Bring Your Own Hunts to HUNTER471
As a HUNTER471 customer utilizing the Hunt Management Module (HMM), you can now “bring your own” (BYO) threat hunting content to the HUNTER471 threat hunting platform.
Threat Hunting Case Study: Uncovering Turla
Adversaries try to hide malicious components by renaming them as legitimate Windows binaries. This technique has been used by the Turla threat actor group and others. Here's how to threat hunt for this behavior.
Threat Hunting Case Study: Tracking Down GootLoader
GootLoader is malware used to gain initial access to computers for exploitation by threats such as ransomware. In this case study, we describe how to use the HUNTER platform to threat hunt GootLoader infections.
Threat-Informed Defense through Behavioral Threat Hunting
Why Behavioral Threat Hunting is the Big Thing for Cybersecurity in 2024
![The Imperative Role of Threat Hunting in Exposure Management](https://intel-website.transforms.svdcdn.com/production/Intel-471-Logo-2024.png?w=570&h=321&q=80&fm=webp&fit=crop&crop=focalpoint&fp-x=0.5&fp-y=0.5&dm=1733342026&s=3fce5d4a57ac52e70c3b891a7158053a 570w)
The Imperative Role of Threat Hunting in Exposure Management
![Prioritization in Cybersecurity: Navigating the Content Revolution](https://intel-website.transforms.svdcdn.com/production/Intel-471-Logo-2024.png?w=570&h=321&q=80&fm=webp&fit=crop&crop=focalpoint&fp-x=0.5&fp-y=0.5&dm=1733342026&s=3fce5d4a57ac52e70c3b891a7158053a 570w)
Prioritization in Cybersecurity: Navigating the Content Revolution
![Balancing Act: How AI/ML Can Both Aid and Obstruct Threat Hunting](https://intel-website.transforms.svdcdn.com/production/Intel-471-Logo-2024.png?w=570&h=321&q=80&fm=webp&fit=crop&crop=focalpoint&fp-x=0.5&fp-y=0.5&dm=1733342026&s=3fce5d4a57ac52e70c3b891a7158053a 570w)
Balancing Act: How AI/ML Can Both Aid and Obstruct Threat Hunting
![Proactively Threat Hunting in the Cloud: Why It's Essential](https://intel-website.transforms.svdcdn.com/production/Intel-471-Logo-2024.png?w=570&h=321&q=80&fm=webp&fit=crop&crop=focalpoint&fp-x=0.5&fp-y=0.5&dm=1733342026&s=3fce5d4a57ac52e70c3b891a7158053a 570w)
Proactively Threat Hunting in the Cloud: Why It's Essential
![Threat Intelligence: The Pulsing Heart of Behavioral Threat Hunting](https://intel-website.transforms.svdcdn.com/production/Intel-471-Logo-2024.png?w=570&h=321&q=80&fm=webp&fit=crop&crop=focalpoint&fp-x=0.5&fp-y=0.5&dm=1733342026&s=3fce5d4a57ac52e70c3b891a7158053a 570w)