of-msp-security</link>
        <guid>https://www.huntress.com/blog/a-journey-back-to-the-world-of-msp-security</guid>
        <description>Dima Kumets explains why he wanted to make his way back to the world of MSP security—and how he ended up as a Principal Product Manager at Huntress.</description>
        <pubDate>2022-01-20T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F329641c41db4473b8cd1bfb53e626ce9" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F329641c41db4473b8cd1bfb53e626ce9"/>
      </item>
      <item>
        <title>A Beginner’s Guide to Phishing Simulation Training for Employees | Huntress</title>
        <link>https://www.huntress.com/blog/a-beginners-guide-to-phishing-simulation-training-for-employees</link>
        <guid>https://www.huntress.com/blog/a-beginners-guide-to-phishing-simulation-training-for-employees</guid>
        <description>Learn the essentials of phishing simulation training with our beginner&#39;s guide. Protect your organization by simulating real phishing attacks.</description>
        <pubDate>2022-01-19T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>Hot Takes and Cyber Predictions for 2022 | Huntress</title>
        <link>https://www.huntress.com/blog/hot-takes-and-cyber-predictions-for-2022</link>
        <guid>https://www.huntress.com/blog/hot-takes-and-cyber-predictions-for-2022</guid>
        <description>What cybersecurity trends will we see in this new year? In this blog, we share some hot takes and predictions for 2022.</description>
        <pubDate>2022-01-18T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F1317262ee3e945e9b30686b7573db470" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F1317262ee3e945e9b30686b7573db470"/>
      </item>
      <item>
        <title>VMware Horizon Servers Actively Being Hit With Cobalt Strike | Huntress</title>
        <link>https://www.huntress.com/blog/cybersecurity-advisory-vmware-horizon-servers-actively-being-hit-with-cobalt-strike</link>
        <guid>https://www.huntress.com/blog/cybersecurity-advisory-vmware-horizon-servers-actively-being-hit-with-cobalt-strike</guid>
        <description>Huntress is monitoring an incident in which VMware Horizon Servers are being hit with Cobalt Strike. Read our up-to-date blog to learn more.</description>
        <pubDate>2022-01-15T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fa99817c251674d068bb89fd7f02b2a03" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fa99817c251674d068bb89fd7f02b2a03"/>
      </item>
      <item>
        <title>Ransomware Canaries: A 2022 Update | Huntress</title>
        <link>https://www.huntress.com/blog/ransomware-canaries-a-2022-update</link>
        <guid>https://www.huntress.com/blog/ransomware-canaries-a-2022-update</guid>
        <description>Read about the exciting new updates to our Ransomware Canaries service.</description>
        <pubDate>2022-01-14T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F4a12cddb27ca453ab12c9f161d1b8442" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F4a12cddb27ca453ab12c9f161d1b8442"/>
      </item>
      <item>
        <title>Huntress Donates $100,000 to DIVD Bug Bounty Program | Huntress</title>
        <link>https://www.huntress.com/blog/huntress-donates-100000-to-divd-bug-bounty-program</link>
        <guid>https://www.huntress.com/blog/huntress-donates-100000-to-divd-bug-bounty-program</guid>
        <description>We believe it’s time for MSP vendors to level up cybersecurity community efforts, so we’re taking the first step with a $100,000 contribution to DIVD.</description>
        <pubDate>2022-01-11T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fd5c387a7ea58405690c2008802781952" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fd5c387a7ea58405690c2008802781952"/>
      </item>
      <item>
        <title>2021 in Review (And Other Horror Stories) | Huntress</title>
        <link>https://www.huntress.com/blog/2021-in-review-and-other-horror-stories</link>
        <guid>https://www.huntress.com/blog/2021-in-review-and-other-horror-stories</guid>
        <description>We recap some of the cybersecurity trends and events in 2021 to prepare for the new year.</description>
        <pubDate>2022-01-05T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F456d32e1192e47438d899d0571b9d524" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F456d32e1192e47438d899d0571b9d524"/>
      </item>
      <item>
        <title>Making the Switch to Huntress Managed Microsoft Defender| Huntress</title>
        <link>https://www.huntress.com/blog/making-the-switch-to-huntress-managed-antivirus-partner-perspectives</link>
        <guid>https://www.huntress.com/blog/making-the-switch-to-huntress-managed-antivirus-partner-perspectives</guid>
        <description>Our partners at United Systems and F1 Solutions talk about their respective journeys with our Managed Microsoft Defender solution.</description>
        <pubDate>2021-12-21T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F6ce10465c2704040af32f19a5dee9890" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F6ce10465c2704040af32f19a5dee9890"/>
      </item>
      <item>
        <title>Texas HB 3834 Cyber Security Awareness Training Requirements | Huntress</title>
        <link>https://www.huntress.com/blog/texas-hb-3834-cyber-security-awareness-training-requirements</link>
        <guid>https://www.huntress.com/blog/texas-hb-3834-cyber-security-awareness-training-requirements</guid>
        <description>Here&#39;s how to meet the Texas HB 3834 compliance requirement for a cybersecurity awareness training program for all contractors and employees.</description>
        <pubDate>2021-12-20T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F3d7772c1dde3461a8d15286f6f5c276c" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F3d7772c1dde3461a8d15286f6f5c276c"/>
      </item>
      <item>
        <title>Log4Shell: A Tradecraft Tuesday Recap | Huntress</title>
        <link>https://www.huntress.com/blog/the-year-from-hell-plus-log4shell-a-tradecraft-tuesday-recap</link>
        <guid>https://www.huntress.com/blog/the-year-from-hell-plus-log4shell-a-tradecraft-tuesday-recap</guid>
        <description>We recap our December 2021 episode of Tradecraft Tuesday where we dive into the Log4Shell vulnerability.</description>
        <pubDate>2021-12-17T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0bb5bbe3e288447c8ac4273391316c36" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0bb5bbe3e288447c8ac4273391316c36"/>
      </item>
      <item>
        <title>Ditching FUD for FUN in Security Awareness Training | Huntress</title>
        <link>https://www.huntress.com/blog/ditching-fud-for-fun-in-security-awareness-training</link>
        <guid>https://www.huntress.com/blog/ditching-fud-for-fun-in-security-awareness-training</guid>
        <description>Learn how to make security awareness training enjoyable and effective by ditching fear, uncertainty, and doubt (FUD) in the Huntress Blog.</description>
        <pubDate>2021-12-14T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>Critical RCE Vulnerability: log4j - CVE-2021-44228 | Huntress</title>
        <link>https://www.huntress.com/blog/critical-rce-vulnerability-log4j-cve-2021-44228</link>
        <guid>https://www.huntress.com/blog/critical-rce-vulnerability-log4j-cve-2021-44228</guid>
        <description>Our team is currently investigating CVE-2021-44228, a critical vulnerability that’s affecting a Java logging package.</description>
        <pubDate>2021-12-10T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F91108c2237264e609bf2755e34e123b6" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F91108c2237264e609bf2755e34e123b6"/>
      </item>
      <item>
        <title>Critical RCE Vulnerability Updates (log4j - CVE-2021-44228) | Huntress</title>
        <link>https://www.huntress.com/blog/rapid-response-critical-rce-vulnerability-is-affecting-java</link>
        <guid>https://www.huntress.com/blog/rapid-response-critical-rce-vulnerability-is-affecting-java</guid>
        <description>Read about how our team investigated CVE-2021-44228, a critical vulnerability that was affecting a Java logging package.</description>
        <pubDate>2021-12-10T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>The True Value of the Huntress SOC Team | Huntress</title>
        <link>https://www.huntress.com/blog/dollars-and-sense-the-true-value-of-a-human-threatops-team</link>
        <guid>https://www.huntress.com/blog/dollars-and-sense-the-true-value-of-a-human-threatops-team</guid>
        <description>Automation is great—but when it comes to threat detection and analysis, it doesn’t replace the need for human expertise.</description>
        <pubDate>2021-12-07T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb6d9622bc14e4f95999d66c5e3c0adf1" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb6d9622bc14e4f95999d66c5e3c0adf1"/>
      </item>
      <item>
        <title>Is There a Right Way to Set Up Two-Factor Authentication? | Huntress</title>
        <link>https://www.huntress.com/blog/is-there-a-right-way-to-set-up-two-factor-authentication</link>
        <guid>https://www.huntress.com/blog/is-there-a-right-way-to-set-up-two-factor-authentication</guid>
        <description>In this blog, we aim to answer the question: how easy is it for hackers to circumvent two-factor authentication? We look at their tricks to learn the best way to set up 2FA.</description>
        <pubDate>2021-11-30T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F2aba0dbb68cb47e19951b645daad5f68" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F2aba0dbb68cb47e19951b645daad5f68"/>
