10 things threat hunters watch for
Image by Thinkstock
Pursuing cyber threats is much like conventional hunting in that it requires patience, persistence and a keen eye, and when done correctly, it can be both exhilarating and rewarding. Threat actors do everything in their power to blend in and attempt to become a ghost in your network, so it is the job of the security professional to be the ghostbuster, says Tim Bandos, director of cybersecurity at Digital Guardian. In order to track and acquire an elusive target, a threat hunter needs to be well equipped with the right skills and tools. Start by loading up on cyber threat knowledge and centralizing critical logging data. He sets out the common indicators that say a threat is underway.
To read this article in full or to leave a comment, please click here
Read more: 10 things threat hunters watch for
More antivirus and malware news?
- Chinese Hackers Hit Technology Firms in Southeast Asia With PcShare Backdoor
- Apple’s new tool will make it easier for law enforcement to request data
- Five security questions you should be asking about the Apple Watch
- S3 Ep114: Preventing cyberthreats – stop them before they stop you! [Audio + Text]
- Hackers tapping home applicances to launch attacks
- Web server hackers install rogue Apache modules and SSH backdoors, researchers say
- How to prevent hackers from taking down critical infrastructure
- Sharing Sensitive Corporate Documents Without Compromising Security and Governance
- What You Need to Know About the FedEx SMS Phishing Scam
- Microsoft Windows Kernel CVE-2016-0175 Local Security Bypass Vulnerability