diff --git a/README.md b/README.md index 711c83246..30fdda6c5 100644 --- a/README.md +++ b/README.md @@ -32,8 +32,6 @@ Threat hunting is a proactive and iterative approach to detecting malicious activities within an organization's network or systems that may have bypassed automated security measures. Unlike reactive investigations triggered by security alerts, threat hunting is driven by threat intelligence (TI)-driven checks and hypotheses derived from systematic and opportunistic analysis. These hypotheses help hunters uncover unknown threats, potential threats, or known threats that may have evaded security detections, as well as vulnerabilities or indicators of compromise (IoCs) that automated systems might miss or exclude. The process also focuses on identifying precursors to alerts/dashboards and improving SOC/triage workflows while also contributing to shadow asset inventory management and escalates low/mid-fidelity events that require further investigation. The primary goal is to identify the tactics, techniques, and procedures (TTPs) used by threat actors, enhancing the organization’s ability to preemptively detect and mitigate potential attacks. -![image](https://github.com/user-attachments/assets/8db886ac-8a73-443a-82dc-06e0fd56673a) - #### Advantages of Threat Hunting: - Identifiy Visibility Gaps