HomeCyber BalkansHuntress Unveils Enhanced Identity Threat Detection and Response Solution Amid Rising Identity-Based...

Huntress Unveils Enhanced Identity Threat Detection and Response Solution Amid Rising Identity-Based Attacks Warning

Published on

spot_img

Huntress Unveils Enhanced Identity Threat Detection and Response Solution Amid Rising Security Concerns

In a significant announcement today, Huntress has introduced major enhancements to its Managed Identity Threat Detection and Response (ITDR) solution. This evolution reflects the company’s commitment to providing targeted defenses against sophisticated hacker identity tradecraft. The launch coincides with revealing new findings that shed light on the escalating threat posed by identity-based attacks, which present severe challenges for organizations striving to safeguard their digital environments.

Recent data from an independent survey conducted by UserEvidence, focusing on over 600 IT and security professionals, has informed Huntress’ 2025 Managed ITDR Report: Identity Is the New Security Perimeter. This report outlines alarming trends regarding the increasing prevalence, impact, and challenges in detecting identity-related attacks.

One of the most troubling statistics unearthed from the report indicates that 67% of organizations have witnessed a rise in identity-related incidents over the past three years. Furthermore, more than a third (35%) of these organizations reported that such attacks constituted over 40% of their total security incidents in the last year. This data paints a stark picture of the vulnerability that companies face in an increasingly complex digital landscape, making it clear that identity security must be prioritized.

In addition to the rising incidence of attacks, the survey revealed that rogue applications are becoming a significant risk for organizations. Approximately 45% of respondents identified experiencing rogue or malicious applications in the previous year, with 46% regarding them as a prominent concern. This aligns with wider industry trends indicating that threat actors are creatively exploiting vulnerabilities in commonly-used applications.

Unfortunately, many businesses continue to lag in their ability to detect and respond to identity attacks in a timely manner. According to findings, 53% of organizations admitted that it takes them hours to detect such attacks. A staggering 68% of respondents noted they typically cannot respond effectively until the attackers have already established a foothold and can maintain persistence within the system. This latency in detection can severely compound the financial damages that ensue from identity breaches, as highlighted by the report’s assertion that 32% of businesses that experienced identity-related incidents reported losses exceeding $100,000.

Prakash Ramamurthy, Chief Product Officer at Huntress, remarked on the transformation of the threat landscape. “There’s no denying identity is the new endpoint," he emphasized. “With widespread cloud adoption, a shift to hybrid work environments, and an increased reliance on SaaS applications, the identity attack surface has exploded over the past few years.” He underscored that hackers are no longer taking the time to break into networks through traditional means but are often logging in with stolen credentials and exploiting weak multi-factor authentication measures. The enhanced Managed ITDR solution aims to provide organizations with the proactive detection and response capabilities they need before threats materialize.

Currently, Huntress protects over 1.8 million identities and has successfully thwarted 28,000 identity attacks over the past six months. It boasts an impressive mean time to respond (MTTR) of just three minutes, along with a low false positive rate. These statistics underline the solution’s efficacy in thwarting phishing attempts, Adversary-in-the-Middle (AiTM) attacks, and potential account takeovers before they escalate into larger incidents.

Huntress’s newly introduced capabilities, including features like Rogue Apps, Unwanted Access, and Shadow Workflows, play crucial roles in dismantling the tactics employed by cybercriminals. The Rogue Apps feature marks a groundbreaking advance, allowing Huntress to be the first vendor to proactively defend against OAuth application threats. This new functionality can detect and address malicious or risky OAuth applications in Microsoft 365 environments, providing organizations with clear remediation steps.

The Unwanted Access capability allows for active monitoring of unusual login behaviors and anomalies, such as unexpected location or VPN usage, effectively isolating compromised identities before they can cause harm. Similarly, the Shadow Workflows feature serves as a formidable countermeasure against business email compromise (BEC) and data theft, alerting organizations to malicious inbox rules and mail forwarding settings.

Matt Kiely, Principal Cybersecurity Researcher at Huntress, emphasized the gravity of the OAuth application threat. “Through our research, it became strikingly clear that the threat posed by malicious OAuth applications was far greater than initially anticipated,” he stated. He elaborated that the development of the Rogue Apps capability allows for precise detection of high-risk OAuth applications, thus empowering organizations to respond swiftly.

Customer feedback regarding the newly enhanced Managed ITDR has also been overwhelmingly positive. Ryan Rowbottom, Director of IT Services at PCS, lauded the solution as a "game-changer." He noted its affordability and effectiveness, particularly in managing their Microsoft 365 identities and email environments. Rowbottom’s initial skepticism about the pricing has turned into complete satisfaction, largely due to the continuous rollout of new capabilities that empower users to stay ahead of potential attackers.

In conclusion, the enhancements to Huntress’ Managed Identity Threat Detection and Response solution come at a critical juncture, providing organizations with vital resources to fortify their defenses against the ever-evolving landscape of identity-based threats. As these types of attacks continue to proliferate, proactive engagement and effective detection tools will be essential for preserving security in the digital age.

Source link

Latest articles

Attackers Trojanize Axios HTTP Library in Major NPM Supply Chain Attack

Rising Threats: The Axios Attack and the Persistent Danger of Supply Chain Vulnerabilities In a...

MIWIC26: Gizem Acar Tekin, CEO and Co-founder of Photarix

Recognizing Influential Figures in Cybersecurity: The Inspiring Journey of Gizem Acar Tekin Organized by Eskenzi...

Agentic AI Uncertainty Dominates Discussions at RSAC Conference

A Disorienting Future: The Rapid Proliferation of Agentic AI and Emerging Cyber Threats The landscape...

Cyber Briefing for March 31, 2026 – CyberMaterial

Recent Developments in Cybersecurity: A Comprehensive Overview In the fast-evolving landscape of cybersecurity, a range...

More like this

Attackers Trojanize Axios HTTP Library in Major NPM Supply Chain Attack

Rising Threats: The Axios Attack and the Persistent Danger of Supply Chain Vulnerabilities In a...

MIWIC26: Gizem Acar Tekin, CEO and Co-founder of Photarix

Recognizing Influential Figures in Cybersecurity: The Inspiring Journey of Gizem Acar Tekin Organized by Eskenzi...

Agentic AI Uncertainty Dominates Discussions at RSAC Conference

A Disorienting Future: The Rapid Proliferation of Agentic AI and Emerging Cyber Threats The landscape...