Continuous Threat Hunting
Cyber threat hunting is an active cyber defence activity. It is the practice of proactively searching for cyber threats that are lurking undetected in a network. Cyber threat hunting digs deep to find malicious actors in your environment that have slipped by your initial endpoint security defenses....After sneaking in, an attacker can stealthily remain in a network for months as they silently collect data, look for confidential material, or obtain login credentials that will permit them to move across the environment. Once an adversary is successful in evading detection and an attack has penetrated an organization’s defenses, many organisations lack the advanced detection capabilities needed to stop the advanced persistent threats from remaining in the network. That is why threat hunting is a powerful weapon of any defense strategy. Threat hunting is in contrast to traditional threat management measures, such as firewalls, intrusion detection systems (IDS), malware sandbox (computer security) and SIEM systems, which involve an investigation of evidence-based data after there has been a warning of a threat. On average, cybercriminals spend about 191 days inside a network before being discovered, and that is more than enough time to cause serious damage. In contrast to a forensic investigation, which is designed to work out what went wrong after an attack, threat hunting aims to track down these waiting attackers and stop them in their tracks before they have the chance to cause any significant damage. Even though your automated security tools and tier 1 and 2 security operations center (SOC) analysts should be able to deal with roughly 80 percent of threats, you still need to worry about the remaining 20 percent, which is more likely to include advanced persistent threats (APTs) that can cause significant damage. Threats that are unsophisticated, automated or untargetted should be easy to detect or block, but those that carefully evade the tools designed to stop them typically come from advanced persistent attackers — groups or individuals who directly target your organisation and network. Compared to a basic hacking attempt, an APT demands significantly more effort and attention from the SOC and response team. Threat hunting is becoming increasingly important and vital as companies seek to stay ahead of the latest cyber threats and rapidly respond to any potential attacks.
Read more