▲ | spogbiper 3 days ago | |||||||||||||||||||||||||||||||
If you work for a company that's bigger than a mom and pop, chances are very good that your IT department has this same level of access to any computer used in the organization. Huntress is basically an outsourced portion of the IT department for smaller companies that don't have their own 24/7 security team. It's a pretty common thing, with many vendors offering this type of service. Your work computer may have a similar product/service installed | ||||||||||||||||||||||||||||||||
▲ | ctoth 3 days ago | parent [-] | |||||||||||||||||||||||||||||||
This makes total sense.. Except who is the SMB in this case? It sounds like the person just downloaded this off the Internet, it wasn't pre-installed by IT. So it sounds like Huntress has full and complete access to whoever downloads their software to try it out/demo it... and aren't afraid to use this access for their own purposes/just do a bit of poking around because why not? When a hostname matches? | ||||||||||||||||||||||||||||||||
|