Work Here?
Industries
Cybersecurity
Company Size
501-1,000
Company Stage
Series D
Total Funding
$309.8M
Headquarters
Columbia, Maryland
Founded
2015
Huntress provides managed endpoint detection and response (EDR) services to protect businesses from cyber threats, particularly ransomware. Their main service involves 24/7 monitoring of clients' systems to detect potential cyberattacks. When a threat is identified, their team of security experts verifies the activity and alerts the client only if necessary, reducing the number of false alarms that can occur with other services. In addition to threat detection, Huntress offers security awareness training and various resources to educate employees about cybersecurity risks. What sets Huntress apart from competitors is their commitment to high customer support and personalized reporting. The goal of Huntress is to enhance the cybersecurity posture of businesses by providing effective monitoring and education.
💡 Want to apply to Huntress?
You have ways to get a Huntress referral from your network.
Get referrals →
Help us improve and share your feedback! Did you find this helpful?
Total Funding
$309.8M
Above
Industry Average
Funded Over
6 Rounds
Industry standards
100% remote work environment
Generous PTO including vacation, sick time, and paid holidays
12 weeks paid parental leave
Highly competitive and comprehensive medical, dental, and vision benefits plans
401(k) with 5% contribution regardless of employee contribution
Life and Disability insurance plans
Stock options for all full-time employees
One-time $500 stipend to build/upgrade home office
Annual allowance for education and professional development assistance
$75 USD/month digital reimbursement
Access to both Udemy and BetterUp platforms for coaching, personal, and professional growth
Late last year, Huntress Labs Incorporated announced Early Availability of Huntress Managed SIEM, which was designed to make SIEM accessible to all businesses.
COLUMBIA, Md. and SAN FRANCISCO, CA, April 28, 2025 (GLOBE NEWSWIRE) -- Today, at the RSA Conference, Huntress unveiled its newly enhanced Managed Identity Threat Detection and Response (ITDR) solution, purpose-built to wreck hacker identity tradecraft, alongside new research on the growing threat of identity-based attacks and organizations' ability to defend against them.Drawing insights from an independent UserEvidence survey of more than 600 IT and security professionals, the Huntress 2025 Managed ITDR Report: Identity Is the New Security Perimeter reveals key trends highlighting the growing frequency, severity, and cost of identity-based attacks:Identity-based attacks are rising. A staggering 67% of organizations reported an increase in identity-based incidents over the past three years, with these attacks comprising more than 40% of security incidents for more than a third (35%) of organizations in the past year alone.A staggering 67% of organizations reported an increase in identity-based incidents over the past three years, with these attacks comprising more than 40% of security incidents for more than a third (35%) of organizations in the past year alone. Rogue applications are a top concern. Nearly half (45%) of respondents encountered rogue and/or malicious applications in the past year, and 46% cited them as a top identity-based concern.Nearly half (45%) of respondents encountered rogue and/or malicious applications in the past year, and 46% cited them as a top identity-based concern. Detection and response times are lagging
Tl;dr: To support CMMC compliance, Huntress released a new Sensitive Data Mode, which blocks SOC access to potential CUI files, without compromising analysts' ability to effectively detect and remediate threats.
The cornerstones of modern businesses are under attack. With the news Monday (Dec. 9) that cybercriminals, alleged to be from the ransomware group Termite, are exploiting a security flaw that affects Cleo’s LexiCom, VLTransfer and Harmony enterprise file transfer tools, securing critical business infrastructure that handles sensitive data has become an urgent need. Enterprise file transfer tools are designed to securely and efficiently transfer large volumes of data across systems, networks and organizations. These tools are essential for businesses that handle sensitive information or need to comply with regulatory requirements
A user needed just a few carefully crafted sentences to override an artificial intelligence system’s core directives, manipulating it into transferring $47,000 in cryptocurrency through social engineering and demonstrating how vulnerable AI’s decision-making remains to human psychological tactics.The recent solution of Freysa, an AI game bot explicitly programmed to never transfer funds, reveals how autonomous systems can be tricked through social engineering despite clear instructions.“This wasn’t simply an error within a financial application or a security vulnerability, but rather a crypto game that people would play to try and trick the AI application,” Seth Geftic, Vice President of Product Marketing at Huntress, a cybersecurity company, told PYMNTS. “Funnily enough, the strategy that the person used to finally ‘break through’ the model’s logic was fairly simple: asking it to ignore all previous instructions.”User’s Winning MovesFreysa was an AI agent holding $50,000 in crypto that was programmed never to transfer the funds. Users could pay a fee to try convincing it to break this rule, with one eventually succeeding after 482 attempts.According to an X post by developer Jarrod Watts, the winning user used a three-part strategy: establishing a new “admin session” to override previous rules, redefining the transfer function as meant for receiving rather than sending funds, and finally announcing a fake $100 contribution that triggered the release of the entire prize pool of 13.19 ETH.Watts called the project “one of the coolest projects we’ve seen in crypto.” It was designed as an open challenge in which participants could pay escalating fees to try to convince the AI to break its core directive.Geftic explained that the Freysa AI hack, while dramatic, exploited a known weakness that major AI systems already defend against. Production AI used in finance and healthcare incorporates safeguards that would have blocked such social engineering attempts.“With that in mind, this particular event does not teach us anything new but rather demonstrates how vital it is to follow the best cybersecurity practices, maintain systems at their most recent patches, and be aware of development related to software (AI or not) that a company uses,” he added.Preventing AI HacksWhile AI can handle most financial transactions effectively, its vulnerabilities to evolving cyber threats mean it shouldn’t operate alone, Geftic said. The optimal security approach combines automated AI systems for routine operations with human oversight of critical decisions and transactions.“For any interaction that poses a security risk (making a withdrawal or another transaction that has financial implications), the AI system can escalate the request to a human agent,” he added. “This system is already used within customer service chatbots with high success rates
$145k - $165k/yr
Remote in USA
$60k - $120k/yr
Remote in USA
Find jobs on Simplify and start your career today
Discover companies similar to Huntress
Industries
Cybersecurity
Company Size
501-1,000
Company Stage
Series D
Total Funding
$309.8M
Headquarters
Columbia, Maryland
Founded
2015
$225k - $240k/yr
Palmyra, VA, USA
$145k - $165k/yr
Remote in USA
$60k - $120k/yr
Remote in USA
Find jobs on Simplify and start your career today
Discover companies similar to Huntress