<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>ThreatHunter.ai Blog</title>
    <link>https://www.threathunter.ai/blog</link>
    <description>Expert insights on threat hunting, identity attacks, vulnerability management, and cybersecurity trends from the ThreatHunter.ai team.</description>
    <language>en-us</language>
    <lastBuildDate>Fri, 06 Mar 2026 06:08:11 GMT</lastBuildDate>
    <atom:link href="https://www.threathunter.ai/feed.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Infostealers Are the Biggest Story in Cybersecurity Right Now. Your MFA Will Not Save You.</title>
      <link>https://www.threathunter.ai/blog/infostealers-biggest-story-cybersecurity-mfa-wont-save-you</link>
      <guid isPermaLink="true">https://www.threathunter.ai/blog/infostealers-biggest-story-cybersecurity-mfa-wont-save-you</guid>
      <description>Infostealer malware is everywhere — in Chrome extensions, WhatsApp, fake AI tools, and GitHub repos. Attackers are not breaking your MFA. They steal what comes after it. The target is the session.</description>
      <pubDate>Mon, 16 Feb 2026 00:00:00 GMT</pubDate>
      <author>info@threathunter.ai (James McMurry)</author>
      <category>Threat Intel</category>
    </item>
    <item>
      <title>America's Cyber Defense Agency Is Burning Down and Nobody's Coming to Put It Out</title>
      <link>https://www.threathunter.ai/blog/americas-cyber-defense-agency-burning-down</link>
      <guid isPermaLink="true">https://www.threathunter.ai/blog/americas-cyber-defense-agency-burning-down</guid>
      <description>CISA lost a third of its staff and its acting leader uploaded sensitive docs to public ChatGPT — while China sits inside U.S. critical infrastructure.</description>
      <pubDate>Fri, 13 Feb 2026 00:00:00 GMT</pubDate>
      <author>info@threathunter.ai (James McMurry)</author>
      <category>Threat Intel</category>
    </item>
    <item>
      <title>A Love Letter That Broke the Internet: The ILOVEYOU Worm, 26 Years Later</title>
      <link>https://www.threathunter.ai/blog/love-letter-broke-internet-iloveyou-worm-26-years-later</link>
      <guid isPermaLink="true">https://www.threathunter.ai/blog/love-letter-broke-internet-iloveyou-worm-26-years-later</guid>
      <description>The ILOVEYOU worm infected 50 million machines in 10 days. Full technical breakdown and why the same attack pattern still works today.</description>
      <pubDate>Tue, 10 Feb 2026 00:00:00 GMT</pubDate>
      <author>info@threathunter.ai (James McMurry)</author>
      <category>Threat Intel</category>
    </item>
    <item>
      <title>The News Cycle Is Burning. Threat Actors Are Still Working.</title>
      <link>https://www.threathunter.ai/blog/news-cycle-burning-threat-actors-still-working</link>
      <guid isPermaLink="true">https://www.threathunter.ai/blog/news-cycle-burning-threat-actors-still-working</guid>
      <description>This has been our busiest week of 2026 so far. Chaos is cover. Confusion is opportunity. Fatigue is the best vulnerability scanner ever invented.</description>
      <pubDate>Fri, 06 Feb 2026 00:00:00 GMT</pubDate>
      <author>info@threathunter.ai (James McMurry)</author>
      <category>Threat Intel</category>
    </item>
    <item>
      <title>How to Detect AiTM Phishing Attacks</title>
      <link>https://www.threathunter.ai/blog/how-to-detect-aitm-phishing-attacks</link>
      <guid isPermaLink="true">https://www.threathunter.ai/blog/how-to-detect-aitm-phishing-attacks</guid>
      <description>AiTM attacks bypass MFA completely — attackers steal sessions while your tools see nothing wrong. Here is how to detect them.</description>
      <pubDate>Sun, 25 Jan 2026 00:00:00 GMT</pubDate>
      <author>info@threathunter.ai (ThreatHunter.ai Team)</author>
      <category>Technical</category>
    </item>
    <item>
      <title>What is Threat Hunting? A Complete Guide</title>
      <link>https://www.threathunter.ai/blog/what-is-threat-hunting-complete-guide</link>
      <guid isPermaLink="true">https://www.threathunter.ai/blog/what-is-threat-hunting-complete-guide</guid>
      <description>Learn what threat hunting is, why it matters for your organization, and how proactive detection differs from traditional security monitoring.</description>
      <pubDate>Mon, 15 Dec 2025 00:00:00 GMT</pubDate>
      <author>info@threathunter.ai (ThreatHunter.ai Team)</author>
      <category>Education</category>
    </item>
    <item>
      <title>How MILBERT AI Stops Authentication Attacks Before They Happen</title>
      <link>https://www.threathunter.ai/blog/milbert-ai-stops-authentication-attacks</link>
      <guid isPermaLink="true">https://www.threathunter.ai/blog/milbert-ai-stops-authentication-attacks</guid>
      <description>Discover how our agentic AI platform detects credential stuffing, password spraying, and other authentication attacks in real-time.</description>
      <pubDate>Fri, 28 Nov 2025 00:00:00 GMT</pubDate>
      <author>info@threathunter.ai (ThreatHunter.ai Team)</author>
      <category>Product</category>
    </item>
    <item>
      <title>2024 Threat Landscape: Key Trends We\'re Seeing</title>
      <link>https://www.threathunter.ai/blog/2024-threat-landscape-key-trends</link>
      <guid isPermaLink="true">https://www.threathunter.ai/blog/2024-threat-landscape-key-trends</guid>
      <description>Our hunt teams share the most significant attack patterns and threat actor behaviors observed across our client base this year.</description>
      <pubDate>Sun, 20 Oct 2024 00:00:00 GMT</pubDate>
      <author>info@threathunter.ai (ThreatHunter.ai Team)</author>
      <category>Threat Intel</category>
    </item>
    <item>
      <title>Browser-in-the-Browser Attacks Are the New Phishing Kit</title>
      <link>https://www.threathunter.ai/blog/browser-in-the-browser-attacks-new-phishing-kit</link>
      <guid isPermaLink="true">https://www.threathunter.ai/blog/browser-in-the-browser-attacks-new-phishing-kit</guid>
      <description>Browser-in-the-Browser (BitB) attacks make URL-checking advice useless. The URL looks perfect because the entire browser window is fake. Here is how they work, why your security stack misses them, and what defenders must monitor.</description>
      <pubDate>Thu, 05 Mar 2026 00:00:00 GMT</pubDate>
      <author>info@threathunter.ai (Ivan W.)</author>
      <category>Threat Intel</category>
    </item>
  </channel>
</rss>
