Threat hunting

Threat Hunting: Detecting Adversaries

Introduction Threat hunting requires that the hunter understand the mind of the adversary and seek to take out attacks before the hunters can themselves be d

Threat Hunting: Detecting Threats

Introduction There has been a recent colossal surge in targeted attacks, including complex penetration techniques, compromise of users’ credentials, fileless

10 Tips for Effective Threat Hunting

Cyber-attacks are increasing in number every day, as well as in their frequency and sophistication; worse, they often circumvent organizations’ existing prot

How to Conduct a Threat Hunt – 10 Steps

Introduction An overwhelming increase in sophisticated and targeted attacks from threat actors, or even nation-states such as Iran, China and Russia, have ma

Threat hunting maturity model

Before moving forward in describing the threat hunting maturity model, we need to understand what threat hunting is. Threat hunting is the act of proactively

Best Practices for Threat Hunting in Large Networks

When we think of modern threat hunting, we think about proactively looking for exceptional situations across the network. Rather than waiting for an incident

VERIS INCIDENT FRAMEWORK

The VERIS methodology was created by Verizon back in 2010. This was an effort to create an environment for the classification of specific information. The VE

Threat Hunting for Mismatched Port – Application Traffic

  Indicators of compromise or IOCs are evidence indicating a breach of security. IOC includes virus signature, IP address, Hash value of Malware, Malici

Threat Hunting for File Hashes as an IOC

Threat Hunting is "the process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security

Threat Hunting for File Names as an IoC

Introduction Just like any good treasure hunt, you need a map or clues to be successful. Threat hunting is no different – Indicators of Compromise (IoC) can