Threat hunting

  • What is threat hunting?

    People with bad intentions find new ways to slip by malware detectors and firewalls every day. Instead of waiting for attacks to happen, we actively look for early indicators of compromise. Cybersecurity professionals worldwide share their findings on the latest forms of suspicious activity. If someone in your sector has been the victim of a specific attack, threat hunting will tell you whether you have been impacted, too.

The advantages of threat hunting

Proactive

You scan for a new threat before you notice the consequences.

Control

If you are exposed, you can do early damage control.

Peace of mind

You don’t have to live in fear
that you’re next.

  • Who uses this service?

    Organisations request a threat hunting exercise because they wonder whether they have been compromised. For example, they want to know whether their passwords are floating around on the dark web. Or they want to know whether the virus in the news has evaded their firewall. Especially major organisations active in critical sectors are known to scan for potential security threats proactively.

When to perform threat hunting?

After a reported incident

As prevention

Regularly

As validation

How it works

1. Intelligence

During a first meeting, we agree on the specific threat you want to look into.

2. Execution

We scan your systems to investigate whether you have been affected.

3. Reporting

If you have been compromised, we tell you how to respond and protect yourself.

(4. Consulting)

Optional. We can also guide you through the implementation and stay available for advice.

  • About refracted

    Our cybersecurity consultants are certified Offensive Security Professionals, so they know how to go further than passive and reactive protection. A bonus is that we are also certified ethical hackers, which means we understand how cybercriminals think and how to stop them in their tracks.

Threat hunting in a nutshell

  • Investigate a known incident that could affect you too.
  • Actively look for early indicators of compromise.
  • Keep your security mechanism strong.

We keep your security system safe

At Refracted, we believe that everyone has the right to be safe in a digital world. That is why we dedicate all our knowledge and skills to keeping your security systems healthy. Just like power fruit, we boost up your immune system and protect you from harm.