Loading...

18 Feb 2026 22:09

Mobile & Digital

A Holiday Hunting We Will Go

Cyber criminals fully realize that companies tend to be minimally staffed during the holidays. Rather than let the calendar year end on a sour note, I suggest your organization be proactive this year and spend time hunting for adversaries rather than sitting back and hoping your threat feed, MSSP or other mechanisms will lead to you catching something.

If you think your company isn’t a target this holiday season, think again! I’ve seen the oddest cross section of industries being attacked by Advanced Persistent Threats (APTs) including food and beverage, waste management, aluminum manufacturing, and non-profits to name a few, outside of the normal defense, energy, critical infrastructure, and other well-known targeted verticals. Clearly nation state attackers are not discriminating in their targets. As for cyber criminals, the traditional thinking that small and medium-sized businesses are targets still holds true – but as the industry has seen this past year, large corporations are under continual attack.

I’m unsure if there is an official definition of “hunting for adversaries,” but to me it is defined as looking for adversaries on your network outside of your normal day-to-day processes. I’ll explain more about how to go on the “hunt”, but first, here are three key factors to help you get started.

Rule 1. Executive Buy-in is required.

Rule 2. Failure is an Option.

Rule 3. Keep it Fun.

Logistically, the hunting should be a simple exercise, as you want to limit administrative tasks and maximize hunting. I recommend setting aside one entire week for the hunt and to secure executive buy-in that all meetings will be cancelled or moved so the team can focus 100% on the hunt. As for team make-up, it should be a good mix of junior, mid-level and senior IR/Intel folks, as well as individuals from outside the organization (e.g. Red Team, Networking, etc.).

2 weeks prior to the Hunt:  Pull the team together for a one hour brainstorming session to develop hunt criteria and encourage new approaches and ideas – the crazier the better. This will allow time for individuals to think through the ideas in more detail and generate some buzz ahead of the next step.

1 week prior to the Hunt:  Bring the team back together and rack and stack the ideas. Once complete, begin assigning folks to ensure there is coverage. You may not have all ideas assigned and that’s fine – the focus is on quality, not quantity, so you can table the others for your next hunt.

Every evening during Hunt:  A 15 minute “stand-up” to bring the team together and focus on anything of concern from an adversary perspective, as well as any logistical/political concerns that need to be raised to the Executive champion.

The first day of the week following the Hunt:  A quick call to discuss what worked well and what didn’t work. Conduct a review of the findings and assign follow up action items. This is the time to lay the foundation for your next hunt, as well as to identify items that the team may want to operationalize on an ongoing, day-to-day basis.

Communications:  The Executive can kick-off and close-out the event by communicating the high level details, results and key learnings to stakeholders across the organization to bring visibility and excitement to the effort. It is also worth discussing the results, potential negative impact and added value of the Hunt with C-suite executives.

While there are a variety of avenues to take, here are a few ideas to get your Hunt started:

Pull forensic evidence (registry, memory, event logs, etc…) of previously compromised machines.

Pull forensic evidence of previously compromised machines in the same family. For example, if you have webserver01, pull webserver02 and webserver03

(ProTip: You should be doing this during your incident investigations as well.)

Have you looked at the activity of previously compromised administrator accounts recently?

Finally, the Hunt demonstrates the importance of proactive hunting across your networks, endpoints and mobile devices. While the Penetration Testing business is doing extremely well, it’s only a part of a robust security framework and most companies should be focusing their efforts and budgets on if they have been breached and not if they can be penetrated. If your organization lacks the knowledge, resources or simply needs additional expertise or an outside perspective, don’t hesitate to hire an outside services company to perform the hunting for you.

Authored by Sean Mason, Vice President of Global Customer Success, Resolution1 Security

