TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Huntress

Huntress Expands Into Proactive Security Posture Management

2026-03-17 · Read original ↗

ATT&CK techniques detected

6 predictions
T1556.006Multi-Factor Authentication
88%
“huntress expands into proactive security posture management at huntress, we ’ ve made our name catching and wrecking the hackers who slip past defenses. now, we ’ re making it hard for them to even get a foothold. we ' re thrilled to announce the expansion of the huntress agentic…”
T1078Valid Accounts
86%
“down by the huntress ai - centric soc caused by a rogue datto rmm this story underlines why endpoint security posture management matters : you have to know which rmm tools are allowed, where they came from, and when a “ legitimate ” agent suddenly appears in the wrong place at th…”
T1586.002Email Accounts
56%
“most common identity threats, followed closely by mailbox manipulation and persistence that often signal business email compromise ( bec ). managed ispm is designed to harden those paths, so fewer of those threats ever become incidents to clean up. the big picture : unified defen…”
T1133External Remote Services
51%
“2026 cyber threat report puts hard numbers behind those skeletons in the closet. we ’ ve seen a 277 % surge in the abuse of remote monitoring and management ( rmm ) tools, as attackers turn trusted admin software into their own covert access channel. the report also notes logins …”
T1219Remote Access Tools
45%
“the huntress soc doesn ’ t just battle elite zero ‑ days. often, incidents are caused by the quiet, messy reality of unauthorized apps, over - privileged accounts, and misconfigurations that overstretched teams never get around to cleaning up. rogue datto rmm via fake microsoft s…”
T1078Valid Accounts
40%
“2026 cyber threat report puts hard numbers behind those skeletons in the closet. we ’ ve seen a 277 % surge in the abuse of remote monitoring and management ( rmm ) tools, as attackers turn trusted admin software into their own covert access channel. the report also notes logins …”

Summary

Huntress "shifts left" with Managed ESPM and Managed ISPM. We proactively harden your endpoints and identities to close the security gaps that attackers love to exploit.