Visit our website: www.huntandhackett.com
It offers a detailed look at how Europe’s cyber ecosystem is evolving. The picture that emerges shows growing strain, where interconnected systems and persistent threats keep testing resilience.
Read the report here: www.enisa.europa.eu/publications...
It offers a detailed look at how Europe’s cyber ecosystem is evolving. The picture that emerges shows growing strain, where interconnected systems and persistent threats keep testing resilience.
Read the report here: www.enisa.europa.eu/publications...
At H2, we recently moved from authenticator apps to #YubiKey (FIDO2) for company-wide MFA in Entra ID.
Why? Because it enables phishing-resistant, passwordless sign-ins at scale, raising the bar for our security.
Read about our journey here: www.huntandhackett.com/blog/raising...
At H2, we recently moved from authenticator apps to #YubiKey (FIDO2) for company-wide MFA in Entra ID.
Why? Because it enables phishing-resistant, passwordless sign-ins at scale, raising the bar for our security.
Read about our journey here: www.huntandhackett.com/blog/raising...
Join our next CyberConnect on Sept 9 in The Hague to learn how these operations work, who gets targeted, and see a live demo of tracking campaigns.
Sign up today: www.huntandhackett.com/understandin...
Join our next CyberConnect on Sept 9 in The Hague to learn how these operations work, who gets targeted, and see a live demo of tracking campaigns.
Sign up today: www.huntandhackett.com/understandin...
We stumble across so many good things from the cybersecurity community and beyond, and we thought it'd be nice to share them.
So, here are some of the things our Hunters have been diving into lately:
🧵1/7
We stumble across so many good things from the cybersecurity community and beyond, and we thought it'd be nice to share them.
So, here are some of the things our Hunters have been diving into lately:
🧵1/7
A recent article by @thehackernews.bsky.social shows over 8,500 SMB users were targeted.
Head over to their website to read the full article: thehackernews.com/2025/07/seo-...
A recent article by @thehackernews.bsky.social shows over 8,500 SMB users were targeted.
Head over to their website to read the full article: thehackernews.com/2025/07/seo-...
Linked to Russia’s GRU and active in 60+ countries, Sandworm targets critical infrastructure with sabotage, espionage, and disruption. Curious to learn more about this APT? Explore their threat profile in our Members' Portal:
www.huntandhackett.com/members/acto...
Linked to Russia’s GRU and active in 60+ countries, Sandworm targets critical infrastructure with sabotage, espionage, and disruption. Curious to learn more about this APT? Explore their threat profile in our Members' Portal:
www.huntandhackett.com/members/acto...
🔗https://www.huntandhackett.com/blog/turning-incident-response-challenges-into-scalable-solutions
🔗https://www.huntandhackett.com/blog/turning-incident-response-challenges-into-scalable-solutions
We're excited to announce our new series, 𝘋𝘦𝘵𝘦𝘤𝘵𝘪𝘰𝘯𝘴 𝘧𝘳𝘰𝘮 𝘵𝘩𝘦 𝘚𝘖𝘊, in which we share a behind-the-scenes look of how our SOC detects, investigates, and responds to real-world threats.
Head on over to our LinkedIn to check it out: www.linkedin.com/feed/update/...
We're excited to announce our new series, 𝘋𝘦𝘵𝘦𝘤𝘵𝘪𝘰𝘯𝘴 𝘧𝘳𝘰𝘮 𝘵𝘩𝘦 𝘚𝘖𝘊, in which we share a behind-the-scenes look of how our SOC detects, investigates, and responds to real-world threats.
Head on over to our LinkedIn to check it out: www.linkedin.com/feed/update/...
Hunt & Hackett is proud to sponsor and speak at one of Europe’s leading threat intel events. Diving into strategic cyber defence, Lazarus & SeaTurtle ops, and Europe’s cyber resilience.
#HagueTIX #ThreatIntel
Hunt & Hackett is proud to sponsor and speak at one of Europe’s leading threat intel events. Diving into strategic cyber defence, Lazarus & SeaTurtle ops, and Europe’s cyber resilience.
#HagueTIX #ThreatIntel
Visit our website for more information, and to sign-up:
www.huntandhackett.com/security-in-...
Visit our website for more information, and to sign-up:
www.huntandhackett.com/security-in-...
We dive into reverse-engineering AFD.sys (a hidden part of Windows networking) to surface live socket data from other processes. This unlocks new capabilities for forensics, debugging, and reverse engineering.
Read it here: www.huntandhackett.com/blog/improvi...
We dive into reverse-engineering AFD.sys (a hidden part of Windows networking) to surface live socket data from other processes. This unlocks new capabilities for forensics, debugging, and reverse engineering.
Read it here: www.huntandhackett.com/blog/improvi...
