Dec. 13, 2022, 2:10 a.m. | Zichen Wang

cs.CR updates on arXiv.org arxiv.org

Since the term "Cyber threat hunting" was introduced in 2016, there have been
a rising trend of proactive defensive measure to create more cyber security.
This research will look into peer reviewed literature on the subject of cyber
threat hunting. Our study shows an increase in the field with methods of
machine learning.\\ Keywords: Cyber threat, Cyber security, threat hunting ,
security system, data driven, Intel, analytic driven, TTPs

cyber cyber threat cyber threat hunting hunting literature review threat threat hunting

Head of Security Operations

@ Canonical Ltd. | Home based - Americas, EMEA

Security Specialist

@ Lely | Maassluis, Netherlands

Senior Cyber Incident Response (Hybrid)

@ SmartDev | Cầu Giấy, Vietnam

Sr Security Engineer - Colombia

@ Nubank | Colombia, Bogota

Security Engineer, Investigations - i3

@ Meta | Menlo Park, CA | Washington, DC | Remote, US

Cyber Security Engineer

@ ASSYSTEM | Bridgwater, United Kingdom