"just like the attacker ’ s workflow, threat hunting usually kicks off with some reconnaissance. most commonly, this is determined by identifying risk areas or looking at historical data to specify the patterns and potential threats to hunt down. this can also come from various ou…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1593Search Open Websites/Domains
36%
"ring, threat hunters take the initiative to track down adversaries that might be in their environment. it heavily relies on human expertise and the ability to think like the adversary. typically, the goal of any threat hunt can include one ( or more ) of the following : - find ma…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1595Active Scanning
35%
"breaking down the threat hunting process | huntress in the ever - changing cyber landscape, new threats emerge daily, testing the resiliency of businesses worldwide. to effectively stay ahead of these threats, many businesses are turning to threat hunting, the discipline of proac…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1595Active Scanning
34%
"rules that can alert on that activity in the future. - improve process : because threat hunting is an iterative process, there ’ s always an opportunity to create a feedback loop and look for areas for improvement — in both the hunting process and the organization ' s security po…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1595Active Scanning
32%
"ring, threat hunters take the initiative to track down adversaries that might be in their environment. it heavily relies on human expertise and the ability to think like the adversary. typically, the goal of any threat hunt can include one ( or more ) of the following : - find ma…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1595Active Scanning
31%
"expected threat activity they ’ re looking for and the general direction their hunt will go in. unstructured hunting is more freestyle, allowing threat hunters to be guided by their curiosity. there are no strict guidelines, and they explore rabbit holes or work off of hunches or…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Discover the key phases of the threat hunting process and how threat hunters structure their hunts to proactively seek out threats.