WatchGuard Blog - Distributed Enterprise

4 Differences Between Threat Hunting vs. Threat Detection

Companies are becoming aware of the importance of building threat detection and hunting capabilities that avoid putting their businesses at risk. But sometimes we confuse these two concepts so in this article we have listed the main differences between them .

Remote access trojans (RATs) threaten the airline industry

The hackers used remote access trojans, which give cyberattackers control of targeted systems remotely. As these cyber attacks have shown, malware can still reach its victims, especially if they open the door to the trojan duped by spear phishing.

Capcom's VPN, the entry point for ransomware

The company acknowledged that the data of up to 390,000 users could have been compromised, later confirming that 16,415 users had suffered data theft. This clearly highlighted the danger of ransomware cyberattacks.