Posts

Showing posts from February, 2023

Threat Hunting Basics - Part 6

How to be a good Threat hunter  Cyber security threats are constantly evolving and can be difficult to detect, which is why the role of a threat hunter is so important. In this blog post, we'll explore the qualities and skills required for an effective threat hunter, and how they can best use their abilities to protect organizations from cyber attacks. "Technical expertise can be learned and trained. Personality traits and mindset are more difficult to shape," Positive personality traits Positive personality traits are essential for threat hunters because they set the tone for how the hunter will approach their work. A good threat hunter is someone who is patient, methodical, and detail-oriented. They are also someone who is able to think outside the box and come up with creative solutions to problems. Finally, a good threat hunter must be able to work well under pressure and maintain a cool head in stressful situations. Analytical Skills Analytical skills are critica

Threat Hunting Basics - Part 5

Image
 Threat Hunting Methodology  A threat hunter is a security analyst who uses manual or machine-assisted techniques to detect, isolate, and neutralize APTs that are not detected by automated security tools.  Threat hunters assume that adversaries are already in the system , and they initiate an investigation to find unusual behavior that may indicate the presence of malicious activity. Four  Methods involved in the hunting methodology are as follows:  Intel Based or Unstructured Hunting  The Intel-based hunting approach involves the reactive hunt technique associated with new threats. These IOCs become a trigger point for the threat hunter to uncover the malicious activity going on.  You can check out the previous blog which shows how Threat intelligence can be useful for the threat hunting approach. Behavior-based or Structured Hunting The most proactive threat-hunting technique is an investigation using indicators of attack or Indicators of behavior.  This technique commonly aligns wit