Loading...

05 Dec 2025 21:41

Mobile & Digital

A Holiday Hunting We Will Go

Cyber criminals fully realize that companies tend to be minimally staffed during the holidays. Rather than let the calendar year end on a sour note, I suggest your organization be proactive this year and spend time hunting for adversaries rather than sitting back and hoping your threat feed, MSSP or other mechanisms will lead to you catching something.

If you think your company isn’t a target this holiday season, think again! I’ve seen the oddest cross section of industries being attacked by Advanced Persistent Threats (APTs) including food and beverage, waste management, aluminum manufacturing, and non-profits to name a few, outside of the normal defense, energy, critical infrastructure, and other well-known targeted verticals. Clearly nation state attackers are not discriminating in their targets. As for cyber criminals, the traditional thinking that small and medium-sized businesses are targets still holds true – but as the industry has seen this past year, large corporations are under continual attack.

I’m unsure if there is an official definition of “hunting for adversaries,” but to me it is defined as looking for adversaries on your network outside of your normal day-to-day processes. I’ll explain more about how to go on the “hunt”, but first, here are three key factors to help you get started.

Rule 1. Executive Buy-in is required.

Rule 2. Failure is an Option.

Rule 3. Keep it Fun.

Logistically, the hunting should be a simple exercise, as you want to limit administrative tasks and maximize hunting. I recommend setting aside one entire week for the hunt and to secure executive buy-in that all meetings will be cancelled or moved so the team can focus 100% on the hunt. As for team make-up, it should be a good mix of junior, mid-level and senior IR/Intel folks, as well as individuals from outside the organization (e.g. Red Team, Networking, etc.).

2 weeks prior to the Hunt:  Pull the team together for a one hour brainstorming session to develop hunt criteria and encourage new approaches and ideas – the crazier the better. This will allow time for individuals to think through the ideas in more detail and generate some buzz ahead of the next step.

1 week prior to the Hunt:  Bring the team back together and rack and stack the ideas. Once complete, begin assigning folks to ensure there is coverage. You may not have all ideas assigned and that’s fine – the focus is on quality, not quantity, so you can table the others for your next hunt.

Every evening during Hunt:  A 15 minute “stand-up” to bring the team together and focus on anything of concern from an adversary perspective, as well as any logistical/political concerns that need to be raised to the Executive champion.

The first day of the week following the Hunt:  A quick call to discuss what worked well and what didn’t work. Conduct a review of the findings and assign follow up action items. This is the time to lay the foundation for your next hunt, as well as to identify items that the team may want to operationalize on an ongoing, day-to-day basis.

Communications:  The Executive can kick-off and close-out the event by communicating the high level details, results and key learnings to stakeholders across the organization to bring visibility and excitement to the effort. It is also worth discussing the results, potential negative impact and added value of the Hunt with C-suite executives.

While there are a variety of avenues to take, here are a few ideas to get your Hunt started:

Pull forensic evidence (registry, memory, event logs, etc…) of previously compromised machines.

Pull forensic evidence of previously compromised machines in the same family. For example, if you have webserver01, pull webserver02 and webserver03

(ProTip: You should be doing this during your incident investigations as well.)

Have you looked at the activity of previously compromised administrator accounts recently?

Finally, the Hunt demonstrates the importance of proactive hunting across your networks, endpoints and mobile devices. While the Penetration Testing business is doing extremely well, it’s only a part of a robust security framework and most companies should be focusing their efforts and budgets on if they have been breached and not if they can be penetrated. If your organization lacks the knowledge, resources or simply needs additional expertise or an outside perspective, don’t hesitate to hire an outside services company to perform the hunting for you.

Authored by Sean Mason, Vice President of Global Customer Success, Resolution1 Security

