Types of threat hunting
Structured
based on IOA and TTP of the attacker
the hunter can usually identify a threat actor even before the attacker can cause damage to the environment
use MITRE ATT&CK Frameworks (PRE-ATT&CK and enterprise frameworks)
Last updated