Loading...

13 Apr 2026 12:16

Mobile & Digital

A Holiday Hunting We Will Go

Cyber criminals fully realize that companies tend to be minimally staffed during the holidays. Rather than let the calendar year end on a sour note, I suggest your organization be proactive this year and spend time hunting for adversaries rather than sitting back and hoping your threat feed, MSSP or other mechanisms will lead to you catching something.

If you think your company isn’t a target this holiday season, think again! I’ve seen the oddest cross section of industries being attacked by Advanced Persistent Threats (APTs) including food and beverage, waste management, aluminum manufacturing, and non-profits to name a few, outside of the normal defense, energy, critical infrastructure, and other well-known targeted verticals. Clearly nation state attackers are not discriminating in their targets. As for cyber criminals, the traditional thinking that small and medium-sized businesses are targets still holds true – but as the industry has seen this past year, large corporations are under continual attack.

I’m unsure if there is an official definition of “hunting for adversaries,” but to me it is defined as looking for adversaries on your network outside of your normal day-to-day processes. I’ll explain more about how to go on the “hunt”, but first, here are three key factors to help you get started.

Rule 1. Executive Buy-in is required.

Rule 2. Failure is an Option.

Rule 3. Keep it Fun.

Logistically, the hunting should be a simple exercise, as you want to limit administrative tasks and maximize hunting. I recommend setting aside one entire week for the hunt and to secure executive buy-in that all meetings will be cancelled or moved so the team can focus 100% on the hunt. As for team make-up, it should be a good mix of junior, mid-level and senior IR/Intel folks, as well as individuals from outside the organization (e.g. Red Team, Networking, etc.).

2 weeks prior to the Hunt:  Pull the team together for a one hour brainstorming session to develop hunt criteria and encourage new approaches and ideas – the crazier the better. This will allow time for individuals to think through the ideas in more detail and generate some buzz ahead of the next step.

1 week prior to the Hunt:  Bring the team back together and rack and stack the ideas. Once complete, begin assigning folks to ensure there is coverage. You may not have all ideas assigned and that’s fine – the focus is on quality, not quantity, so you can table the others for your next hunt.

Every evening during Hunt:  A 15 minute “stand-up” to bring the team together and focus on anything of concern from an adversary perspective, as well as any logistical/political concerns that need to be raised to the Executive champion.

The first day of the week following the Hunt:  A quick call to discuss what worked well and what didn’t work. Conduct a review of the findings and assign follow up action items. This is the time to lay the foundation for your next hunt, as well as to identify items that the team may want to operationalize on an ongoing, day-to-day basis.

Communications:  The Executive can kick-off and close-out the event by communicating the high level details, results and key learnings to stakeholders across the organization to bring visibility and excitement to the effort. It is also worth discussing the results, potential negative impact and added value of the Hunt with C-suite executives.

While there are a variety of avenues to take, here are a few ideas to get your Hunt started:

Pull forensic evidence (registry, memory, event logs, etc…) of previously compromised machines.

Pull forensic evidence of previously compromised machines in the same family. For example, if you have webserver01, pull webserver02 and webserver03

(ProTip: You should be doing this during your incident investigations as well.)

Have you looked at the activity of previously compromised administrator accounts recently?

Finally, the Hunt demonstrates the importance of proactive hunting across your networks, endpoints and mobile devices. While the Penetration Testing business is doing extremely well, it’s only a part of a robust security framework and most companies should be focusing their efforts and budgets on if they have been breached and not if they can be penetrated. If your organization lacks the knowledge, resources or simply needs additional expertise or an outside perspective, don’t hesitate to hire an outside services company to perform the hunting for you.