      </item>
      <item>
        <title>Investigating Unauthorized Access: Huntress QA Environment Incident</title>
        <link>https://www.huntress.com/blog/investigating-unauthorized-access-huntress-qa-environment-incident</link>
        <guid>https://www.huntress.com/blog/investigating-unauthorized-access-huntress-qa-environment-incident</guid>
        <description>Learn about our investigation regarding unauthorized access to our QA and product testing environment.</description>
        <pubDate>2021-11-17T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ff92888b1c1bb484f95ab5c0b0afb62a3" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ff92888b1c1bb484f95ab5c0b0afb62a3"/>
      </item>
      <item>
        <title>How Ransomware Works and Why It&#39;s a Hacker Favorite | Huntress</title>
        <link>https://www.huntress.com/blog/how-ransomware-works-and-why-its-a-hacker-favorite</link>
        <guid>https://www.huntress.com/blog/how-ransomware-works-and-why-its-a-hacker-favorite</guid>
        <description>Ransomware marks a lucrative business in today’s cyber-driven world. Learn more about ransomware and why it’s a favorite among hackers.</description>
        <pubDate>2021-11-09T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5bca4289a99146caafa9593cd5c28fe6" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5bca4289a99146caafa9593cd5c28fe6"/>
      </item>
      <item>
        <title>Top Tips and Takeaways from hack_it 2021.2 | Huntress</title>
        <link>https://www.huntress.com/blog/top-tips-and-takeaways-from-hack-it-2021-2</link>
        <guid>https://www.huntress.com/blog/top-tips-and-takeaways-from-hack-it-2021-2</guid>
        <description>It’s amazing what you can learn by thinking like a hacker! We share our top tips and takeaways from our third hack_it security training event.</description>
        <pubDate>2021-11-02T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7eeafa95b504465eac99dea2b38063a0" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7eeafa95b504465eac99dea2b38063a0"/>
      </item>
      <item>
        <title>Vulnerabilities and Information Disclosure in MSP Survey Software | Huntress</title>
        <link>https://www.huntress.com/blog/vulnerabilities-and-information-disclosure-in-msp-survey-software</link>
        <guid>https://www.huntress.com/blog/vulnerabilities-and-information-disclosure-in-msp-survey-software</guid>
        <description>We discovered an information disclosure vulnerability in survey software designed for MSPs. We detail how we worked with the Crewhu team to responsibly disclose and remedy the vulnerability.</description>
        <pubDate>2021-10-28T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fd6347c771b9a48e3ba9ef6a303747dd6" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fd6347c771b9a48e3ba9ef6a303747dd6"/>
      </item>
      <item>
        <title>Evolving the Hunt: Host Isolation for Smarter Defense</title>
        <link>https://www.huntress.com/blog/evolving-the-hunt-host-isolation-for-smarter-defense</link>
        <guid>https://www.huntress.com/blog/evolving-the-hunt-host-isolation-for-smarter-defense</guid>
        <description>Learn about Host Isolation, a new feature that&#39;s just been added to The Huntress Security Platform.</description>
        <pubDate>2021-10-26T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F89269cd3d8e0469c9e645321a96f9d18" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F89269cd3d8e0469c9e645321a96f9d18"/>
      </item>
      <item>
        <title>Hackers Are Exploiting a Vulnerability in Billing Software to Deploy Ransomware | Huntress</title>
        <link>https://www.huntress.com/blog/threat-advisory-hackers-are-exploiting-a-vulnerability-in-popular-billing-software-to-deploy-ransomware</link>
        <guid>https://www.huntress.com/blog/threat-advisory-hackers-are-exploiting-a-vulnerability-in-popular-billing-software-to-deploy-ransomware</guid>
        <description>Huntress discovered threat actors abusing a blind SQL injection vulnerability in BillQuick Web Suite. Follow our analysis and latest findings in this blog.</description>
        <pubDate>2021-10-22T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc46565b0099e4975b93da8c2fe3743a3" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc46565b0099e4975b93da8c2fe3743a3"/>
      </item>
      <item>
        <title>New Faces and Features to Help You Evolve the Hunt | Huntress</title>
        <link>https://www.huntress.com/blog/new-faces-and-features-to-help-you-evolve-the-hunt</link>
        <guid>https://www.huntress.com/blog/new-faces-and-features-to-help-you-evolve-the-hunt</guid>
        <description>Learn about Huntress’ newest platform and service updates, including Managed Antivirus, Host Isolation and 24/7 ThreatOps coverage.</description>
        <pubDate>2021-10-12T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe08fbb5bf6ec4dcdb79eacc18aa0152d" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe08fbb5bf6ec4dcdb79eacc18aa0152d"/>
      </item>
      <item>
        <title>Managed Antivirus Is Here!</title>
        <link>https://www.huntress.com/blog/managed-antivirus-is-here</link>
        <guid>https://www.huntress.com/blog/managed-antivirus-is-here</guid>
        <description>After months of rigorous beta testing, we’re excited to announce the addition of our Managed Antivirus service to the Huntress Security Platform.</description>
        <pubDate>2021-10-06T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7c2d217a00ad49c08177cbf00d8c45d7" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7c2d217a00ad49c08177cbf00d8c45d7"/>
      </item>
      <item>
        <title>Top 4 Tips for Cybersecurity Awareness Month | Huntress</title>
        <link>https://www.huntress.com/blog/top-4-tips-for-cybersecurity-awareness-month</link>
        <guid>https://www.huntress.com/blog/top-4-tips-for-cybersecurity-awareness-month</guid>
        <description>In honor of National Cybersecurity Awareness Month, here are four critical tips to help you take both your cybersecurity hygiene and knowledge up a notch.</description>
        <pubDate>2021-10-05T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F87d3c21c1082407b916c65a6f5fe728c" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F87d3c21c1082407b916c65a6f5fe728c"/>
      </item>
      <item>
        <title>Free Training Tool for Unlocked Computers</title>
        <link>https://www.huntress.com/blog/free-training-tool-for-unlocked-computers</link>
        <guid>https://www.huntress.com/blog/free-training-tool-for-unlocked-computers</guid>
        <description>Teach employees not to leave computers unlocked with this tool by Huntress, the fun cyber security awareness training provider.</description>
        <pubDate>2021-10-04T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>Learn to Think Like a Hacker at hack_it 2021.2 | Huntress</title>
        <link>https://www.huntress.com/blog/learn-to-think-like-a-hacker-at-hack-it-2021-2</link>
        <guid>https://www.huntress.com/blog/learn-to-think-like-a-hacker-at-hack-it-2021-2</guid>
        <description>Do you have what it takes to hack_it? Read on for a sneak peek into our upcoming hack_it event and how it can help you better understand how hackers use their skills against you.</description>
        <pubDate>2021-09-29T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ffc8fc10861f245e8b4394eaa3806cd51" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ffc8fc10861f245e8b4394eaa3806cd51"/>
      </item>
      <item>
        <title>The Top Four CVEs Attackers Exploit | Huntress</title>
        <link>https://www.huntress.com/blog/the-top-four-cves-attackers-exploit</link>
        <guid>https://www.huntress.com/blog/the-top-four-cves-attackers-exploit</guid>
        <description>Learn about the top four Common Vulnerabilities and Exposures (CVEs) attackers are exploiting—and how you can defend against them.</description>
        <pubDate>2021-09-21T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5770483e38b843a283246dbac227ff5d" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5770483e38b843a283246dbac227ff5d"/>
      </item>
      <item>
        <title>Should We Be Playing Offense or Defense in Cybersecurity? | Huntress</title>
        <link>https://www.huntress.com/blog/should-we-be-playing-offense-or-defense-in-cybersecurity</link>
        <guid>https://www.huntress.com/blog/should-we-be-playing-offense-or-defense-in-cybersecurity</guid>
        <description>In this blog, we debate which is the best approach for IT professionals to beat hackers: offensive cybersecurity or defensive cybersecurity.</description>
        <pubDate>2021-09-14T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F6de25c69d2bf47bbb2acc87e96c9969f" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F6de25c69d2bf47bbb2acc87e96c9969f"/>
      </item>
      <item>
        <title>Threat Advisory: Hackers Are Exploiting CVE-2021-40444 | Huntress</title>
        <link>https://www.huntress.com/blog/cybersecurity-advisory-hackers-are-exploiting-cve-2021-40444</link>
        <guid>https://www.huntress.com/blog/cybersecurity-advisory-hackers-are-exploiting-cve-2021-40444</guid>
        <description>Huntress is monitoring a new threat against Windows OS and Microsoft Office products (CVE-2021-40444). The MSHTML engine is vulnerable to arbitrary code execution.</description>
        <pubDate>2021-09-09T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ffe430935b7884cc5a0c5a5768ea17d6b" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ffe430935b7884cc5a0c5a5768ea17d6b"/>
      </item>
      <item>
