Get Help Now
    24/7 Support

    Threat Hunting Techniques

    A lot of information on the subject of threatening hunting and Alan Kahn did not stay aloof. In his post he refreshes in memory several common methods of hunting.

     


    Elan tells about popular methods of hunting:
    1. Searching;
    2. Clustering;
    3. Grouping;
    4. Stack Counting.

     
    While these methods in no way represent a holistic hunt for C2, Elan showed how Sqrrl is an innovative solution that addresses the full range of methods and skill levels of the analyst, from beginner to the most senior threat hunter in your organization. Sqrrl will simplify most of the complexity and cut out the trivial work.

     
    By the way Elan gives examples from practice, after how to refresh the memory of these methods.

     

    More.



    DISCLAIMER: THIS POST IS FOR INFORMATIONAL PURPOSES ONLY AND IS NOT TO BE CONSIDERED LEGAL ADVICE ON ANY SUBJECT MATTER. DIGITAL FORENSICS CORP. IS NOT A LAWFIRM AND DOES NOT PROVIDE LEGAL ADVICE OR SERVICES. By viewing posts, the reader understands there is no attorney-client relationship, the post should not be used as a substitute for legal advice from a licensed professional attorney, and readers are urged to consult their own legal counsel on any specific legal questions concerning a specific situation.