threat hunters use which method?
Answers
Answered by
0
Answer:
Threat hunting is the practice of proactively searching for cyber threats that are lurking undetected in a network. Cyber threat hunting digs deep to find malicious actors in your environment that have slipped past your initial endpoint security defenses.
After sneaking in, an attacker can stealthily remain in a network for months as they quietly collect data, look for confidential material, or obtain login credentials that will allow them to move laterally across the environment.
Answered by
2
Hyy XD
During the investigation phase , the three Hunter uses Technologies such as EDR, ( Endpoint Detection and Response) to take a deep dive into potential malicious compromise of a system. The investigation continuous until either the activity is deemed benign aur a complete picture of the malicious behaviour has been created.
May this helps you
Plz marked in brainlest answer
Similar questions