        <title>Malware Deep Dive: Investigating a Foothold and Uncovering the Payload</title>
        <link>https://www.huntress.com/blog/malware-deep-dive-investigating-a-foothold-and-uncovering-the-payload</link>
        <guid>https://www.huntress.com/blog/malware-deep-dive-investigating-a-foothold-and-uncovering-the-payload</guid>
        <description>In this blog, read along as we investigate a malicious foothold and decode the payload step by step.</description>
        <pubDate>2021-09-07T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7febd07cbf834a3b8bb3c6a70ecb8752" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7febd07cbf834a3b8bb3c6a70ecb8752"/>
      </item>
      <item>
        <title>ProxyShell vs. ProxyLogon: What&#39;s the Difference? | Huntress</title>
        <link>https://www.huntress.com/blog/proxyshell-vs-proxylogon-whats-the-difference</link>
        <guid>https://www.huntress.com/blog/proxyshell-vs-proxylogon-whats-the-difference</guid>
        <description>We clarify the differences between the ProxyShell (August 2021) and the ProxyLogon (March 2021) exploits impacting Microsoft Exchange on-premises servers.</description>
        <pubDate>2021-08-26T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fa969c9ad9df1481f85af7ca99543f07e" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fa969c9ad9df1481f85af7ca99543f07e"/>
      </item>
      <item>
        <title>Bullseye: A Story of a Targeted Cyberattack | Huntress</title>
        <link>https://www.huntress.com/blog/bullseye-a-story-of-a-targeted-cyberattack</link>
        <guid>https://www.huntress.com/blog/bullseye-a-story-of-a-targeted-cyberattack</guid>
        <description>Dive into a cyber threat analysis that details a sneaky enabler of a targeted cyberattack: persistence.</description>
        <pubDate>2021-08-24T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F8aa53e326b4b4d4ea58c02abc469a9fd" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F8aa53e326b4b4d4ea58c02abc469a9fd"/>
      </item>
      <item>
        <title>Microsoft Exchange Servers Still Vulnerable to ProxyShell Exploit | Huntress</title>
        <link>https://www.huntress.com/blog/rapid-response-microsoft-exchange-servers-still-vulnerable-to-proxyshell-exploit</link>
        <guid>https://www.huntress.com/blog/rapid-response-microsoft-exchange-servers-still-vulnerable-to-proxyshell-exploit</guid>
        <description>Attackers are scanning for vulnerable Microsoft Exchange servers and abusing the latest line of Exchange vulnerabilities that were patched in early 2021.</description>
        <pubDate>2021-08-19T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fd2e896e264cf4e768d44399a00b4b1fe" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fd2e896e264cf4e768d44399a00b4b1fe"/>
      </item>
      <item>
        <title>Snakes on a Domain: An Analysis of a Python Malware Loader | Huntress</title>
        <link>https://www.huntress.com/blog/snakes-on-a-domain-an-analysis-of-a-python-malware-loader</link>
        <guid>https://www.huntress.com/blog/snakes-on-a-domain-an-analysis-of-a-python-malware-loader</guid>
        <description>Join us on a threat analysis journey as we discover a very shady Python—and a very friendly RAT.</description>
        <pubDate>2021-08-17T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F4ac9b8939b2244ea9812e44f375a172a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F4ac9b8939b2244ea9812e44f375a172a"/>
      </item>
      <item>
        <title>A Brief Evolution of Hacker Tradecraft | Huntress</title>
        <link>https://www.huntress.com/blog/a-brief-evolution-of-hacker-tradecraft</link>
        <guid>https://www.huntress.com/blog/a-brief-evolution-of-hacker-tradecraft</guid>
        <description>What can we learn from studying cybercriminals? Here’s a brief history of how hackers are evolving their tradecraft and attack tactics.</description>
        <pubDate>2021-08-11T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fbd0d5bed6e5c4611bf6437801ff8a25b" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fbd0d5bed6e5c4611bf6437801ff8a25b"/>
      </item>
      <item>
        <title>Breaking Down the Cost of Cybersecurity | Huntress</title>
        <link>https://www.huntress.com/blog/breaking-down-the-cost-of-cybersecurity</link>
        <guid>https://www.huntress.com/blog/breaking-down-the-cost-of-cybersecurity</guid>
        <description>Learn about the costs of cybersecurity—and the risks of not having the right security stack—in this blog.</description>
        <pubDate>2021-08-05T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe92489e3e5cb4c46a3555ad8658d2e61" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe92489e3e5cb4c46a3555ad8658d2e61"/>
      </item>
      <item>
        <title>Lessons Learned During the Kaseya VSA Supply Chain Attack | Huntress</title>
        <link>https://www.huntress.com/blog/a-recap-of-events-and-lessons-learned-during-the-kaseya-vsa-supply-chain-attack</link>
        <guid>https://www.huntress.com/blog/a-recap-of-events-and-lessons-learned-during-the-kaseya-vsa-supply-chain-attack</guid>
        <description>The Huntress team recaps what happened during the Kaseya VSA supply chain attack—and what we can learn from it.</description>
        <pubDate>2021-07-28T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc045063552d34779a51f0d7c5cdcb184" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fc045063552d34779a51f0d7c5cdcb184"/>
      </item>
      <item>
        <title>The Age of Rapid-Response Managed Detection and Response | Huntress</title>
        <link>https://www.huntress.com/blog/the-age-of-rapid-response-managed-detection-and-response</link>
        <guid>https://www.huntress.com/blog/the-age-of-rapid-response-managed-detection-and-response</guid>
        <description>We teamed up with our partners at Magna5 to talk about providing real-time prevention, detection and response.</description>
        <pubDate>2021-07-26T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F2f835685dfd34ee996ba8ac6da323cbd" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F2f835685dfd34ee996ba8ac6da323cbd"/>
      </item>
      <item>
        <title>Why Persistence Is a Staple for Today’s Hackers | Huntress</title>
        <link>https://www.huntress.com/blog/why-persistence-is-a-staple-for-todays-hackers</link>
        <guid>https://www.huntress.com/blog/why-persistence-is-a-staple-for-todays-hackers</guid>
        <description>Learn how hackers use persistence to gain—and keep—access to your virtual environments.</description>
        <pubDate>2021-07-21T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F84933f9b8d504015879909c0fe82909f" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F84933f9b8d504015879909c0fe82909f"/>
      </item>
      <item>
        <title>The Hunt to Find Origins of Kaseya&#39;s VSA Mass Ransomware Incident | Huntress</title>
        <link>https://www.huntress.com/blog/security-researchers-hunt-to-discover-origins-of-the-kaseya-vsa-mass-ransomware-incident</link>
        <guid>https://www.huntress.com/blog/security-researchers-hunt-to-discover-origins-of-the-kaseya-vsa-mass-ransomware-incident</guid>
        <description>Our Security Researchers discuss how hackers executed the Kaseya VSA supply chain attack—and why the blast radius of the incident was relatively limited.</description>
        <pubDate>2021-07-20T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F98d045861dae4e53b6cb7afcb0362b35" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F98d045861dae4e53b6cb7afcb0362b35"/>
      </item>
      <item>
        <title>Experts Weigh in on the State of Email-Based Threats | Huntress</title>
        <link>https://www.huntress.com/blog/experts-weigh-in-on-the-state-of-email-based-threats</link>
        <guid>https://www.huntress.com/blog/experts-weigh-in-on-the-state-of-email-based-threats</guid>
        <description>Cybersecurity experts John Hammond and Sébastien Goutal provide insider insight on the current state of phishing, ransomware and email-based attacks.</description>
        <pubDate>2021-07-14T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fdbeb144eb4044d0988ee7df1af8a94f8" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fdbeb144eb4044d0988ee7df1af8a94f8"/>
      </item>
      <item>
        <title>Huntress VSA Vaccine: Acting Like Hackers To Protect Our Partners | Huntress</title>
        <link>https://www.huntress.com/blog/the-huntress-vsa-vaccine-acting-like-hackers-to-protect-our-partners</link>
        <guid>https://www.huntress.com/blog/the-huntress-vsa-vaccine-acting-like-hackers-to-protect-our-partners</guid>
        <description>In this blog, we share details on the vaccine Huntress deployed to our partners to protect them from being infected by the Kaseya VSA ransomware attack.</description>
        <pubDate>2021-07-13T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ff5599e42aa99454ba44ce3218c0475af" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ff5599e42aa99454ba44ce3218c0475af"/>
      </item>
      <item>
        <title>Rapid Response: Mass MSP Ransomware Incident | Huntress</title>
        <link>https://www.huntress.com/blog/rapid-response-kaseya-vsa-mass-msp-ransomware-incident</link>
        <guid>https://www.huntress.com/blog/rapid-response-kaseya-vsa-mass-msp-ransomware-incident</guid>
        <description>Huntress is tracking a critical ransomware incident affecting MSPs and their customers, caused by a sophisticated Kaseya VSA supply chain attack.</description>
        <pubDate>2021-07-03T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb349c5ba495d4ce1a2e8940da05c6184" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb349c5ba495d4ce1a2e8940da05c6184"/>
