top of page
Writer's pictureHarisuthan

Basic Of Cyber Threat Hunting



In recent trends, many adversaries remain hidden in an organization for a month before detection it has been too challenging for many organizations to detect and identify the cyber attacks, so it has become mandatory to have a clear understanding of the recent and current trends of cyber attacks.


Cyber threat hunting is a process of proactively detecting malicious or suspicious activity by investigating our internal system/organization to find/determine the advanced threats or the attack pattern using various tools and techniques.


Generally, threat hunting is termed as Hypothetical/Hypothesis based investigations where we usually create a new hypothesis to determine and investigate various attack patterns like IOC, IOA, Hashes malicious executable, etc.


IOC Vs IOA


IOC: Indicator of Compromise

Servers a attack evidence of potential intrusion on the host


IOA: Indicator of Attack

Identifies the end goal behind the cyber attack and techniques used by adversaries


Based on the recent attack vector organization doesn't relay on SOC team to wait for notification or alerts about something happens, so it required some proactivity detection to mitigate the risk before its happens Threat Hunting keeps on create hypothesis to investigate to find multiple patters


Benefits of Threat Hunting

  1. Reduce Cyber Risk

  2. Proactively detecting and responding adversaries attacks

  3. Behavior based detection

  4. Reduce investigation time

  5. Controls False Positive

144 views0 comments

Recent Posts

See All

Comments


bottom of page