Learning more about “Threat Hunting”

Photo by Florian Olivo on Unsplash

Introduction

A threat can be a newly found incident that has the potential to cause widespread damage to the system. Conditions or any form of occurrence that has the potential to destroy or harm the system in many ways can be considered a threat to the system. There are numerous examples, such as corrupting data and altering its integrity, disclosing sensitive information, and many more.

--

--

--

Security enthusiast working to secure web for others.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Privacy Does Matter

Next Generation Cloud Security for AI / Machine Learning

Inter-service authentication and the need for decentralised shared key exchange

Multiplier Renounces Admin Function. Implements 4/7 Multi-Sig

Quantum cryptography explained

Commercial Credit Checker

What is stealer malware?

Schools are the soft underbelly of Cyber and needs more focus

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Gupta Bless

Gupta Bless

Security enthusiast working to secure web for others.

More from Medium

How secure you are in this Era of Information Security

Improve your OpenSSF Scorecard score with ease

RequestBin Next-Gen version release note

Reverse engineering musings: WhisperGate Stages 1 & 2