Huntress Labs

huntress.com

huntress-labs-company-logo
Huntress is a leading provider of advanced threat detection and actionable cybersecurity information that delivers easy to follow remediation steps into your existing ticketing system. IT Departments & MSPs worldwide use Huntress to enable their junior IT staff to confidently address cybersecurity incidents that slip past their preventive security stack. As a result, we discover breaches before they cause downtime, costly cleanup, and damaged reputations.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

Data Security, Platform Security, Software Security

ABNORMAL SECURITY REDEFINES CLOUD EMAIL SECURITY WITH THE LAUNCH OF SECURITY POSTURE MANAGEMENT TO PROTECT AGAINST EMAIL PLATFORM ATTACKS

Abnormal | November 16, 2022

news image

Abnormal Security, the leading behavioral AI-based security platform, announced today its newest addition to the product portfolio as the company progresses toward delivering the most comprehensive cloud email security in the market. The latest innovation protects customers from emerging email platform attacks that are increasing in volume and severity as attackers find new ways to target organizations. The open, interconnected nature of cloud email platforms creates new entry poi...

Read More

Enterprise Security, Platform Security, Software Security

VERACODE INTRODUCES INTELLIGENT SOFTWARE SECURITY WITH LAUNCH OF VERACODE FIX

Businesswire | April 19, 2023

news image

Veracode, a leading provider of intelligent software security solutions, today launches Veracode Fix, a new AI-powered product. Trained on Veracode’s proprietary dataset, Veracode Fix suggests remediations for security flaws found in code and open-source dependencies. Shifting the Paradigm from Merely ‘Find’ to ‘Find and Fix’ “For far too long, organizations have had to choose between remediating software security f...

Read More

HACKERS CAN USE ULTRASONIC WAVES TO SECRETLY CONTROL VOICE ASSISTANT DEVICES

The hacker news | March 02, 2020

news image

Researchers have discovered a new means to target voice-controlled devices by propagating ultrasonic waves through solid materials in order to interact with and compromise them using inaudible voice commands without the victims' knowledge.Called "SurfingAttack," the attack leverages the unique properties of acoustic transmission in solid materials such as tables to "enable multiple rounds of interactions between the voice-controlled device and the attacker over a longer ...

Read More

Enterprise Security, Software Security, Web Security Tools

AMBIENT.AI LAUNCHES AI-DRIVEN FORENSICS TOOL TO IMPROVE SECURITY

Ambient.ai | March 06, 2023

news image

Ambient.ai, the company evolving physical security with computer vision intelligence, recently introduced its AI-Powered Forensics solution to power incident investigations in near real-time. New event-based and entity search capabilities enable teams to search by objects, complex actions, and non-biometric person descriptors such as shirt color, thereby reducing investigation times by over 90%. Security investigations require operators to analyze individual camera streams with ...

Read More
news image

Data Security, Platform Security, Software Security

ABNORMAL SECURITY REDEFINES CLOUD EMAIL SECURITY WITH THE LAUNCH OF SECURITY POSTURE MANAGEMENT TO PROTECT AGAINST EMAIL PLATFORM ATTACKS

Abnormal | November 16, 2022

Abnormal Security, the leading behavioral AI-based security platform, announced today its newest addition to the product portfolio as the company progresses toward delivering the most comprehensive cloud email security in the market. The latest innovation protects customers from emerging email platform attacks that are increasing in volume and severity as attackers find new ways to target organizations. The open, interconnected nature of cloud email platforms creates new entry poi...

Read More
news image

Enterprise Security, Platform Security, Software Security

VERACODE INTRODUCES INTELLIGENT SOFTWARE SECURITY WITH LAUNCH OF VERACODE FIX

Businesswire | April 19, 2023

Veracode, a leading provider of intelligent software security solutions, today launches Veracode Fix, a new AI-powered product. Trained on Veracode’s proprietary dataset, Veracode Fix suggests remediations for security flaws found in code and open-source dependencies. Shifting the Paradigm from Merely ‘Find’ to ‘Find and Fix’ “For far too long, organizations have had to choose between remediating software security f...

Read More
news image

HACKERS CAN USE ULTRASONIC WAVES TO SECRETLY CONTROL VOICE ASSISTANT DEVICES

The hacker news | March 02, 2020

Researchers have discovered a new means to target voice-controlled devices by propagating ultrasonic waves through solid materials in order to interact with and compromise them using inaudible voice commands without the victims' knowledge.Called "SurfingAttack," the attack leverages the unique properties of acoustic transmission in solid materials such as tables to "enable multiple rounds of interactions between the voice-controlled device and the attacker over a longer ...

Read More
news image

Enterprise Security, Software Security, Web Security Tools

AMBIENT.AI LAUNCHES AI-DRIVEN FORENSICS TOOL TO IMPROVE SECURITY

Ambient.ai | March 06, 2023

Ambient.ai, the company evolving physical security with computer vision intelligence, recently introduced its AI-Powered Forensics solution to power incident investigations in near real-time. New event-based and entity search capabilities enable teams to search by objects, complex actions, and non-biometric person descriptors such as shirt color, thereby reducing investigation times by over 90%. Security investigations require operators to analyze individual camera streams with ...

Read More

Resources

Events

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us