      </item>
      <item>
        <title>Critical Vuln.: PrintNightmare Exposes Windows Servers to RCE | Huntress</title>
        <link>https://www.huntress.com/blog/critical-vulnerability-printnightmare-exposes-windows-servers-to-remote-code-execution</link>
        <guid>https://www.huntress.com/blog/critical-vulnerability-printnightmare-exposes-windows-servers-to-remote-code-execution</guid>
        <description>Huntress is aware of PrintNightmare, a critical RCE and local privilege escalation vulnerability. This serious security flaw affects many Windows servers.</description>
        <pubDate>2021-06-30T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fd4cd47fec5ba4f9dbebb7b658c5b4449" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fd4cd47fec5ba4f9dbebb7b658c5b4449"/>
      </item>
      <item>
        <title>Reducing Cyber Risk and Liability with Managed Threat Detection | Huntress</title>
        <link>https://www.huntress.com/blog/reducing-cyber-risk-and-liability-with-managed-threat-detection</link>
        <guid>https://www.huntress.com/blog/reducing-cyber-risk-and-liability-with-managed-threat-detection</guid>
        <description>Providing cybersecurity services involves some risk and liability. Learn why managed detection and response could be the key to lowering your cyber risk.</description>
        <pubDate>2021-06-22T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe52dd9e514ed44a09c8588e6fab246ec" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe52dd9e514ed44a09c8588e6fab246ec"/>
      </item>
      <item>
        <title>ThreatOps Analysis: Keyed Malware | Huntress</title>
        <link>https://www.huntress.com/blog/threatops-analysis-keyed-malware</link>
        <guid>https://www.huntress.com/blog/threatops-analysis-keyed-malware</guid>
        <description>Dive into a threat analysis with us as we dissect a PowerShell command with an environmentally keyed malware payload.</description>
        <pubDate>2021-06-15T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F996e2e92cc54445d99081a4d45c27c96" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F996e2e92cc54445d99081a4d45c27c96"/>
      </item>
      <item>
        <title>Creating a Better Why for Cyber Security Awareness Training | Huntress</title>
        <link>https://www.huntress.com/blog/creating-a-better-why-for-cyber-security-awareness-training</link>
        <guid>https://www.huntress.com/blog/creating-a-better-why-for-cyber-security-awareness-training</guid>
        <description>Understand the importance of cybersecurity awareness training and how it can significantly reduce risks in your organization.</description>
        <pubDate>2021-06-15T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>How Are Hackers Sneaking Past Your Automated Systems? | Huntress</title>
        <link>https://www.huntress.com/blog/how-are-hackers-sneaking-past-your-automated-systems</link>
        <guid>https://www.huntress.com/blog/how-are-hackers-sneaking-past-your-automated-systems</guid>
        <description>Today’s hackers know how to outsmart automation and evade detection. Learn how managed threat detection and response can help you fight back.</description>
        <pubDate>2021-06-09T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F56a5dd3bf21e4a51a6ab4a95e25c1258" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F56a5dd3bf21e4a51a6ab4a95e25c1258"/>
      </item>
      <item>
        <title>Discovering a Ransomware Remedy in the Wild | Huntress</title>
        <link>https://www.huntress.com/blog/discovering-a-ransomware-remedy-in-the-wild</link>
        <guid>https://www.huntress.com/blog/discovering-a-ransomware-remedy-in-the-wild</guid>
        <description>Our ThreatOps team details stumbling across Raccine, a ransomware remedy that works by hooking onto IFEO debuggers, for the first time.</description>
        <pubDate>2021-06-08T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F94bb5b01c3ca4f6989200eb20883aaf7" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F94bb5b01c3ca4f6989200eb20883aaf7"/>
      </item>
      <item>
        <title>How a College Student Lost $10,000 to &quot;The IRS&quot; in an Apple Gift Card Scam | Huntress</title>
        <link>https://www.huntress.com/blog/how-a-college-student-lost-10-000-to-the-irs</link>
        <guid>https://www.huntress.com/blog/how-a-college-student-lost-10-000-to-the-irs</guid>
        <description>In this testimonial, learn firsthand from one of our Security Awareness Consultants at Curricula about how a fake IRS phishing scam worked on one student.</description>
        <pubDate>2021-06-03T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>Endpoint Protection: Promises vs. Reality | Huntress</title>
        <link>https://www.huntress.com/blog/endpoint-protection-promises-vs-reality</link>
        <guid>https://www.huntress.com/blog/endpoint-protection-promises-vs-reality</guid>
        <description>An in-depth look at the differences between AV, NGAV and EDR. We’ll explore the promises endpoint protection tools make vs. their ability to keep them.</description>
        <pubDate>2021-06-01T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe1029861c40043cc82c1904bbac07079" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe1029861c40043cc82c1904bbac07079"/>
      </item>
      <item>
        <title>Understanding Your SMB Clients&#39; Cybersecurity Needs</title>
        <link>https://www.huntress.com/blog/understanding-your-smb-clients-cybersecurity-needs</link>
        <guid>https://www.huntress.com/blog/understanding-your-smb-clients-cybersecurity-needs</guid>
        <description>SMBs need more advanced cybersecurity. Learn about the tools you need to help guide your clients toward better threat detection and response.</description>
        <pubDate>2021-05-27T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fef88f4ea71c5429ea44ba3570c9592ad" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fef88f4ea71c5429ea44ba3570c9592ad"/>
      </item>
      <item>
        <title>Cobalt Strikes Again: An Analysis of Obfuscated Malware | Huntress</title>
        <link>https://www.huntress.com/blog/cobalt-strike-analysis-of-obfuscated-malware</link>
        <guid>https://www.huntress.com/blog/cobalt-strike-analysis-of-obfuscated-malware</guid>
        <description>Join us for a threat hunting adventure as we analyze a suspicious run key that leads us to Cobalt Strike malware hidden across nearly 700 registry values.</description>
        <pubDate>2021-05-25T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F960a09d94f2949da8eb1ff1d3096189c" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F960a09d94f2949da8eb1ff1d3096189c"/>
      </item>
      <item>
        <title>Cyber Security Insurance Perspective on Ransomware | Huntress</title>
        <link>https://www.huntress.com/blog/cybersecurity-insurance-perspective-on-ransomware</link>
        <guid>https://www.huntress.com/blog/cybersecurity-insurance-perspective-on-ransomware</guid>
        <description>Explore the impact of ransomware on cybersecurity insurance. Learn how insurance providers are adapting and what organizations need to know to stay protected.</description>
        <pubDate>2021-05-25T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>7 Takeaways from the Executive Order on Improving Cybersecurity | Huntress</title>
        <link>https://www.huntress.com/blog/7-takeaways-from-the-34-page-executive-order-on-improving-the-nations-cybersecurity</link>
        <guid>https://www.huntress.com/blog/7-takeaways-from-the-34-page-executive-order-on-improving-the-nations-cybersecurity</guid>
        <description>President Biden signed a 34-page Executive Order aimed at strengthening the nation’s cybersecurity standards. Here are the top seven takeaways.</description>
        <pubDate>2021-05-18T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F2548fc74c0374b448316f7bf1c91129c?format=webp" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F2548fc74c0374b448316f7bf1c91129c?format=webp"/>
      </item>
      <item>
        <title>What’s the Real Cost of Cybersecurity for Your SMB Clients? | Huntress</title>
        <link>https://www.huntress.com/blog/whats-the-real-cost-of-cybersecurity-for-your-smb-clients</link>
        <guid>https://www.huntress.com/blog/whats-the-real-cost-of-cybersecurity-for-your-smb-clients</guid>
        <description>As hackers get smarter, you must evolve your approach to threat detection and response. Learn how to protect your clients with threat intelligence tools.</description>
        <pubDate>2021-05-12T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F273f12d219ba42ea99364f11ee801896" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F273f12d219ba42ea99364f11ee801896"/>
      </item>
      <item>
        <title>Huntress Series B: Our Next Chapter of Growth</title>
        <link>https://www.huntress.com/blog/huntress-series-b-our-next-chapter-of-growth</link>
        <guid>https://www.huntress.com/blog/huntress-series-b-our-next-chapter-of-growth</guid>
        <description>We’ve been focused on expanding our platform and helping you better protect your customers. And we’re just getting started.</description>
        <pubDate>2021-05-06T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F9f64df638d174b79aa56ddbc1426d6d1" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F9f64df638d174b79aa56ddbc1426d6d1"/>
      </item>
      <item>
        <title>From PowerShell to Payload: An Analysis of Weaponized Malware | Huntress</title>
