What Is Cyber Threat Hunting? (Definition & How it Works)
Tech Republic Security
JANUARY 31, 2024
Cyber threat hunting is the proactive process of searching for and detecting potential threats or malicious activities within a network or system.
This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Tech Republic Security
JANUARY 31, 2024
Cyber threat hunting is the proactive process of searching for and detecting potential threats or malicious activities within a network or system.
Tech Republic Security
OCTOBER 27, 2022
The post 2022 cyber threat report details growing trends appeared first on TechRepublic. SonicWall’s mid-year report update has been released with new information on malware, ransomware, cryptojacking and more.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Adam Levin
MARCH 17, 2022
The post The March Madness Cyber Threat appeared first on Adam Levin. Abandoned or inactive email accounts within an organization provide an easy way into workplace emails for hackers, because unusual activity will go unnoticed. Delete or archive employee emails when they leave the company. .
Tech Republic Security
FEBRUARY 6, 2024
Here are the top cyber threat hunting tools that can enhance your organization's cybersecurity defenses. Learn how their features compare.
Lohrman on Security
SEPTEMBER 10, 2023
In this interview with Dick Wilkinson, CTO at Proof Labs, we explore the cyber threats in space and on the Internet of Things, and how they impact each of us.
Lohrman on Security
AUGUST 29, 2021
From cryptocurrency thefts to hacking bank accounts, SIM swapping is a growing threat online. Here are relevant definitions, real-world examples and tips to help stop cyber criminals.
The Hacker News
OCTOBER 16, 2024
To defend your organization against cyber threats, you need a clear picture of the current threat landscape. This means constantly expanding your knowledge about new and ongoing threats. There are many techniques analysts can use to collect crucial cyber threat intelligence.
The Last Watchdog
NOVEMBER 7, 2023
Many individuals are curious about the strategies employed by law enforcement agencies to monitor and respond to these threats. Threat intel sharing Law enforcement agencies depend on multiple channels to aid their efforts against cyber threats. The primary source is the affected organization or individual.
The Last Watchdog
DECEMBER 16, 2024
Dunham Ken Dunham , Cyber Threat Director, Qualys Threat Research Unit Nation-state attacks and cloud compromises with long dwell times are rising as security lags behind post-Covid digital transformation. Vulnerabilities like data poisoning and prompt injection could have far-reaching impacts due to interconnected agents.
The Last Watchdog
OCTOBER 5, 2023
Acohido to share his ideas about the current cyber threat landscape, the biggest threats for businesses today, the role of AI and machine learning in cyberattacks and cyberdefence, and the most effective methods for companies to protect themselves. Erin: What are some of the biggest cyber threats that businesses face today?
Tech Republic Security
NOVEMBER 6, 2024
DNS hijacking is a growing threat that can redirect users to malicious sites. However, using passive DNS monitoring can help to protect data.
Tech Republic Security
NOVEMBER 22, 2023
Phishing, infostealer malware, ransomware, supply chain attacks, data breaches and crypto-related attacks are among the top evolving threats in the financial sector, says Sekoia.
The Hacker News
DECEMBER 17, 2024
Addressing cyber threats before they have a chance to strike or inflict serious damage is by far the best security approach any company can embrace. Achieving this takes a lot of research and proactive threat hunting. The problem here is that it is easy to get stuck in endless arrays of data and end up with no relevant intel.
Tech Republic Security
OCTOBER 16, 2024
Zscaler ThreatLabz report reveals a 2024 surge in mobile, IoT, and OT cyberattacks, highlighting key trends and the need for zero trust security.
Tech Republic Security
NOVEMBER 6, 2024
AI-enhanced malicious attacks are a top concern for 80% of executives, and for good reason, as there is a lot of evidence that bad actors are exploiting the technology.
Penetration Testing
SEPTEMBER 12, 2024
A new report from Mandiant revealed the increasing cyber threats faced by Mexico, with a complex mix of global espionage and local cybercrime targeting both users and enterprises. As the... The post Cyber Threats Intensify in Mexico: Insights from Mandiant on Espionage and Extortion appeared first on Cybersecurity News.
