Threat hunting
Check whether you are affected by a specific attack.
-
What is threat hunting?
People with bad intentions find new ways to slip by malware detectors and firewalls every day. Instead of waiting for attacks to happen, we actively look for early indicators of compromise. Cybersecurity professionals worldwide share their findings on the latest forms of suspicious activity. If someone in your sector has been the victim of a specific attack, threat hunting will tell you whether you have been impacted, too.
The advantages of threat hunting
Proactive
You scan for a new threat before you notice the consequences.
Control
If you are exposed, you can do early damage control.
Peace of mind
You don’t have to live in fear
that you’re next.
-
Who uses this service?
Organisations request a threat hunting exercise because they wonder whether they have been compromised. For example, they want to know whether their passwords are floating around on the dark web. Or they want to know whether the virus in the news has evaded their firewall. Especially major organisations active in critical sectors are known to scan for potential security threats proactively.
When to perform threat hunting?
After a reported incident
As prevention
Regularly
As validation
How it works
1. Intelligence
During a first meeting, we agree on the specific threat you want to look into.
2. Execution
We scan your systems to investigate whether you have been affected.
3. Reporting
If you have been compromised, we tell you how to respond and protect yourself.
(4. Consulting)
Optional. We can also guide you through the implementation and stay available for advice.
-
About refracted
Our cybersecurity consultants are certified Offensive Security Professionals, so they know how to go further than passive and reactive protection. A bonus is that we are also certified ethical hackers, which means we understand how cybercriminals think and how to stop them in their tracks.
Threat hunting in a nutshell
- Investigate a known incident that could affect you too.
- Actively look for early indicators of compromise.
- Keep your security mechanism strong.
Request a threat hunting excercise
Make sure that your organisation remains safe in an everchanging world. Schedule a meeting to discuss the possibilities.
We keep your security system safe
At Refracted, we believe that everyone has the right to be safe in a digital world. That is why we dedicate all our knowledge and skills to keeping your security systems healthy. Just like power fruit, we boost up your immune system and protect you from harm.