        <link>https://www.huntress.com/blog/from-powershell-to-payload-an-analysis-of-weaponized-malware</link>
        <guid>https://www.huntress.com/blog/from-powershell-to-payload-an-analysis-of-weaponized-malware</guid>
        <description>In this blog, we look at some malicious PowerShell code breadcrumbs that one hacker left behind to unravel how they maintained access during a cyberattack.</description>
        <pubDate>2021-05-04T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5d4b34efab7b4ea7af4de32ca47f5baf" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5d4b34efab7b4ea7af4de32ca47f5baf"/>
      </item>
      <item>
        <title>Scale Your Security Operations with Confidence | Huntress</title>
        <link>https://www.huntress.com/blog/scale-your-security-operations-with-confidence</link>
        <guid>https://www.huntress.com/blog/scale-your-security-operations-with-confidence</guid>
        <description>Are you ready to scale your MSP or SMB? Level up your threat detection and response so you can focus on what&#39;s important: your business.</description>
        <pubDate>2021-04-29T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fbf6f747fe29644cf8cafb29dd70e8890" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fbf6f747fe29644cf8cafb29dd70e8890"/>
      </item>
      <item>
        <title>Emerging Cybersecurity Trends That May Impact Your SMB Clients | Huntress</title>
        <link>https://www.huntress.com/blog/emerging-cybersecurity-trends-that-may-impact-your-smb-clients</link>
        <guid>https://www.huntress.com/blog/emerging-cybersecurity-trends-that-may-impact-your-smb-clients</guid>
        <description>Keep your MSP armed and ready for attacks, hacks and data breaches with the latest trends in cybersecurity.</description>
        <pubDate>2021-04-13T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F165606e8653548c1a8ca9219c8e6df66" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F165606e8653548c1a8ca9219c8e6df66"/>
      </item>
      <item>
        <title>What Is a Persistent Foothold? | Huntress</title>
        <link>https://www.huntress.com/blog/what-is-a-persistent-foothold</link>
        <guid>https://www.huntress.com/blog/what-is-a-persistent-foothold</guid>
        <description>We hunt for persistent footholds, but what exactly does that mean? In this blog, we define what a foothold is and why it&#39;s a hacker favorite.</description>
        <pubDate>2021-04-06T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F6d005359ad844cebbe85cb1e526dcb71" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F6d005359ad844cebbe85cb1e526dcb71"/>
      </item>
      <item>
        <title>Top Takeaways from hack_it 2021 | Huntress</title>
        <link>https://www.huntress.com/blog/top-takeaways-from-hack-it-2021</link>
        <guid>https://www.huntress.com/blog/top-takeaways-from-hack-it-2021</guid>
        <description>A recap of hack_it 2021, a virtual security training event packed with interactive exercises, malware analysis, hacking workshops and more.</description>
        <pubDate>2021-03-31T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0c7b8822e0fc4a41a2ec8b4b4f23235d" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F0c7b8822e0fc4a41a2ec8b4b4f23235d"/>
      </item>
      <item>
        <title>How Hackers Exploit Windows Administrative Shares</title>
        <link>https://www.huntress.com/blog/how-hackers-exploit-windows-administrative-shares</link>
        <guid>https://www.huntress.com/blog/how-hackers-exploit-windows-administrative-shares</guid>
        <description>Windows&#39; administrative shares feature is often overlooked by users, but not by hackers. Learn how attackers abuse administrative shares to propagate.</description>
        <pubDate>2021-03-23T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F9d76cc7b720d43fdbf026114326bfdc9" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F9d76cc7b720d43fdbf026114326bfdc9"/>
      </item>
      <item>
        <title>Abusing Ngrok: Hackers at the End of the Tunnel | Huntress</title>
        <link>https://www.huntress.com/blog/abusing-ngrok-hackers-at-the-end-of-the-tunnel</link>
        <guid>https://www.huntress.com/blog/abusing-ngrok-hackers-at-the-end-of-the-tunnel</guid>
        <description>At the end of this tunnel, we find some shady hackers using ngrok to gain remote control access to victim networks.</description>
        <pubDate>2021-03-16T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fbb13cb3423dc40acbf0d80449661c086" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fbb13cb3423dc40acbf0d80449661c086"/>
      </item>
      <item>
        <title>Peeling Back the Layers of .NET Malware</title>
        <link>https://www.huntress.com/blog/peeling-back-the-layers-of-net-malware</link>
        <guid>https://www.huntress.com/blog/peeling-back-the-layers-of-net-malware</guid>
        <description>Hackers always try to cover up their tracks. In this blog, we step through layers of obfuscation to uncover the real intent of a .NET malware sample.</description>
        <pubDate>2021-03-09T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fdb0cdcc933c94561a9c659e74c616df9" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fdb0cdcc933c94561a9c659e74c616df9"/>
      </item>
      <item>
        <title>Rapid Response: Mass Exploitation of On-Prem Exchange Servers | Huntress</title>
        <link>https://www.huntress.com/blog/rapid-response-mass-exploitation-of-on-prem-exchange-servers</link>
        <guid>https://www.huntress.com/blog/rapid-response-mass-exploitation-of-on-prem-exchange-servers</guid>
        <description>On-prem Microsoft Exchange Server vulnerabilities are being actively exploited in the wild. Read our blog for Huntress&#39; most up-to-date research and IOCs.</description>
        <pubDate>2021-03-03T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5f72fc19364d499e86d858b6ee59c43d" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5f72fc19364d499e86d858b6ee59c43d"/>
      </item>
      <item>
        <title>What Is Human-Powered Threat Hunting? | Huntress</title>
        <link>https://www.huntress.com/blog/what-is-human-powered-threat-hunting</link>
        <guid>https://www.huntress.com/blog/what-is-human-powered-threat-hunting</guid>
        <description>In this blog, we define what threat hunting is, the differences between human analysis and automation, plus an example of human-powered threat hunting.</description>
        <pubDate>2021-03-02T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb9614303698d4068adc887ef806823b0" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb9614303698d4068adc887ef806823b0"/>
      </item>
      <item>
        <title>Zero-Day Vulnerabilities in Platforms Could Leave MSPs Exposed | Huntress</title>
        <link>https://www.huntress.com/blog/zero-day-vulnerabilities-in-popular-event-management-platforms-could-leave-msps-open-to-attack</link>
        <guid>https://www.huntress.com/blog/zero-day-vulnerabilities-in-popular-event-management-platforms-could-leave-msps-open-to-attack</guid>
        <description>We unveil zero-day vulnerabilities we discovered in virtual event platforms used in MSP/Fortune 500 communities, plus some insight on supply chain attacks.</description>
        <pubDate>2021-02-23T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fdc67d2546846404589a75a6fea103488" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fdc67d2546846404589a75a6fea103488"/>
      </item>
      <item>
        <title>Cybersecurity Education Is the Key to Outsmarting Hackers | Huntress</title>
        <link>https://www.huntress.com/blog/cybersecurity-education-the-key-to-outsmarting-hackers</link>
        <guid>https://www.huntress.com/blog/cybersecurity-education-the-key-to-outsmarting-hackers</guid>
        <description>In cybersecurity, education and training are the key to winning. Read our blog to learn how you can grow your skills through continuous security education.</description>
        <pubDate>2021-02-16T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe5e08fc0835b4219a66237b256b6e371" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe5e08fc0835b4219a66237b256b6e371"/>
      </item>
      <item>
        <title>Malware Deep Dive: Examining A PowerShell Payload | Huntress</title>
        <link>https://www.huntress.com/blog/malware-deep-dive-examining-a-powershell-payload</link>
        <guid>https://www.huntress.com/blog/malware-deep-dive-examining-a-powershell-payload</guid>
        <description>To avoid detection, hackers often turn a system’s own tools against itself. Here, we examine a malicious payload that was executed using PowerShell.</description>
        <pubDate>2021-02-09T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F3cdf4ec7e2bb4aba9e8fc6996861b13e" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F3cdf4ec7e2bb4aba9e8fc6996861b13e"/>
      </item>
      <item>
        <title>Huntress Service: Managed Antivirus | Huntress</title>
        <link>https://www.huntress.com/blog/huntress-service-managed-antivirus</link>
        <guid>https://www.huntress.com/blog/huntress-service-managed-antivirus</guid>
        <description>Read about Huntress’ Managed Antivirus service and how it enables MSPs and IT admins to strengthen endpoint protection and rebalance their cyber stack.</description>
        <pubDate>2021-01-26T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb9b96fa2092a4d65be66f986ba9be32b" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb9b96fa2092a4d65be66f986ba9be32b"/>
      </item>
      <item>
        <title>Why Microsoft Defender Antivirus Is Worth Another Look | Huntress</title>
