Threat hunting

Check whether you are affected by a specific attack.

Schedule a meeting

What is threat hunting?

People with bad intentions find new ways to slip by malware detectors and firewalls every day. Instead of waiting for attacks to happen, we actively look for early indicators of compromise. Cybersecurity professionals worldwide share their findings on the latest forms of suspicious activity. If someone in your sector has been the victim of a specific attack, threat hunting will tell you whether you have been impacted, too.


The advantages of threat hunting

Proactive 

 You scan for a new threat before you notice the consequences.

Control

If you are exposed, you can do early damage control.

Peace of mind 

You don’t have to live in fear 
that you're next.  

Who uses this service?

Organisations request a threat hunting exercise because they wonder whether they have been compromised. For example, they want to know whether their passwords are floating around on the dark web. Or they want to know whether the virus in the news has evaded their firewall. Especially major organisations active in critical sectors are known to scan for potential security threats proactively.
  

When to perform threat hunting?

After a reported incident

  To check if could happen to you too.


Regularly 

To proactively improve your security.  


As prevention

To look for early indicators of compromise.


As validation

To prove that you periodically test your security.


How it works

1. Intelligence

During a first meeting, we agree on the specific threat you want to look into.


2. Execution 

We scan your systems to investigate whether you have been affected.

3. Reporting

If you have been compromised, we tell you how to respond and protect yourself. 

(4. Consulting)

Optional. We can also guide you through the implementation and stay available for advice. 

About Refracted

Our cybersecurity consultants are certified Offensive Security Professionals, so they know how to go further than passive and reactive protection. A bonus is that we are also certified ethical hackers, which means we understand how cybercriminals think and how to stop them in their tracks.   

Schedule a meeting


Threat hunting in a nutshell

  • Investigate a known incident that could affect you too.

  • Actively look for early indicators of compromise.

  • Keep your security mechanism strong.



Request a threat hunting exercise  

Make sure that your organisation remains safe in an everchanging world. Schedule a meeting to discuss the possibilities.

We keep your security system healthy

At Refracted, we believe that everyone has the right to be safe in a digital world. That is why we dedicate all our knowledge and skills to keeping your security systems healthy. Just like power fruit, we boost up your immune system and protect you from harm.