Hunt Blog
Check out our latest threat hunting articles, tips and stories

November 14, 2023
Announcing IOC-Hunter
As the end of the year approaches, we continue to enhance our feature set by building on well-established threat-...

October 31, 2023
Gateway to Intrusion: Malware Delivery Via Open Directories
Attackers constantly devise new and sophisticated methods of delivering malware to infiltrate systems and exfiltrate...

October 25, 2023
How Hunt.io Identifies Services on Non-Standard Ports
The term “threat hunting” is generally associated with detecting malicious behavior on endpoints manually...

October 12, 2023
Phish No More: A Hunt.io Guide to Gophish Detection
Phishing is more than a social engineering technique; it's a harrowing threat landscape where deception, innovation, and vigilance collide.

September 28, 2023
JA4: Decoding Cyber Shadows
In the ever-evolving world of cybersecurity, few individuals embody the spirit of innovation and exploration as profoundly as John Althouse.

September 19, 2023
Hunt Platform Statistics Launch
Learn about the Hunt.io massive observation collection platform.

September 12, 2023
Discovering & Disrupting Malicious Infrastructure
Michael showcases how the Hunt platform can be leveraged to proactively identify infrastructure not yet publicly reported on from recent malware campaigns.

August 17, 2023
Transparency of Attacker Tooling
How Open Directories Help with Threat Hunting and Incident Response.

August 01, 2023
Let's go Hunting
We are excited to unveil Hunt.io, a cutting-edge threat hunting solution that is set to transform the landscape of cybersecurity.