Jericho Security | Glossary

Jericho's Cybersecurity Glossary | Threat Hunting

Written by Jericho Security Team | September 28, 2024

Definition:

Threat hunting is the proactive search for threats or security incidents within a network or system that have evaded traditional security measures. It involves manually and systematically identifying suspicious activities or potential threats.

Use Cases:

  • Used by security analysts to uncover hidden threats such as advanced persistent threats (APTs) that have bypassed automated security systems.
  • Employed in organizations with mature cybersecurity programs to detect early signs of breaches or attacks.

Related Terms:

Questions and Answers:

  • How does threat hunting differ from traditional security monitoring?
    Traditional security monitoring relies on automated alerts, while threat hunting is a manual, proactive approach to discovering potential threats that may go undetected.

  • What tools are used in threat hunting?
    Threat hunters use a variety of tools, including SIEM systems, endpoint detection and response (EDR) solutions, and network traffic analysis tools.

  • Why is threat hunting important for cybersecurity?
    Threat hunting helps identify and neutralize sophisticated attacks early, reducing the potential damage caused by undetected threats.