English, asked by shajuu6, 7 months ago

threat hunters use which method?​

Answers

Answered by ashishpandey20052002
0

Answer:

Threat hunting is the practice of proactively searching for cyber threats that are lurking undetected in a network. Cyber threat hunting digs deep to find malicious actors in your environment that have slipped past your initial endpoint security defenses.

After sneaking in, an attacker can stealthily remain in a network for months as they quietly collect data, look for confidential material, or obtain login credentials that will allow them to move laterally across the environment.

Answered by llxdevilgirlxll
2

Hyy XD

During the investigation phase , the three Hunter uses Technologies such as EDR, ( Endpoint Detection and Response) to take a deep dive into potential malicious compromise of a system. The investigation continuous until either the activity is deemed benign aur a complete picture of the malicious behaviour has been created.

May this helps you

Plz marked in brainlest answer

Similar questions