The Last Watchdog
SEPTEMBER 4, 2024
4, 2024, CyberNewsWire — In a proactive response to the rapidly evolving landscape of cyber threats, INE Security , a global leader in cybersecurity and network training, today unveiled a crucial initiative aimed at fortifying corporate defenses against digital dangers. Cary, NC, Sept.
Tech Republic Security
JANUARY 24, 2024
The NCSC wants volunteers from the U.K.’s s public and private sectors to join its new cybersecurity community.
Pen Test Partners
SEPTEMBER 17, 2024
Securing these systems is a growing challenge, with current regulations not fully addressing cyber threats. Regulations and standards do not factor in active attackers, largely focusing on conventional threats such mechanical and electrical failure and human factors.
Trend Micro
AUGUST 14, 2024
This is the first blog in a series on Rogue AI. Later articles will include technical guidance, case studies and more.
Schneier on Security
APRIL 15, 2021
The office of the Director of National Intelligence released its “ Annual Threat Assessment of the U.S. Nothing surprising: Cyber threats from nation states and their surrogates will remain acute. Intelligence Community.” ” Cybersecurity is covered on pages 20-21.
Schneier on Security
DECEMBER 13, 2022
In many ways, ChatGPT and other AI technologies hold great promise for improving the ability of organizations and individuals to defend against cyber threats. One of the key ways in which ChatGPT is likely to affect cybersecurity is by enabling organizations to more quickly and accurately identify potential security threats.
The Hacker News
MAY 22, 2024
Rockwell Automation is urging its customers to disconnect all industrial control systems (ICSs) not meant to be connected to the public-facing internet to mitigate unauthorized or malicious cyber activity. The company said it's issuing the advisory due to "heightened geopolitical tensions and adversarial cyber activity globally."
Lohrman on Security
MARCH 31, 2024
With global cyber threats and other international tensions growing, what scenarios should state and local governments consider when conducting exercises to test their people, processes and technology?
Lohrman on Security
JANUARY 23, 2022
Recent cyber attacks against Ukrainian websites have focused global attention on the potential for wider online conflict. So what are the new cyber threats and potential scenarios to be prepared for?
The Hacker News
JULY 30, 2024
Learn about critical threats that can impact your organization and the bad actors behind them from Cybersixgill’s threat experts. Each story shines a light on underground activities, the threat actors involved, and why you should care, along with what you can do to mitigate risk.
The Hacker News
AUGUST 14, 2024
A previously unknown threat actor has been attributed to a spate of attacks targeting Azerbaijan and Israel with an aim to steal sensitive data. The attack campaign, detected by NSFOCUS on July 1, 2024, leveraged spear-phishing emails to single out Azerbaijani and Israeli diplomats. The activity is being tracked under the moniker Actor240524.
Krebs on Security
APRIL 15, 2020
At least three major industry groups are working to counter the latest cyber threats and scams. Among the largest in terms of contributors is the COVID-19 Cyber Threat Coalition (CTC), which comprises rough 3,000 security professionals who are collecting, vetting and sharing new intelligence about new cyber threats.
IT Security Guru
NOVEMBER 12, 2024
We’re entering a new era of cyber threats – a digital pandemic. These cyber incidents can best be described as a digital pandemic – in which a single hack or point of failure spreads through critical infrastructure and shuts it down, impacting thousands. What is a digital pandemic?
Tech Republic Security
SEPTEMBER 27, 2024
Mimecast said a phishing campaign using Atlassian workspaces shows the growing sophistication of cyber threat actors.
The Last Watchdog
NOVEMBER 15, 2021
To deal with misleading information, businesses and authorities need to establish cybersecurity practices and policies that can evolve and adapt to the multifaceted cyber threats. Executives and leaders should be trained to recognize cyber threats when they see one.
Lohrman on Security
OCTOBER 30, 2022
Cyber summits were held this past week in Michigan and Kansas, and hot topics ranged from workforce development to ransomware to growing global cyber threats. Here’s a rundown.
