What is Threat Hunting? Definition & Explanation

Threat hunting is the proactive, hypothesis-driven search for adversaries already operating inside an environment that have evaded automated detections. Hunters use telemetry from EDR, SIEM, network sensors, and identity logs combined with threat intelligence to find subtle indicators of compromise.

In-Depth Explanation

Effective threat hunting follows the TaHiTI methodology or the SANS hunt-loop: hypothesis generation (e.g., "a Kerberoasting attack would manifest as service-account TGS requests followed by offline cracking"), data collection (query EDR, SIEM, AD logs), analysis, and either confirmation (pass to IR) or refinement of detections. Hunters draw hypotheses from MITRE ATT&CK techniques, recent threat-intel reports (Mandiant M-Trends, CrowdStrike Global Threat Report, Microsoft Digital Defense Report), CISA advisories, and known TTPs of relevant threat actors. Common hunt targets include living-off-the-land binaries (LOLBins), suspicious PowerShell, credential-dumping artifacts (LSASS access, NTDS.dit access, DPAPI), persistence mechanisms (scheduled tasks, services, WMI subscriptions, AD ACL backdoors), DNS beaconing patterns, and identity-anomaly signals (impossible travel, unusual admin actions). Tools include EDR query languages (CrowdStrike CQL, SentinelOne Deep Visibility, Microsoft KQL/Defender Advanced Hunting), Sigma rules for cross-platform detection, Jupyter notebooks for ad-hoc analysis, and platforms like Hunters, Vectra AI, and Anvilogic for hypothesis-driven hunting at scale.

Why It Matters for Security

Mature adversaries deliberately evade signature-based detection — by the time an automated alert fires, the attacker may have been operating for weeks. Threat hunting closes the gap by proactively searching for the subtle behavioral indicators automated rules miss. Hunting also generates new detection rules that get baked into automated coverage, raising the floor for the entire SOC. Every mature security program (financial services, defense, large tech) maintains a dedicated threat-hunting function.

Related Tools

Frequently Asked Questions

What does Threat Hunting mean in cybersecurity?

Threat hunting in cybersecurity is the proactive, hypothesis-driven search for adversaries already operating inside an environment that have evaded automated detections — using EDR, SIEM, network, and identity telemetry combined with threat intelligence to find subtle indicators of compromise.

Why is Threat Hunting important?

Threat hunting matters because mature adversaries deliberately evade signature-based detection. By the time an automated alert fires, attackers may have been operating for weeks. Hunting closes that gap and continually generates new automated detections, raising the floor for the entire SOC.

← Back to the full Cybersecurity Glossary