Learn to be a more effective threat hunter

Threat hunting is a core part of continuing to expand and improve your security posture. Red Canary’s Cyber Incident Response Team is comprised of threat researchers, analysts, and detection engineers who are constantly hunting for potentially threatening activity. We’re committed to helping organizations understand how to evaluate and improve detection coverage. Browse our most popular threat hunting resources below.


Our most popular threat hunting articles:


ARTICLE

Threat Hunting is Not a Magical Unicorn


Read

ARTICLE

Threat Mining vs Threat Hunting


Read

ARTICLE

Automated Threat Hunting: the Man vs Machine Debate


Read

ARTICLE

Threat Hunting at Scale: Techniques & Tools to Mature Your Program


Read

ARTICLE

Common Security Mistake #3: Aimless Use of Threat Intelligence


Read

ARTICLE

Using Entropy in Threat Hunting: a Mathematical Search for the Unknown


Read

Dig deeper with these resources:


ON-DEMAND WEBINAR

How to Build Threat Hunting into Your Security Operations


Watch Now

ON-DEMAND WEBINAR

PowerShell Abuse: Good Tool Gone Bad


Watch Now

ON-DEMAND WEBINAR

How to Take Control of Your Response Operations


Watch Now

ON-DEMAND WEBINAR

Threat Hunting for Dridex Attacks


Watch Now

ON-DEMAND WEBINAR

Threat Hunting at Scale Using Carbon Black Response + Surveyor


Watch Now

ON-DEMAND WEBINAR

From Ad Hoc to Automated: Proven Techniques to Operationalize Threat Hunting


Watch Now

Threat Hunting Tools & Techniques:


SURVEYOR

Simple Survey Tool for Cb Response


Download

USING SURVEYOR

Detecting Snake Malware Using Cb Response


Read