Threat hunting

Threat hunting
Introduction Threat hunting requires that the hunter understand the mind of the adversary and seek to take out attacks before the hunters can themselves be d

November 30, 2018
Lester Obbayi
Threat hunting
Introduction There has been a recent colossal surge in targeted attacks, including complex penetration techniques, compromise of users’ credentials, fileless

November 26, 2018
Fakhar Imam
Threat hunting
Cyber-attacks are increasing in number every day, as well as in their frequency and sophistication; worse, they often circumvent organizations’ existing prot

November 26, 2018
Fakhar Imam
Threat hunting
Introduction An overwhelming increase in sophisticated and targeted attacks from threat actors, or even nation-states such as Iran, China and Russia, have ma

November 26, 2018
Fakhar Imam
Threat hunting
Before moving forward in describing the threat hunting maturity model, we need to understand what threat hunting is. Threat hunting is the act of proactively

November 25, 2018
Fakhar Imam
Threat hunting
When we think of modern threat hunting, we think about proactively looking for exceptional situations across the network. Rather than waiting for an incident

November 01, 2018
Daniel Goldberg
Threat hunting
The VERIS methodology was created by Verizon back in 2010. This was an effort to create an environment for the classification of specific information. The VE

August 18, 2018
Mahwish Khan
Threat hunting
Indicators of compromise or IOCs are evidence indicating a breach of security. IOC includes virus signature, IP address, Hash value of Malware, Malici

August 10, 2018
Ifeanyi Egede
Threat hunting
Threat Hunting is "the process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security

July 31, 2018
Ifeanyi Egede
Threat hunting
Introduction Just like any good treasure hunt, you need a map or clues to be successful. Threat hunting is no different – Indicators of Compromise (IoC) can

July 31, 2018
Greg BeldingIn this series
- Compromise assessment or threat hunting? What do organizations need?
- Deception technologies: 4 tools to help you identify threats and mitigate risks
- Threat hunting with Kolide and osquery
- Threat hunting with osquery
- Threat hunting with Cymon API
- Threat hunting with Graylog
- Threat Hunting: Remediation
- Threat-hunting techniques: Conducting the hunt
- Top 10 Free Threat-Hunting Tools
- Threat Hunting: Data Collection and Analysis
- Threat Hunting: Detecting Adversaries
- Threat Hunting: Detecting Threats
- 10 Tips for Effective Threat Hunting
- How to Conduct a Threat Hunt – 10 Steps
- Threat hunting maturity model
- Best Practices for Threat Hunting in Large Networks
- VERIS INCIDENT FRAMEWORK
- Threat Hunting for Mismatched Port – Application Traffic
- Threat Hunting for File Hashes as an IOC
- Threat Hunting for File Names as an IoC
- Threat Hunting for URLs as an IoC
- Threat Hunting for Domains as an IOC
- Threat Hunting and HTML Response Size
- Threat Hunting for Unusual Logon Activity
- Threat Hunting for Swells in Database Read Volume
- Threat Hunting for Unusual DNS Requests
- Threat Hunting for Anomalies in Privileged Account Activity
- 5 Commercial Threat-Hunting Platforms That Can Provide Great Value to Your Hunting Party
- Threat Hunting for Suspicious Registry and System File Changes
- Threat Hunting for DDoS Activity and Geographic Irregularities
- The Current Job Outlook for Threat Hunters
- How to Build a Threat-Hunting Tool in 10 Steps
- Threat Hunting and SOC
- Threat Hunting vs. SIEM
- 10 Benefits of Threat Hunting
- Threat Hunting Techniques
- Threat Hunting Methodologies
- Threat hunting: IOCs and artifacts
- How to Become a Threat Hunter
- Threat-Hunting Process
- The Ultimate Guide to Threat Hunting
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!