Changelog

Follow up on the latest improvements and updates.

RSS

Janel's groundbreaking invention could change the world, but Quincy's open-source research skills and big ambitions might just change her future.
Learning Objectives:
  • Define and describe what OSINT is
  • Identify how Spear Phishing works
  • Show methods of defending against Spear Phishing
  • Provide steps to reduce OSINT exposure
We've made an update to your Incident Reports! Containment actions are now going to show within the Remediations tab of an Incident, allowing you visibility into the status and the ability to track the progress of any actions taken, such actions as
  • Host or Identity Isolation
  • IP Blocking
  • Inbox Rule Disable
This update will streamline adding future remediations for EDR, ITDR and SIEM, increasing the product efficiency and effectiveness against future threats.
Our SOC has observed a rise in PDF based phishing attacks in the wild. These new phishing simulations mimic that tradecraft by including an attachment with a bait-link (normal link or QR Code) inside.
Tina is starting a new internship for the mega celebrity, Joshhh, and she's hoping that generative AI will have him singing her praises.
Learning Objectives:
  • Define AI Hallucinations
  • Demonstrate appropriate uses of AI
  • Show the importance of validating factual data
  • Build an understanding for how generative AI works
We're making NEW trial signups easier:
  1. We will now only require a business email address to setup a Huntress Trial
  • The rest of the info we currently ask for, will be immediately sourced via 3rd party data enrichment
  • We will only prompt for any pieces of missing data
  1. We now support Magic Link login!
  • Folks will get a one-time use link in their email which can be used to login
  1. Passwords are now optional (but recommended)
  • Unless trial users become paid customers, or want to view self-serve pricing, we will not enforce the password/MFA flow - use magic link to login!
These changes are meant to make it drop-dead easy to start a trial, without compromising quality or security.

new

Security Awareness Training

SAT Dashboard page in GA

The dashboard page with the phishing over time graph is now in general availability and available to all customers and partners. This page helps admins observe improvement in avoiding simulated compromise over time based on attempt number.
Partners have asked for ways to rename "Huntress Managed Learning - <month> <year>" to something that best reflects their own brand. Now they can! When they go to the Managed Learning Plan page, they can now hit the gear icon and rename future assignments.
We also have a beta feature we can enable to customize the time of day that learning plans launch to best support international audiences in EMEA and ANZ.
All Managed EDR partners can now request SOC Support for critical EDR incidents right from the Huntress Portal. This feature allows partners to communicate via a live chat - or request a callback from the Huntress SOC Support - via a button on the top right of all Managed EDR critical incident reports.
Feature Details:
If you select the callback option, all you need to do is input your phone number, name, email, and a brief description of what you need assistance with - the Huntress SOC Support team will call you directly to address your concerns or questions around the associated critical incident report. Each organization in an account is limited to one phone support request at a time.
We're excited to announce that we've enhanced our security by strengthening the protection of endpoints with Huntress. This improvement prevents easy uninstallation of the Huntress Agent or tampering with any of its components.
Moving forward, uninstalling the Agent can only be done through the Huntress Dashboard or by turning off the Tamper Protection feature in the Dashboard, then uninstalling it locally or via RMM tools.
For detailed instructions on enabling this feature or for more information, please refer to our Support Documentation here.
Screenshot 2024-10-17 at 1
Bot-Head is looking to build something very special for the Curriculaville Comic-Con, but with a low balance in her bank account, she may have to turn to an AiTM attack to finance her project.
Learning Objectives:
  • Define Adversary in The Middle
  • Summarize the motives for an AiTM attack
  • Demonstrate tactics used in an AiTM attack
  • Describe methods for identifying a phishing email and spoofed websites
  • Explore ways of defending against AiTM attacks
Load More