{"id":15061,"date":"2023-11-30T05:30:19","date_gmt":"2023-11-30T05:30:19","guid":{"rendered":"https:\/\/businessyield.com\/tech\/?p=15061"},"modified":"2023-12-01T13:54:33","modified_gmt":"2023-12-01T13:54:33","slug":"threat-hunting","status":"publish","type":"post","link":"https:\/\/businessyield.com\/tech\/cyber-security\/threat-hunting\/","title":{"rendered":"THREAT HUNTING: What Is It & How Does It Work","gt_translate_keys":[{"key":"rendered","format":"text"}]},"content":{"rendered":"

Generally, security analysts utilize an active information security approach and strategy called “threat hunting.” It involves repeatedly combing through logs from your network, cloud, and endpoint systems to find risks, including advanced persistent threats (APTs) that are eluding your current security system; threat actor tactics, methods, and procedures (TTPs); and indicators of compromise (IoCs). Well, that was a lot. So, let’s break it down.<\/p>

In this article, we will go over all you should know about threat hunting, especially how it works.<\/p>

What is Threat Hunting?<\/span><\/h2>

Threat hunting is a proactive approach to internet security wherein threat hunters actively look for hidden security hazards within a company’s network. Cyber hunting actively looks for dangers that may have eluded your network’s automated defensive mechanisms but were previously undetected, unknown, or unremediated. This contrasts with passive cyber security hunting techniques like mechanical threat detection systems.<\/p>

Threat-hunting consists of:<\/p>