 
NULL
(Visited 8 times, 1 visits today)
peri hokiperihokiduta76dsiledAt-Taujih; Jurnal Bimbingan Konseling Islamabc1131 slot viralScatter Hitamslot gacor qrisslot thailandabc1131duta 76slot qris danaabc1131 slot777 lundbergdesign.comABC1131mpo slotslot gacorMPO SLOTcleaning service bug volatility starlight baccarat abc1131 emosiburuh pelabuhan rumus free spin gates roulette abc1131 tamaktaktik main mahjong wild 2 sicbo di duta76 peluang gampang menang terbuka dengan lebarstrategi langsung jackpot scatter di mahjong ways 2 pgsoft baccarat duta76 emang gilaalgoritma paling viral panduan mudah bermain mahjong wins 3 blackjack dari duta76petualangan game paling gila di mahjong wild deluxe sicbo auto cuan besar perihokikekuatan wild mahjong ways 2 pgsoft baccarat jam gacor perihoki rtp live gampang maxwinpengalaman paling profit dari mahjong wins 3 blackjack dari perihoki tanpa pakai auto spins algoritma misterius mw2s analisis ritme reel tekniks formula menang mahjong ways 2 modals guide terbaru mw 2s menafsir gerak reels mahjong wayss menggubah kejutan mega win mahjong wayss panduan rahasia pola mahjong ways 2 modals pengurai pola scatter cara menentukans pulse reader mahjong ways 2 hitungs rahasia pola gacor mahjong ways 2 dibocorkans rumus panas teknologi ais saat alur mahjong ways berpadu dengan zenbaca rtp mahjong pemulaspam spin pak jono mahjongstrategi toni mahjong profitlangkah cerdas panji scattertaktik spam spin soniteknik baca rtp aguskejar kesempatan strategi memancing wild emas pengganda tinggi di mahjong wins3menangkan tanpa rungkad panduan anti rungkad menguasai pola tarikan liar game dan analisis cepat rtp game pgsoftobsesi animasi mahjong ways yang ubah hidup menjadi developer andalrahasia ritme stabil pattern manja baccarat casino yang mengubah cara bermainraih kemenangan maksimal dengan strategi auto gacor rahasia setting pola mudah yang terbukti ampuhdata analyst bongkar rahasia probabilitas cerdas di mahjong ways 2 strategi unggul di 2025data rtp pragmatic play rahasia zona stabil yang mengungkap kemenanganledakan inovasi pragmatic play saksikan tren utama yang menggemparkan industrirevolusi strategi mahjong pgsoft berhasil atasi deadspin pada mode regulerterungkap rahasia cara membaca pola wild dan multiplier lucky neko untuk permainan lebih terarahgelombang tipis mahjong wins 3 hancurkan simbol tengah tanpa animasi fakta mengejutkan terpantaurahasia spin digital teknik memancing fitur bonus dengan ritme spin tertenturahasia terungkap strategi sistematis menentukan momentum sweet bonzna candyland untuk mengelola risikoraih kemenangan dengan sic bo live temukan skill pengaman terbaik untuk strategi andalan andarumus rahasia main mahjong wild 2 sicbo yang dibagikan gratis oleh admin duta76duta76 fomo algoritma mahjong wins 3 scatter hitam bisa dapatkan kemenangan besar baccaratjalan menuju sukses di mahjong ways 2 pgsoft sicbo dengan gampang di perihokiperihoki bongkar rahasia mahjong wins 3 auto profit besar rtp live tertinggimontir bengkel kompresi data mahjong pgsoft abc1131 baccaratpenjual pasar malam cluster sweet bonanza abc1131 bluffing pokertukang cukur cold chip mahjong wins 3 abc1131 bahasa tubuhevaluasi strategi mahjong awsbetide inspirasi mahjong wins3ledakan profit tanpa henti terjadi saat scatter hitam mengendalikan jalannya putaran mahjong wins 3putaran mahjong wins 3 tidak pernah sama ketika scatter hitam menyulut efek keberuntungan berantaimomentum scatter wild di mahjong ways 2 menjadi titik balik menuju ledakan keuntungan besarkombinasi scatter wild mahjong ways 2 membuka jalan cepat menuju perkalian tinggi yang menguntungkanmomentum perkalian gilagilaan terjadi ketika scatter hitam muncul sebagai simbol paling menakutkanlayar mahjong wins 3 langsung bergemuruh saat scatter hitam menyalakan perkalian besar secara beruntunperan scatter wild di mahjong ways 2 hadir sebagai kunci strategis untuk meledakkan potensi profitscatter wild mahjong ways 2 menjadi pemicu awal terbukanya jalur cuan besar dalam waktu singkatketika scatter hitam turun setiap detik putaran mahjong wins 3 menjadi ajang ledakan profit tanpa batasmomen putaran mahjong wins 3 berubah dahsyat saat scatter hitam memicu gelombang cuan tanpa hentirevolusi gameplay pgsoft pangkas deadspin di mode regular mahjong Top