Data and technologies
Threat hunting sources
Threat hunters rely on different sources of information, such as the following to create hunts:
Threat intelligence
Collection of data related to known threats and threat actors
Threat actors targeting your organization
Information sharing between organizations within the same sector
Zero-day exploits against similar organizations
New vulnerabilities being leveraged by attackers
Internal findings
The findings identified by various teams conducting assessments
Internal audit
Enterprise risk teams
Red Team
Security incidents
Lessons learned phase of incident response captures valuable information that could be leveraged by threat hunting. These could be tactics/techniques identified during incident response, gaps in coverage, vulnerabilities, etc
MITRE ATT&CK framework
Tactics and techniques outlined in the framework are great resources to identify and prioritize hunts to be conducted within your organization
Organizational knowledge
Knowledge of know gaps, broken processes, etc, derived from time spent with an organization is another great source for threat hunting
Anomalous activity
Activity that deviates from established security configurations or behaviors is another input for threat hunting
Last updated