Threat Hunting the Unknown
Threat hunting is not about detecting known threats or indicators of compromise (IoCs). It is intended to find new attacks that could have gone under the radar with any other security technology.
So rather than identifying malware, ransomware or phishing, threat hunting detects hackers that do not use malware but trusted and administrative applications that execute malwareless or fileless attacks that have stolen admin credentials and are freely moving in the network.
Pedro Uria, our threat hunter analyst director, and Manu Santamaria, senior product manager of our Endpoint Security solution will show how MSPs can enhance their cybersecurity posture through threat hunting:
- Why threat hunting is a must
- Threat detection vs threat hunting
- A day in the life of a threat hunter
- Examples of hunting detections
- Providing services around threat hunting