Threat hunting is the process of looking for malicious activity and its artifacts in a computer system or network. Threat hunting is carried out intermittently in an environment regardless of whether or not threats have been discovered by automated security solutions. Some threat actors may stay dormant in an organization’s infrastructure, extending their access while waiting for the right

- November 18, 2022
- by
- Cyber News, Cyber Threat Trends
- Less than a minute
- 339 Views
Related Post
- by Francis Schmuff
- April 22, 2025
Docker Malware Exploits Teneo Web3 Node to Earn
Cybersecurity researchers have detailed a malware campaign that’s targeting Docker environments with a previously undocumented technique to mine cryptocurrency. The
- by Francis Schmuff
- April 22, 2025
GCP Cloud Composer Bug Let Attackers Elevate Access
Cybersecurity researchers have detailed a now-patched vulnerability in Google Cloud Platform (GCP) that could have enabled an attacker to elevate
- by Francis Schmuff
- April 22, 2025
5 Major Concerns With Employees Using The Browser
As SaaS and cloud-native work reshape the enterprise, the web browser has emerged as the new endpoint. However, unlike endpoints,
- by Francis Schmuff
- April 22, 2025
Phishers Exploit Google Sites and DKIM Replay to
In what has been described as an “extremely sophisticated phishing attack,” threat actors have leveraged an uncommon approach that allowed