Huntress Resource Center

Welcome to your go-to destination for cybersecurity resources and education. Dig in and find a range of materials made to empower users of all levels with the knowledge and tools to defend against evolving cyber threats.

Glitch effectGlitch effectGlitch effect
Ransomware
Ransomware
Video

How Ransomware Attacks Happen

Video
Text Link
Video

Rogue Apps 101

Video
Text Link
Video

Stealthware: The Rise of Malicious OAuth Apps in Microsoft 365

Video
Text Link
Video

Traitorware: How Hackers Abuse Legitimate Apps to Hijack Microsoft 365

Video
Text Link
Video

What is ITDR?

Video
Text Link
Mastering Cybersecurity
Mastering Cybersecurity
Video

ITDR Product Overview

Video
Text Link
Attacker Tradecraft
Attacker Tradecraft
Video

Lifecycle of an Incident - Evilginx

Video
Text Link
Mastering Cybersecurity
Mastering Cybersecurity
Video

The Straightforward Buyer’s Guide to SIEM

Video
Text Link
Video

SIEM Product Overview Video

Video
Text Link
Attacker Tradecraft
Attacker Tradecraft
Video

DeNistifying Video Series

Video
Text Link
Mastering Cybersecurity
Mastering Cybersecurity
Video

The Managed SIEM Story

Video
Text Link
Business Email Compromise
Business Email Compromise
Video

M365 Product Explainer Video

Video
Text Link
Attacker Tradecraft
Attacker Tradecraft
Huntress social logo
Video

Have You Ever Watched Someone Get Hacked in Real-Time

Video
Text Link

See Huntress in Action

Book a personalized demo to look at Huntress under the hood, explore the dashboard, and ask questions to our experts.

Book a Demo