From CISO Marketplace — the hub for security professionals Visit

Cyber Threat Hunting

Threat Intelligence

Definition

The practice of proactively searching for cyber threats that are lurking undetected in a network.

Technical Details

Cyber Threat Hunting is a proactive cybersecurity practice that involves actively searching for threats and vulnerabilities within a network, beyond the traditional reactive measures of relying solely on automated detection tools. It employs techniques such as anomaly detection, behavioral analysis, and threat intelligence to identify potential intrusions or malicious activities that may not be detected by standard security controls. Threat hunters utilize various tools and methodologies, including SIEM (Security Information and Event Management) systems, endpoint detection and response (EDR) solutions, and threat intelligence feeds, to analyze network traffic, logs, and endpoints for indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) used by attackers.

Practical Usage

In practice, organizations implement Cyber Threat Hunting to enhance their security posture by proactively identifying and mitigating threats before they can cause significant damage. This can involve setting up dedicated threat hunting teams that utilize a combination of automated tools and manual investigation techniques. Regular threat hunting exercises can help organizations detect insider threats, advanced persistent threats (APTs), and zero-day vulnerabilities. By continuously monitoring and analyzing network behaviors and anomalies, organizations can respond to potential threats more swiftly and effectively, thereby reducing the likelihood of successful cyber attacks.

Examples

Related Terms

Incident Response Threat Intelligence Vulnerability Management Security Operations Center (SOC) Anomaly Detection
← Back to Glossary