 
NULL
(Visited 10 times, 1 visits today)
peri hokiperihokiduta76duta 76ABC1131 - MPO SLOTABC1131 Bandar Slot Togelmix parlay agen slot qrisMPOGALAXYslot thailandabout usAWSBETpanduan eksklusif menerobos mekanisme mahjong wild deluxe gates of olympus sicbo teknik kalkulasi pembacaan rtp live duta76duta76 mengurai logika simbol mahjong ways 2 pgsoft pola kartu baccarat dan starlight princess melalui teknik observasi berbasis rtp livemembongkar celah peluang jitu mahjong wins 3 pragmatic blackjack sweet bonanza melalui teknik observasi strategi penempatan adaptif duta76mengurai mekanisme simbol mahjong ways 2 pgsoft putaran roulette scatter wild west gold melalui taktik kalkulasi entropi berbasis peluang terukur duta76teknik membaca peluang mahjong wins 3 pragmatic sabung ayam sv388 blackjack lewat analisa ritme siklus strategi kalkulasi presisi adaptif duta76membongkar logika simbol mahjong wild deluxe pola dadu sicbo cascade gates of olympus strategi observasi frekuensi berbasis data perihokianalisa perihoki volatilitas mahjong ways 2 pgsoft baccarat starlight princess taktik pola rtp live dan teknik prediksi peluang lintas permainanpemetaan anomali rtp live sweet bonanza blackjack mahjong wins 3 pragmatic strategi pembacaan pola silang taktik manajemen berbasis frekuensi perihokidekonstruksi siklus bonus wild bounty hunter putaran roulette frekuensi mahjong ways 2 pgsoft melalui taktik analitis eksklusif berbasis rtp live terukur perihokitaktik mendeteksi ritme sabung ayam sv388 mahjong wins 3 pragmatic blackjack pendekatan kalkulasi pola presisi terjamin perihokiteknik pembacaan pola multiplier cascade distribusi tile dalam gates of olympus mahjong wild deluxe sicbo dengan kalkulasi terukur perihokipanduan holistik menembus mekanisme distribusi kartu baccarat simbol mahjong ways 2 pgsoft multiplier starlight princess melalui taktik analisa rtp live perihokimenavigasi pola cluster sweet bonanza siklus kartu blackjack tile mahjong wins 3 pragmatic analisa momentum rtp live adaptif taktik lintas perihokitaktik mendeteksi ritme kemenangan wild west gold mahjong ways 2 pgsoft roulette pendekatan probabilitas kalkulasi momentum presisi eksklusif duta76mengurai mekanisme distribusi simbol mahjong wins 3 pragmatic kartu blackjack sabung ayam sv388 melalui taktik kalkulasi berbasis peluang terukur duta76aws grid rtp mahjongaws logika matematika mahjongaws logika strategi mahjongaws pengelolaan modal mahjongaws perubahan alur mahjongaws sinkronisasi simbol mahjongaws strategi rahasia mahjongaws tempo respon mahjongaws variasi pola mahjongaws wild momentum mahjongaws adaptasi transisi mahjongaws analisis keputusan mahjongaws analisis retrigger mahjongaws deteksi suasana mahjongaws pembaruan sistem mahjongaws perubahan tempo mahjongaws target awal mahjongaws tips statistik mahjongaws transisi fase mahjongaws wild emas mahjonge4 formula stabil dengan evaluasi rtp berkalae4 manajemen saldo profesional dalam mahjong wins 3e4 mental tangguh ala atlet olimpiade untuk scatter hitam mahjong wins 2e4 metode main disiplin dengan rtp stabil paling dicarie4 mindset juara dan pola main konsisten mahjong wins 2e4 optimasi hasil dengan strategi data drivene4 pendekatan modern mahjong wins berbasis statistike4 pendekatan terstruktur mengikuti irama sistemdekonstruksi mekanik scatter hitam mahjong ways akumulasi tinggimanajemen finansial terpadu dinamika putaran mahjong winsevolusi algoritma mahjong ways 2 arena ketangkasan digital 2026analisis sinkronisasi energi multiplier starlight princess fase akumulasirekonstruksi mekanik multiplier sugar rush 1000 konsistensi hasilintegrasi narasi budaya multiplier gates of gatot kaca strategi digitalmetodologi pemetaan roda keempat aztec gems peluang transisidekonstruksi mekanik tumble multiplier sweet bonanza akumulasi terstrukturanalisis volatilitas sticky wild wild west gold stabilitas sesiharmonisasi ekspansi simbol koi gate ketahanan saldo ritme bermainefektivitas multiplier berjenjang lucky neko pertumbuhan hasilkajian teknik hold and spin great rhino megaways capaian finansialanalisis struktur peluang buffalo king algoritma komputasimekanisme sticky wild multiplier the dog house stabilitas hasilimplementasi strategi hammer multiplier power of thor ritme akumulasistrategi dekonstruksi pola mahjong wild 2 dadu sicbo gates of olympus lewat analisa siklus rtp live dan teknik pembacaan momentum duta76pola starlight princess siklus kartu baccarat mahjong ways 2 pgsoft pendekatan analisa momentum rtp live adaptif taktik cerdas duta76taktik mendeteksi ritme kemenangan sweet bonanza mahjong wins 3 pragmatic blackjack pendekatan kalkulasi momentum eksklusif duta76metode penetrasi algoritma mahjong ways 2 pgsoft roulette wild bounty showdown melalui interpretasi rtp live dan arsitektur peluang duta76peluang sabung ayam sv388 mahjong wins 3 pragmatic blackjack lewat pembacaan pola dan manipulasi threshold volatilitas rtp live berbasis data duta76mengurai mekanisme distribusi simbol mahjong wild 2 kombinasi dadu sicbo dan cascade gates of olympus melalui taktik kalkulasi peluang terukur perihokiteknik eksklusif membaca peluang mahjong ways 2 pgsoft starlight princess baccarat analisa ritme siklus strategi kalkulasi presisi perihokimembongkar celah peluang mahjong wins 3 pragmatic blackjack sweet bonanza melalui teknik observasidan strategi penempatan adaptif perihoki cerdasdeteksi irama wild west gold mahjong ways 2 pgsoft roulette dengan kalibrasi bias probabilitas dan komputasi jejak momentum perihoki eksklusifstrategi mahjong wins 3 pragmatic blackjack sabung ayam sv388 via dekripsi irama subliminal dan instrumentasi rtp live jitu perihokipanduan eksklusif menerobos volatilitas tersembunyi dadu sicbo mahjong wild 2 gates of olympus dengan teknik cross pattern manajemen siklus adaptif cerdas perihokipemetaan anomali rtp live starlight princess baccarat mahjong ways 2 pgsoft strategi pembacaan pola taktik manajemen berbasis data akurat presisi perihokimengeksploitasi frekuensi tumble sweet bonanza entropi blackjack mahjong wins 3 pragmatic lewat strategi cross analisa rtp live jitu perihokiteknik penetrasi peluang mahjong ways 2 pgsoft wild bounty showdown roulette via modulasi siklus laten dan konstruksi volatilitas duta76 cerdaslogika tersembunyi blackjack sabung ayam sv388 mahjong wins 3 pragmatic dengan disrupsi arsitektur pola rtp live dan interpolasi peluang duta76 Top