Learn to be a more effective threat hunter

Threat hunting is a core part of continuing to expand and improve your security posture. Red Canary’s Security Operations Center is comprised of threat researchers and analysts who are constantly hunting for potentially threatening activity. We’re committed to helping organizations understand how to evaluate and improve detection coverage. Browse our most popular threat hunting resources below.


Our most popular threat hunting articles:


ARTICLE

Threat Hunting is Not a Magical Unicorn


Read

ARTICLE

Threat Mining vs Threat Hunting


Read

ARTICLE

Automated Threat Hunting: the Man vs Machine Debate


Read

Dig deeper with these resources:


ON-DEMAND WEBINAR

How to Build Threat Hunting into Your Security Operations


Watch Now

ON-DEMAND WEBINAR

PowerShell Abuse: Good Tool Gone Bad


Watch Now

ON-DEMAND WEBINAR

How to Take Control of Your Response Operations


Watch Now

ON-DEMAND WEBINAR

Threat Hunting for Dridex Attacks


Watch Now

Threat Hunting Tools & Techniques:


SURVEYOR

Simple Survey Tool for Cb Response


Download

USING SURVEYOR

Detecting Snake Malware Using Cb Response


Read