        <link>https://www.huntress.com/blog/why-microsoft-defender-antivirus-is-worth-another-look</link>
        <guid>https://www.huntress.com/blog/why-microsoft-defender-antivirus-is-worth-another-look</guid>
        <description>Microsoft Defender Antivirus is among one of the leading antivirus contenders. Here’s why it’s worth taking another look at Defender AV.</description>
        <pubDate>2021-01-19T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fcf66200503c0436d90b71456b8617b34" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fcf66200503c0436d90b71456b8617b34"/>
      </item>
      <item>
        <title>Malware Under The Microscope: Manual Analysis</title>
        <link>https://www.huntress.com/blog/malware-under-the-microscope-manual-analysis</link>
        <guid>https://www.huntress.com/blog/malware-under-the-microscope-manual-analysis</guid>
        <description>Learn manual malware analysis techniques used by threat researchers. Explore static &amp; dynamic analysis, reverse engineering tools, and real-world investigation methods.</description>
        <pubDate>2021-01-12T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F24d82fabe95b4b4799cd900a4e0982dd" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F24d82fabe95b4b4799cd900a4e0982dd"/>
      </item>
      <item>
        <title>Redefining Beta | Huntress</title>
        <link>https://www.huntress.com/blog/redefining-beta</link>
        <guid>https://www.huntress.com/blog/redefining-beta</guid>
        <description>At Huntress, beta means learning. Our goal is to accelerate and streamline security defense, which means releasing what we’re working on often.</description>
        <pubDate>2020-12-29T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F2d410a4fd8c04b6ba31fc3a2d9cd0432" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F2d410a4fd8c04b6ba31fc3a2d9cd0432"/>
      </item>
      <item>
        <title>Top Hacker Tradecraft That Caught Our Eye in 2020 | Huntress</title>
        <link>https://www.huntress.com/blog/top-hacker-tradecraft-that-caught-our-eye-in-2020</link>
        <guid>https://www.huntress.com/blog/top-hacker-tradecraft-that-caught-our-eye-in-2020</guid>
        <description>We take a look back at some of the more interesting — and innovative — hacker tradecraft we saw over the course of 2020.</description>
        <pubDate>2020-12-22T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb9f44cab0c3c49fbb00bd14e878bbb01" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fb9f44cab0c3c49fbb00bd14e878bbb01"/>
      </item>
      <item>
        <title>Annual Security Awareness Training is a Waste of Time | Huntress</title>
        <link>https://www.huntress.com/blog/annual-security-awareness-training-is-a-waste-of-time</link>
        <guid>https://www.huntress.com/blog/annual-security-awareness-training-is-a-waste-of-time</guid>
        <description>Annual security awareness training is a waste of time. We discuss why an ongoing security awareness program is required to protect against cyber threats.</description>
        <pubDate>2020-12-17T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>Supply Chain Exploitation of SolarWinds Orion Software | Huntress</title>
        <link>https://www.huntress.com/blog/rapid-response-supply-chain-exploitation-of-solarwinds-orion-software</link>
        <guid>https://www.huntress.com/blog/rapid-response-supply-chain-exploitation-of-solarwinds-orion-software</guid>
        <description>Huntress covers the breaking news about Solarwinds’ Orion platform being exploited as part of a coordinated attack to distribute malware.</description>
        <pubDate>2020-12-14T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fbee8a84e27144190bb90164c45557131" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fbee8a84e27144190bb90164c45557131"/>
      </item>
      <item>
        <title>Rapid Response: TrickBoot | Huntress</title>
        <link>https://www.huntress.com/blog/rapid-response-trickboot</link>
        <guid>https://www.huntress.com/blog/rapid-response-trickboot</guid>
        <description>TrickBot has unleashed yet another module in its growing arsenal specifically targeting firmware vulnerabilities, named TrickBoot.</description>
        <pubDate>2020-12-02T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5fc5006066384985bd32d05bd23f6f3c" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5fc5006066384985bd32d05bd23f6f3c"/>
      </item>
      <item>
        <title>I Have a Lot to be Thankful for in 2020</title>
        <link>https://www.huntress.com/blog/i-have-a-lot-to-be-thankful-for-in-2020</link>
        <guid>https://www.huntress.com/blog/i-have-a-lot-to-be-thankful-for-in-2020</guid>
        <description>Huntress CEO Kyle Hanslovan has a lot to be thankful for in 2020 — and it starts with the MSP community.</description>
        <pubDate>2020-11-27T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5f5327190d6046f6af4235d6ab5a9476" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5f5327190d6046f6af4235d6ab5a9476"/>
      </item>
      <item>
        <title>Tried and True Hacker Technique: DOS Obfuscation | Huntress</title>
        <link>https://www.huntress.com/blog/tried-and-true-hacker-technique-dos-obfuscation</link>
        <guid>https://www.huntress.com/blog/tried-and-true-hacker-technique-dos-obfuscation</guid>
        <description>In this blog, we dissect a sample of malware that makes clever use of batch scripting obfuscation—turns out it was a launcher for TrickBot!</description>
        <pubDate>2020-11-24T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F854168fbaf54461c99408617734f4277" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F854168fbaf54461c99408617734f4277"/>
      </item>
      <item>
        <title>Huntress Service: Partner Enablement | Huntress</title>
        <link>https://www.huntress.com/blog/huntress-service-partner-enablement</link>
        <guid>https://www.huntress.com/blog/huntress-service-partner-enablement</guid>
        <description>Even the best cybersecurity tools won’t configure and sell themselves. That&#39;s why we&#39;re thrilled to introduce a new Huntress service: Partner Enablement!</description>
        <pubDate>2020-11-18T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5169c3a51f8f45c2ae77ae2a39ff2942" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5169c3a51f8f45c2ae77ae2a39ff2942"/>
      </item>
      <item>
        <title>Cybersecurity Lessons We Learned from hack_it 2020 | Huntress</title>
        <link>https://www.huntress.com/blog/cybersecurity-lessons-we-learned-from-hack-it-2020</link>
        <guid>https://www.huntress.com/blog/cybersecurity-lessons-we-learned-from-hack-it-2020</guid>
        <description>A recap of hack_it 2020, a virtual security training event packed with interactive exercises, malware research and analysis, and more.</description>
        <pubDate>2020-10-22T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fa42298028947452fa34f980772b01261" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fa42298028947452fa34f980772b01261"/>
      </item>
      <item>
        <title>Phishing, Office 365 and the Commercialization of Cybercrime | Huntress</title>
        <link>https://www.huntress.com/blog/phishing-office-365-and-the-commercialization-of-cybercrime</link>
        <guid>https://www.huntress.com/blog/phishing-office-365-and-the-commercialization-of-cybercrime</guid>
        <description>Hackers getting better at their tradecraft and their skills are becoming more and more accessible to other bad actors via the Dark Web.</description>
        <pubDate>2020-09-17T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ffaed8665161842f19143ca5971817b0f" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Ffaed8665161842f19143ca5971817b0f"/>
      </item>
      <item>
        <title>Hiding in Plain Sight: Part 2</title>
        <link>https://www.huntress.com/blog/hiding-in-plain-sight-part-2</link>
        <guid>https://www.huntress.com/blog/hiding-in-plain-sight-part-2</guid>
        <description>As a follow-up to our previous post, we recently uncovered a really peculiar piece of malware that works through a lot of different layers of abstraction.</description>
        <pubDate>2020-08-20T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F93234bc2860f48c185aaa73a8aac7943" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F93234bc2860f48c185aaa73a8aac7943"/>
      </item>
      <item>
        <title>Huntress Service: External Recon | Huntress</title>
        <link>https://www.huntress.com/blog/huntress-service-external-recon</link>
        <guid>https://www.huntress.com/blog/huntress-service-external-recon</guid>
        <description>Read about the value of Huntress&#39; External Recon service, which highlights open ports and services that are exposed to the Internet.</description>
        <pubDate>2020-07-21T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5fc49679466b454298280672fb4f1881" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F5fc49679466b454298280672fb4f1881"/>
      </item>
      <item>
        <title>Huntress Service: Ransomware Canaries | Huntress</title>
        <link>https://www.huntress.com/blog/huntress-service-ransomware-canaries</link>
        <guid>https://www.huntress.com/blog/huntress-service-ransomware-canaries</guid>
        <description>Read about the value of Huntress&#39; Ransomware Canaries service, a mechanism to deliver faster detection of a ransomware incident.</description>
        <pubDate>2020-06-24T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F1bac294133a345aab761e105ec67766c" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F1bac294133a345aab761e105ec67766c"/>
