Proactive threat hunting is vital to zero-day vulnerability management>
Security Magazine – Ariel Parnes
Itâs Time for a New Approach to Thinking About Risk A proactive approach to zero-day vulnerabilities is conducting hunts based on the assumption that your organization has already been breached using one or more zero-day vulnerabilities. During these hunts, investigators search for forensic pieces of data that identify potentially malicious activity within your system or network, commonly referred to as indicators of compromise (IOCs). Proactive threat hunting uses an investigation teamâs analysis of known adversaries to create a hypothetical attack focused on an area likely to be compromised, often containing sensitive data, source code, or something similarly valuable to the organization. Proactively hunting for threats can leverage technology and automation to search for threats automatically based on known vulnerabilities, the forensic footprint of vulnerabilities, and available threat intelligence. Patching is Still Important While adopting a proactive approach by assuming your organization has been breached by zero-day vulnerabilities and searching for IOCs is important, it doesnât take the place of patching known vulnerabilities. Some attackers search for vulnerabilities before theyâre disclosed, while others are incredibly quick to exploit a new vulnerability when it is disclosed.
Link: https://www.securitymagazine.com/articles/97504-proactive-threat-hunting-is-vital-to-zero-day-vulnerability-management
Proactive threat hunting is vital to zero-day vulnerability management
Categories:
Tags: