Methodologies
Hypothesis-driven
often triggered by a new threat that’s been identified through a large pool of crowdsourced attack data, giving insights into attackers’ latest TTP
threat hunters will then look to discover if the attacker’s specific behaviors are found in their own environment.
Known IOC and IOA
involves leveraging tactical threat intel to catalog known IOC and IOA
become triggers that threat hunters use to uncover potential hidden attacks or ongoing malicious activity
Advanced analytics and machine learning
combines powerful data analysis and machine learning to sift through a massive amount of information in order to detect irregularities that may suggest potential malicious activity
These anomalies become hunting leads that are investigated by skilled analysts to identify stealthy threats
Last updated