      </item>
      <item>
        <title>Evolving the Hunt</title>
        <link>https://www.huntress.com/blog/evolving-the-hunt</link>
        <guid>https://www.huntress.com/blog/evolving-the-hunt</guid>
        <description>At Huntress, our goal is not only to chase after changing threats but to remove obstacles that get in the way of new security innovation.</description>
        <pubDate>2020-06-22T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7aba036c9c7249828e94a88d5d3f3ba9" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F7aba036c9c7249828e94a88d5d3f3ba9"/>
      </item>
      <item>
        <title>Hiding In Plain Sight | Huntress</title>
        <link>https://www.huntress.com/blog/hiding-in-plain-sight</link>
        <guid>https://www.huntress.com/blog/hiding-in-plain-sight</guid>
        <description>There’s no end to the stealthy ways in which attackers develop and execute their tradecraft. In this case, it&#39;s as simple as hiding in plain sight.</description>
        <pubDate>2020-06-18T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe04c1eb30cb84f29a0263316122338d8" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fe04c1eb30cb84f29a0263316122338d8"/>
      </item>
      <item>
        <title>The Impact of Data Breaches on Our Society | Huntress</title>
        <link>https://www.huntress.com/blog/the-impact-of-data-breaches-on-our-society</link>
        <guid>https://www.huntress.com/blog/the-impact-of-data-breaches-on-our-society</guid>
        <description>How do we calculate the total impact of a data breach? Visit the Huntress Blog to learn more about how cyber security awareness training can help to mitigate risk.</description>
        <pubDate>2020-06-12T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>How One Criminal Tried to Sell an MSP on the Dark Web | Huntress</title>
        <link>https://www.huntress.com/blog/how-one-criminal-attempted-to-sell-an-msp-on-the-dark-web</link>
        <guid>https://www.huntress.com/blog/how-one-criminal-attempted-to-sell-an-msp-on-the-dark-web</guid>
        <description>In a rare encounter, we found ourselves directly interacting with a cybercriminal that took us down a dark web rabbit hole.</description>
        <pubDate>2020-02-04T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fdad6b17ec58e49b4a9cd3f9490087afe" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fdad6b17ec58e49b4a9cd3f9490087afe"/>
      </item>
      <item>
        <title>Validating the SolarWinds N-central “Dumpster Diver” Vulnerability</title>
        <link>https://www.huntress.com/blog/validating-the-solarwinds-n-central-dumpster-diver-vulnerability-5e3a045982e5</link>
        <guid>https://www.huntress.com/blog/validating-the-solarwinds-n-central-dumpster-diver-vulnerability-5e3a045982e5</guid>
        <description>Read more about Huntress validating the SolarWinds N-central “Dumpster Diver” Vulnerability.</description>
        <pubDate>2020-01-24T16:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>Validating the Bishop Fox Findings in ConnectWise Control | Huntress</title>
        <link>https://www.huntress.com/blog/validating-the-bishop-fox-findings-in-connectwise-control</link>
        <guid>https://www.huntress.com/blog/validating-the-bishop-fox-findings-in-connectwise-control</guid>
        <description>The Huntress team validates eight vulnerabilities found in ConnectWise Control that ranged from low to high severity.</description>
        <pubDate>2020-01-22T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F4921a54b3cb445b0a86efa7fe962ef8a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F4921a54b3cb445b0a86efa7fe962ef8a"/>
      </item>
      <item>
        <title>Assisted Remediation in Action | Huntress</title>
        <link>https://www.huntress.com/blog/assisted-remediation-in-action</link>
        <guid>https://www.huntress.com/blog/assisted-remediation-in-action</guid>
        <description>Learn how Huntress helped an MSP partner contain and remediate an Emotet/TrickBot infection with Assisted Remediation.</description>
        <pubDate>2019-11-15T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fededb776c8af4f26af365b206c151b5d" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2Fededb776c8af4f26af365b206c151b5d"/>
      </item>
      <item>
        <title>Huntress Development Notes: Updating the Updater</title>
        <link>https://www.huntress.com/blog/huntress-development-updating-the-updater-e6ed9718a2a9</link>
        <guid>https://www.huntress.com/blog/huntress-development-updating-the-updater-e6ed9718a2a9</guid>
        <description>If you’ve ever taken a look inside the Huntress Agent directory you may have noticed the file wyUpdate.exe.</description>
        <pubDate>2019-10-03T15:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>Keeping up with BlueKeep</title>
        <link>https://www.huntress.com/blog/keeping-up-with-bluekeep-d0676b976841</link>
        <guid>https://www.huntress.com/blog/keeping-up-with-bluekeep-d0676b976841</guid>
        <description>Remote Desktop Services (RDS) benefit employees and IT administrators alike. With employees often working from anywhere, remote desktop reduces the physical burden of carrying a work laptop home 🏠. It also makes updating and managing systems easier, which can alleviate the administrative burden when handling a large network. </description>
        <pubDate>2019-06-04T16:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>Deep Dive: A LNK in the Chain</title>
        <link>https://www.huntress.com/blog/deep-dive-a-lnk-in-the-chain-6c0d1072160d</link>
        <guid>https://www.huntress.com/blog/deep-dive-a-lnk-in-the-chain-6c0d1072160d</guid>
        <description>Read this blog to learn more about what the Huntress team discovered with LNK.</description>
        <pubDate>2019-05-30T17:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>Incident Education: Sales Ammo for the IT Arsenal</title>
        <link>https://www.huntress.com/blog/incident-education-sales-ammo-for-the-it-arsenal-fea784026fe8</link>
        <guid>https://www.huntress.com/blog/incident-education-sales-ammo-for-the-it-arsenal-fea784026fe8</guid>
        <description>As a technical founder of a product startup, I’m as anti-FUD as it gets. However, the past three years have taught me how education can be a snake-oil free alternative.</description>
        <pubDate>2019-05-16T17:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>Rapid Response: ASUS Live Update Attack (Operation ShadowHammer)</title>
        <link>https://www.huntress.com/blog/faq-asus-liveupdate-attack-operation-shadowhammer-9fc9c03b2da9</link>
        <guid>https://www.huntress.com/blog/faq-asus-liveupdate-attack-operation-shadowhammer-9fc9c03b2da9</guid>
        <description>Periodically, a large scale cybersecurity issue requires “all hands on deck” from the Huntress Team (see WannaCry, Kaseya Cryptominer, GANDGRAB outbreak). The unfolding ASUS Live Update fiasco also happens to be one of those moments. We’ve created this blog is to provide simple answers to a complex supply chain attack affecting global IT Departments.</description>
        <pubDate>2019-03-26T05:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>CVE-2017-18362: Arbitrary SQL Execution in ManagedITSync Integration</title>
        <link>https://www.huntress.com/blog/cve-2017-18362-arbitrary-sql-injection-in-mangeditsync-integration-ba142ff24f4d</link>
        <guid>https://www.huntress.com/blog/cve-2017-18362-arbitrary-sql-injection-in-mangeditsync-integration-ba142ff24f4d</guid>
        <description>A vulnerability was discovered and disclosed in late 2017 that affected the ConnectWise ManagedITSync integration, designed to sync data between the ConnectWise Manage PSA and the Kaseya VSA RMM.</description>
        <pubDate>2019-02-08T14:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>Failing to Revive AUTOEXEC.BAT on Windows 7 &amp; 10</title>
        <link>https://www.huntress.com/blog/failing-to-revive-autoexec-bat-on-windows-7-10-ca9955177e83</link>
        <guid>https://www.huntress.com/blog/failing-to-revive-autoexec-bat-on-windows-7-10-ca9955177e83</guid>
        <description>Does AUTOEXEC.BAT still run on modern Windows? We test Windows 7/10, explore registry persistence, and revisit how attackers maintain access today.</description>
        <pubDate>2018-12-30T21:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>Distrusting Symantec Issued Certificates</title>
        <link>https://www.huntress.com/blog/distrusting-symantec-issued-certificates-b8bcb332fd22</link>
        <guid>https://www.huntress.com/blog/distrusting-symantec-issued-certificates-b8bcb332fd22</guid>
        <description>Read more about security updates to the Huntress platform.</description>
        <pubDate>2018-09-06T20:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>Attackers Abuse Trust with Indirection</title>
        <link>https://www.huntress.com/blog/attackers-abuse-trust-with-indirection-e8addc1ba8f</link>
        <guid>https://www.huntress.com/blog/attackers-abuse-trust-with-indirection-e8addc1ba8f</guid>
        <description>Preventive security products like antivirus have made major strides in their ability to detect malicious behaviors as opposed to weak/static signatures. When implemented properly, these heuristics are capable of discovering even the most cleverly obfuscated routines. But don’t ring the victory bells yet. This cat-and-mouse game is just getting started…</description>
        <pubDate>2018-08-16T20:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>Ask Huntress: Fake .XPS Invoice Leading to Credential Phishing</title>
