Huntress Lynx -

Today, we’re pulling back the curtain on our newest threat-hunting module: . Designed for the modern edge—where endpoints roam, identities shift, and attackers hide in plain sight—Lynx brings real-time, behavior-driven hunting to every corner of your managed environment. What’s different about Lynx? Most EDRs and MDRs wait for a signature or a known IOC. Lynx doesn’t. It watches for patterns of stealth : process hollowing, abnormal scheduler tasks, registry changes that mimic legitimate software, and credential harvesting attempts that happen outside business hours.

Stay sharp.

April 14, 2026