On it, you'll find detailed actor overviews, analyses of recent cyberattacks in the logistics sector, and insights into emerging cybersecurity trends.
Curious? Take a look: www.huntandhackett.com/members/sect...
On it, you'll find detailed actor overviews, analyses of recent cyberattacks in the logistics sector, and insights into emerging cybersecurity trends.
Curious? Take a look: www.huntandhackett.com/members/sect...
Meer informatie kun je vinden op onze website: www.huntandhackett.com/crisisworksh...
Meer informatie kun je vinden op onze website: www.huntandhackett.com/crisisworksh...
Securing Operational Technology: Fast Response, Strong Recovery
We’re hosting a session on how to boost operational resilience, secure OT environments, and align with evolving regulations.
Sign-up now:
www.huntandhackett.com/securing-ot
Securing Operational Technology: Fast Response, Strong Recovery
We’re hosting a session on how to boost operational resilience, secure OT environments, and align with evolving regulations.
Sign-up now:
www.huntandhackett.com/securing-ot
A great opportunity to highlight cyber threats beyond the traditional security community; cross-domain awareness is key in today’s threat landscape.
A great opportunity to highlight cyber threats beyond the traditional security community; cross-domain awareness is key in today’s threat landscape.
Their legs might be sore today, but the bliss of victory was more than worth it. After all, every win starts with a challenge.
Huge respect to everyone who took on #demooiste with us. See you at the next one.
Their legs might be sore today, but the bliss of victory was more than worth it. After all, every win starts with a challenge.
Huge respect to everyone who took on #demooiste with us. See you at the next one.
As businesses become more interconnected, Operational Technology (OT) is increasingly targeted by cyber threats. In this blog, we explore OT security and raise awareness about its growing risks.
Read it here: www.huntandhackett.com/blog/evolvin...
As businesses become more interconnected, Operational Technology (OT) is increasingly targeted by cyber threats. In this blog, we explore OT security and raise awareness about its growing risks.
Read it here: www.huntandhackett.com/blog/evolvin...
Is your organization prepared?
www.bbc.com/news/article...
Is your organization prepared?
www.bbc.com/news/article...
Download the full report here: www.huntandhackett.com/2025-trend-r...
Download the full report here: www.huntandhackett.com/2025-trend-r...
Find out about all our latest insights - including APTs, TTPs, recent developments, and a look behind-the-scenes - here ➡️ huntandhackett.com/threats/sect...
#CyberSecurity #Agriculture #ThreatIntel #ThreatLandscape
Find out about all our latest insights - including APTs, TTPs, recent developments, and a look behind-the-scenes - here ➡️ huntandhackett.com/threats/sect...
#CyberSecurity #Agriculture #ThreatIntel #ThreatLandscape
In an interview with @telegraaf.nl, our co-founder Ronald Prins stresses the need for a proactive cybersecurity approach.
Read the article here ➡️ www.telegraaf.nl/nieuws/29515...
In an interview with @telegraaf.nl, our co-founder Ronald Prins stresses the need for a proactive cybersecurity approach.
Read the article here ➡️ www.telegraaf.nl/nieuws/29515...
This weekend, TU Eindhoven's network was taken offline after detecting a cyberattack. The investigation raises key questions: what risks do such institutions face, and how can they better prepare?
www.tue.nl/en/news-and-...
1/7
This weekend, TU Eindhoven's network was taken offline after detecting a cyberattack. The investigation raises key questions: what risks do such institutions face, and how can they better prepare?
www.tue.nl/en/news-and-...
1/7
Explore the energy #threatlandscape - shifting to renewables brings increasing cyber threats. Learn about attack motivations, protection strategies, and past cases like SolarWinds.
Read the report on our Members Portal: www.huntandhackett.com/members/regi...
Explore the energy #threatlandscape - shifting to renewables brings increasing cyber threats. Learn about attack motivations, protection strategies, and past cases like SolarWinds.
Read the report on our Members Portal: www.huntandhackett.com/members/regi...
This means our security practices and policies meet the highest industry standards. We’re proud to report that our audit passed with zero exceptions! ✅
This means our security practices and policies meet the highest industry standards. We’re proud to report that our audit passed with zero exceptions! ✅
Discover Russia’s cyber threat landscape, with insights into high-profile attacks, #APTs (Advanced Persistent Threats), #TTPs (Techniques, Tactics, Procedures), and advanced tools.
Access the full report via our Members’ Portal: www.huntandhackett.com/members/regi...
Discover Russia’s cyber threat landscape, with insights into high-profile attacks, #APTs (Advanced Persistent Threats), #TTPs (Techniques, Tactics, Procedures), and advanced tools.
Access the full report via our Members’ Portal: www.huntandhackett.com/members/regi...