        <link>https://www.huntress.com/blog/ask-huntress-fake-xps-invoice-leading-to-credential-phishing-page-a79e21e93dc0</link>
        <guid>https://www.huntress.com/blog/ask-huntress-fake-xps-invoice-leading-to-credential-phishing-page-a79e21e93dc0</guid>
        <description>Explore this phishing campaign used the age-old “Please remit payment” spiel to lure potential victims into opening the attached file.</description>
        <pubDate>2018-07-17T19:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>Understanding Potentially Unwanted Programs Part I — It’s Not Always Malware</title>
        <link>https://www.huntress.com/blog/understanding-potentially-unwanted-programs-part-i-its-not-always-malware-6383d625265e</link>
        <guid>https://www.huntress.com/blog/understanding-potentially-unwanted-programs-part-i-its-not-always-malware-6383d625265e</guid>
        <description>Regardless of your daily duties, we’ve all encountered annoying ads, unwanted pop-ups, or generically named rogue applications. These nuisances, commonly called Potentially Unwanted Programs (PUP), are often unknowingly installed when downloading free software.</description>
        <pubDate>2018-05-29T20:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>Deep Dive: Kaseya VSA Mining Payload</title>
        <link>https://www.huntress.com/blog/deep-dive-kaseya-vsa-mining-payload-c0ac839a0e88</link>
        <guid>https://www.huntress.com/blog/deep-dive-kaseya-vsa-mining-payload-c0ac839a0e88</guid>
        <description>For many of us in the Managed Services Provider market, we were rocked with news of a vulnerability in Kaseya’s VSA product. The purpose of this blog is to shine technical light on what the Huntress ThreatOps team observed and analyzed thus far.</description>
        <pubDate>2018-01-30T07:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>Huntress Labs to Host Hands-On “Hacking Windows” Training for MSPs at IT Nation</title>
        <link>https://www.huntress.com/blog/huntress-labs-to-host-hands-on-hacking-windows-training-for-msps-at-it-nation-afe8681c1192</link>
        <guid>https://www.huntress.com/blog/huntress-labs-to-host-hands-on-hacking-windows-training-for-msps-at-it-nation-afe8681c1192</guid>
        <description>IT Nation 2016 ended on a high note for Huntress Labs as we were named the “Best Newcomer” in the Partner Choice Awards. Now, as this year’s event quickly approaches, we are excited to continue our momentum.</description>
        <pubDate>2017-11-07T15:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>Abusing Trusted Applications with Nested Execution</title>
        <link>https://www.huntress.com/blog/abusing-trusted-applications-with-nested-execution</link>
        <guid>https://www.huntress.com/blog/abusing-trusted-applications-with-nested-execution</guid>
        <description>Recently, my co-founders gave a talk at DerbyCon 7.0 on evading common persistence enumeration tools. Evasion using trusted applications has been a hot topic of discussion within the infosec community and is one of the techniques they covered in their presentation. However, very little discussion exists on why these matter or the steps researchers take to find “hosting” applications.</description>
        <pubDate>2017-10-02T13:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>MSP Moment: Worming Malware Brings New Complexities to the Threat Landscape</title>
        <link>https://www.huntress.com/blog/msp-moment-worming-malware-brings-new-complexities-to-the-threat-landscape-442f3d147acb</link>
        <guid>https://www.huntress.com/blog/msp-moment-worming-malware-brings-new-complexities-to-the-threat-landscape-442f3d147acb</guid>
        <description>Over the past month, the Emotet family of malware has re-emerged as a formidable piece of crimeware, thanks to its new self-propagation techniques (undoubtedly inspired by the success of WannaCry and Petya).</description>
        <pubDate>2017-08-25T14:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>Redosdru — Encrypting DLL Payloads to Avoid On-Disk Signatures</title>
        <link>https://www.huntress.com/blog/redosdru-encrypting-dll-payloads-to-avoid-on-disk-signatures-c403b3159485</link>
        <guid>https://www.huntress.com/blog/redosdru-encrypting-dll-payloads-to-avoid-on-disk-signatures-c403b3159485</guid>
        <description>Dive deep into Redosdru malware analysis, unpacking encrypted DLLs, keylogging behavior, and how Huntress defenders detect and respond.</description>
        <pubDate>2017-07-17T17:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>Deep Dive: Squashing an MSSQL Attack</title>
        <link>https://www.huntress.com/blog/deep-dive-squashing-an-mssql-attack-a0e1f40f085c</link>
        <guid>https://www.huntress.com/blog/deep-dive-squashing-an-mssql-attack-a0e1f40f085c</guid>
        <description>During the previous MSP Moment, we walked our readers through an incident where our partner, NTConnections, used Huntress to discover a previously undetected breach. In this Deep Drive, we’ll examine the tradecraft used by the attackers to gain access through the database, kill/disable antivirus, download malicious files, and establish a persistent foothold within the network.</description>
        <pubDate>2017-07-17T17:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>Security Awareness Training Will Prevent Ransomware | Huntress</title>
        <link>https://www.huntress.com/blog/security-awareness-training-will-prevent-ransomware</link>
        <guid>https://www.huntress.com/blog/security-awareness-training-will-prevent-ransomware</guid>
        <description>Ransomware security awareness training is the most effective way to prevent a ransomware attack against your organization and its employees. Read more in the Huntress Blog to find out how.</description>
        <pubDate>2017-07-05T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>MSP Moment: Squashing an MSSQL Attack</title>
        <link>https://www.huntress.com/blog/msp-moment-squashing-an-mssql-attack-acc08886f367</link>
        <guid>https://www.huntress.com/blog/msp-moment-squashing-an-mssql-attack-acc08886f367</guid>
        <description>When it comes to breaches, it’s hard to find a silver lining when the end result is customer down time, data theft, or damaged reputations. For Managed Service Providers with tens to hundreds (or even thousands) of clients, the stakes are even higher. In this MSP Moment, we’re highlighting how NTConnections, a Washington DC based MSP, responded to a database outage which quickly escalated into an incident response effort.</description>
        <pubDate>2017-05-08T18:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>Troubleshooting Procmon &amp; Sysmon v3.32</title>
        <link>https://www.huntress.com/blog/troubleshooting-procmon-sysmon-v3-32-c4397dc75f50</link>
        <guid>https://www.huntress.com/blog/troubleshooting-procmon-sysmon-v3-32-c4397dc75f50</guid>
        <description>When it comes to troubleshooting software errors, analyzing malware samples, or discovering security misconfigurations, the Sysinternals Suite can likely solve your problem. For many IT and Security professionals, this collection of Windows utilities is similar to the Swiss Army knife.</description>
        <pubDate>2017-04-25T17:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>Huntress Wins ConnectWise IT Nation Partner’s Choice Award!</title>
        <link>https://www.huntress.com/blog/huntress-wins-connectwise-it-nation-partners-choice-award-c8e06f9d6e10</link>
        <guid>https://www.huntress.com/blog/huntress-wins-connectwise-it-nation-partners-choice-award-c8e06f9d6e10</guid>
        <description>Huntress wins prestigious award at this year’s largest MSP industry conference, ConnectWise IT Nation, for industry-leading Managed Detection &amp; Response service.</description>
        <pubDate>2016-11-21T18:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>How do you protect computers from attackers if you’re not familiar with hacking techniques? </title>
        <link>https://www.huntress.com/blog/how-do-you-protect-computers-from-attackers-if-youre-not-familiar-with-hacking-techniques-cb1c836f92ce</link>
        <guid>https://www.huntress.com/blog/how-do-you-protect-computers-from-attackers-if-youre-not-familiar-with-hacking-techniques-cb1c836f92ce</guid>
        <description>How do you protect computers from attackers if you’re not familiar with hacking techniques? The historical answer to this question has been antivirus and firewalls. However, the last several years have demonstrated hackers can slip past these preventative technologies and cause devastating results to the victims.</description>
        <pubDate>2016-11-14T16:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
      <item>
        <title>How My StubHub Account Got Hacked | Huntress</title>
        <link>https://www.huntress.com/blog/how-my-stubhub-account-got-hacked</link>
        <guid>https://www.huntress.com/blog/how-my-stubhub-account-got-hacked</guid>
        <description>If you have a StubHub account, you are open to a major vulnerability of having your StubHub hacked. Learn more about how you are at risk &amp; how Huntress&#39; Security Awareness Training can help.</description>
        <pubDate>2016-04-06T00:00:00Z</pubDate>
        <media:content url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a" medium="image"/>
        <media:thumbnail url="https://cdn.builder.io/api/v1/image/assets%2F3eb6f92aedf74f109c7b4b0897ec39a8%2F28e05784f2584d25824e4b27c802f97a"/>
      </item>
    </channel>
</rss>