This chapter covers
- The stages of the Cyber Kill Chain
- How threat hunters uncover cyber threats
- Threat hunting versus threat farming
- The hypothesis-driven approach of the threat- hunting process
- The characteristics of successful threat hunting
- The core tools that threat hunters use
The chapter introduces the Cyber Kill Chain, provides an overview of the cybersecurity threat landscape, and shows how threat hunting tackles complex cybersecurity challenges. We will discuss the thought process behind threat hunting, laying down the fundamental concepts of a successful practice. The chapter also highlights the differences and similarities between threat hunting and threat detection and ends with an overview of threat hunters’ core tools. We’ll start with an overview of the cybersecurity threat landscape and see why threat hunting is essential.
Definition
1.1 Cybersecurity threat landscape
Today’s cyber threat landscape is complex, evolving, and diverse. Threat actors ranging from organized cybercriminals to state-sponsored groups actively improve their existing attack techniques and tools and create new ones to move through the Cyber Kill Chain.