Hunt Blog

Check out our latest threat hunting articles, tips and stories

November 14, 2023

Announcing IOC-Hunter

As the end of the year approaches, we continue to enhance our feature set by building on well-established threat-...

October 31, 2023

Gateway to Intrusion: Malware Delivery Via Open Directories

Attackers constantly devise new and sophisticated methods of delivering malware to infiltrate systems and exfiltrate...

October 25, 2023

How Identifies Services on Non-Standard Ports

The term “threat hunting” is generally associated with detecting malicious behavior on endpoints manually...

October 12, 2023

Phish No More: A Guide to Gophish Detection

Phishing is more than a social engineering technique; it's a harrowing threat landscape where deception, innovation, and vigilance collide.

September 28, 2023

JA4: Decoding Cyber Shadows

In the ever-evolving world of cybersecurity, few individuals embody the spirit of innovation and exploration as profoundly as John Althouse.

September 19, 2023

Hunt Platform Statistics Launch

Learn about the massive observation collection platform.

September 12, 2023

Discovering & Disrupting Malicious Infrastructure

Michael showcases how the Hunt platform can be leveraged to proactively identify infrastructure not yet publicly reported on from recent malware campaigns.

August 17, 2023

Transparency of Attacker Tooling

How Open Directories Help with Threat Hunting and Incident Response.

August 01, 2023

Let's go Hunting

We are excited to unveil, a cutting-edge threat hunting solution that is set to transform the landscape of cybersecurity.