Authored by Sean Mason, Vice President of Global Customer Success, Resolution1 Security

 
NULL
(Visited 11 times, 1 visits today)
peri hokiperihokiduta76duta 76ABC1131 - MPO SLOTABC1131 Bandar Slot Togelmix parlay agen slot qrisMPOGALAXYslot thailandAWSBEThttps://premium-soft.com/Consulta-Licencias/https://sintnicolaasschool.com/https://abc1131aa.com/kincir88Slot mahjongABC1131ABC1131 LOGINhttps://abc1131.hartanzah.com/https://www.abc1131.it.com/https://ayodonktolong.pages.dev/stc76cara kerja tumble mahjong ways kombinasi beruntuntransformasi sesi transisi layer algoritma gates of olympuspemodelan scatter hitam mahjong wins keputusan arena premiumdinamika wild merah mahjong ways 2 fase krusialkajian struktur pola mahjong wins 3 ketahanan sesi digitalfenomena perilaku mahjong wins 3 observasi pakar analisanalisis rtp tinggi abc1131 jam richard millebonus hasil jutaan mahjong wins indonesia 2026komunitas bandung indikator terbatas abc1131abc1131 akuisisi mahjong wins 3 indonesia lokalaws ai micro engagement multiplier mahjongaws data historis multiplier perspektifaws intensitas spin starlight target konsistenaws lucky neko turbo durasi multiplieraws mahjong wins scatter berlapis polaaws ritme mahjong tumble berlapis digitalaws scatter hitam turbo variansi sesiaws strategi koi gate kecepatan optimalaws wild bandito rtp malam nyamanaws wild mahjong probabilitas multiplieranalisa eksekutif peluang sicbo pola mahjong wild deluxe rtp live jitu gates of olympuskalkulasi silang analisa peluang baccarat pola mahjong ways 2 pgsoft taktik rtp live starlight princessmakro strategi profit integrasi taktik blackjack analisa peluang pola mahjong wins 3 teknik rtp live sweet bonanzadiversifikasi strategi analisa peluang roulette pola mahjong ways 2 pgsoft teknik eksekusi rtp live wild west goldrantai probabilitas strategi transisi analisa peluang blackjack taktik sv388 teknik pola mahjong wins 3 pragmatic rtp live sugar rushtaktik paradoks sinkronisasi peluang dadu sicbo rtp live gates of olympus strategi mahjong wild deluxematriks probabilitas sinkronisasi strategi baccarat teknik baca rtp live starlight princess pola mahjong ways 2 pgsoftanatomi keuntungan sinkronisasi strategi blackjack analisa pola mahjong wins 3 pragmatic teknik rtp live sweet bonanzamanajemen variansi taktik optimalisasi peluang roulette analisa pola mahjong ways 2 pgsoft teknik strategi rtp live wild west golddekonstruksi profit teknik taktik sv388 analisa peluang blackjack strategi pola mahjong wins 3 pragmatic rtp live sugar rushanalisa eksekutif peluang sicbo pola mahjong wild deluxe rtp live jitu gates of olympus duta76kalkulasi silang analisa peluang baccarat pola mahjong ways 2 pgsoft taktik rtp live starlight princess duta76makro strategi profit integrasi taktik blackjack analisa peluang pola mahjong wins 3 teknik rtp live sweet bonanza duta76aws ai koi gate scatter analisisaws gates olympus multiplier akses stabilaws konsistensi mahjong pendekatan perilakuaws lonjakan pemain rtp mahjong dataaws mahjong kestabilan uji performa trenaws metode lucky neko pola digitalaws performa koi gate analisis objektifaws riset komunitas mahjong rtp lonjakanaws validasi sweet bonanza pola rtpaws wild bandito manajemen risiko sistematisgates of olympus vs mahjong ways 1 mobil sportrekor tertinggi scatter hitam mahjong wins 3sorotan hasil 2026 indikator tinggi abc1131pemodelan topografi digital mahjong ways 2 mobilesinergi indikator balikan mahjong ways pasar sahamadaptasi algoritma rekomendasi mahjong ways berandadampak multitasking browser visibilitas mahjong waysstrategi mahjong ways 2 ekonomi perhatian 2026evolusi preferensi gen z strategi mahjong wayskalkulasi probabilitas berantai mahjong ways 2monitoring aktivitas real time big data mahjongstudi intensitas pengguna visibilitas mahjong waysdistribusi kuantitatif simbol premium mahjong ways 2automasi kolektif wild bounty showdown responsivitasdekonstruksi 12 fase transisi pg soft algoritmaefisiensi operasional data heterogen mahjong ways 2metadata semantik starlight princess prediksi simbolvariasi hasil stokastik mahjong wins 3strategi penyaringan bonus scatter merah mahjong waysfenomena scatter emas indikator balikan pg soft Top