Joseph Steinberg
JANUARY 7, 2021
While much of the security-oriented focus regarding the storming of the Capitol building by protesters yesterday has rightfully been on the failure of the Capitol Police to prevent the breach of security, the country also faces a potentially serious cyber-threat as a result of the incident.
The Hacker News
NOVEMBER 4, 2024
Data from the Imperva Threat Research team’s As the holiday season approaches, retail businesses are gearing up for their annual surge in online (and in-store) traffic. Unfortunately, this increase in activity also attracts cybercriminals looking to exploit vulnerabilities for their gain.
The Last Watchdog
FEBRUARY 11, 2024
Every industry is dealing with a myriad of cyber threats in 2024. Experience, on top of the right tools, are necessary to withstand the onslaught of cyber threats currently bombarding the finance sector. To put it plainly, if you hand a tennis novice Serena Williams’ racket, their chances of winning the U.S.
Tech Republic Security
DECEMBER 9, 2022
Tech firm aims to strengthen security for users and meet modern cyber threat challenges with new cybersecurity technology and end-to-end cloud encryption. The post Apple unveils new iMessage, Apple ID and iCloud security for high-value targets appeared first on TechRepublic.
Tech Republic Security
APRIL 21, 2023
The Center for Internet Security, founded in 2000 to address growing cyber threats and establish a set of cybersecurity protocols and standards like CIS Critical Security Controls and. Google Cloud and The Center for Internet Security, Inc.,
The Last Watchdog
APRIL 20, 2023
As RSA Conference 2023 gets underway next week at San Francisco’s Moscone Center, advanced ways to gather and infuse cyber threat intelligence, or CTI , into fast-evolving network defenses is in the spotlight. I had the chance to visit with Jason Passwaters, CEO of Intel 471 , a US-based supplier of cyber threat intelligence solutions.
The Hacker News
FEBRUARY 29, 2024
The Five Eyes (FVEY) intelligence alliance has issued a new cybersecurity advisory warning of cyber threat actors exploiting known security flaws in Ivanti Connect Secure and Ivanti Policy Secure gateways, noting that the Integrity Checker Tool (ICT) can be deceived to provide a false sense of security.
The Last Watchdog
JUNE 10, 2024
June 10, 2024, CyberNewsWire — AI SPERA, a leader in Cyber Threat Intelligence (CTI) solutions, announced that it has started selling its paid threat detection data from its CTI search engine ‘ Criminal IP ‘ on the Snowflake Marketplace. Torrance, Calif., About AI Spera.
Tech Republic Security
DECEMBER 7, 2023
18, publicly traded companies will need to report material cyber threats to the SEC. Starting Dec. Deloitte offers business leaders tips on how to prepare for these new SEC rules.
The Last Watchdog
NOVEMBER 14, 2023
Notably, Sophos X-Ops from day one has actively participated in external sharing, via the Cyber Threat Alliance ( CTA )and the Microsoft Active Protections Program ( MAPP.) As cyber threats continue to evolve and scale up, the urgency for companies and government agencies to do much more of this is intensifying.
The Hacker News
JUNE 3, 2024
Threat actors are evolving, yet Cyber Threat Intelligence (CTI) remains confined to each isolated point solution. Organizations require a holistic analysis across external data, inbound and outbound threats and network activity. Cato’s Cyber Threat Research Lab (Cato CTRL, see more details below) has recently released
Joseph Steinberg
JANUARY 30, 2024
The esteemed expert panel for the webinar will consist of Dror Liwer, Co-Founder of Coro, and Joseph Steinberg, Cybersecurity, Privacy and Artificial Intelligence (AI) Expert, who will delve into the intricacies of cyber threats, offering insights into evolving attack vectors, vulnerabilities, and the changing tactics employed by cyber adversaries.
Expert insights. Personalized for you.
We have resent the email to
Are you sure you want to cancel your subscriptions?
Let's personalize your content