We’ll be hosting a live demo on (register here ). And for those who want to dig into the detection logic, our full Lynx rule set is open for review in the Huntress GitHub repo. Final thought You don’t catch a lynx by staring at the same trail every day. You watch the shadows, the silence, the small disruptions in normal life. That’s what Lynx does for your endpoints—every second of every day.
April 14, 2026
Stay sharp.
Today, we’re pulling back the curtain on our newest threat-hunting module: . Designed for the modern edge—where endpoints roam, identities shift, and attackers hide in plain sight—Lynx brings real-time, behavior-driven hunting to every corner of your managed environment. What’s different about Lynx? Most EDRs and MDRs wait for a signature or a known IOC. Lynx doesn’t. It watches for patterns of stealth : process hollowing, abnormal scheduler tasks, registry changes that mimic legitimate software, and credential harvesting attempts that happen outside business hours. huntress lynx