Here I sit, my third coffee in hand, and I’m still buzzing about the hardware I saw there at the hardware hacking village. If you’re curious why I’m excited, though—well, it’s this: Because threat hunting is changing, moving from being reactive to proactive security—and as far as I’m concerned, that’s the game changer when it comes to what organizations face today.
I’ve been working in the trenches since the early 2000’s–i started in ’93 as a network admin supporting networks and mux equipment for voice and data over PSTN. I have seen attacks evolve — too, in the sense of no longer just the Slammer worm’s wrecking everything that we experienced in 2003 to today’s sophisticated attacks on banks where I recently assisted three financial institutions rejigger their zero-trust architectures.
Let’s be real. Classical security has been a mostly responsive. You discover, react, and fix. It’s like waiting until you’ve already hit a pothole to fix a flat tire. That’s how most Security Operations Centers have functioned for years — alerts come in, then you chase down the cause and try to stop the bleeding. Not wrong. But not good enough anymore.
Preemptive security means predicting the future. Threat hunting turns this around — it doesn’t rely on alarms. It looks for precursor signs that the alert systems could miss: Here’s the thing:
Back in 2003, when I first witnessed Slammer worm going town, it was a sudden explosion, the days after were spent in panic reactive patching. Today? Threat hunting would have looked for indicators before SLammer became a Blizzard.
And yes, some say that threat hunting is resource-intensive. To that, all I can say is: Not skipping it is infinitely more expensive. Particularly when you’re guarding data gold mines like banks.
Threat hunting is not a magic wand you wave after a breach, it’s a disciplined process. Here’s how I break it down:
I was recently coaching a small SOC team —their biggest obstacle? Forming solid hypotheses. “Without a good question, our threat hunting work is like sifting haystacks.
A million-dollar SOC is not for everyone. But the basics? And the tools to begin are low-cost, if not free. A few essentials:
And don’t forget about trusty syslogs, and Windows Event Logs, — goldmines of clues.
Some more advanced hunters can also apply AI-powered anomaly detection – but here’s when I start to get skeptical. AI-driven is thrown around so casually, in many cases it’s little more than glorified pattern matching with absolutely no context. Human intuition good for hunting and AI support, not AI-only.
Did I tell you? — theories are the essence of threat hunting. Wanna start one? Here’s a cooking analogy (pretend you are a cook who needs to sniff out ingredients that have gone bad).
So choose a flavor profile that interests you but looks suspect (weird login times), or a smell that seems out of place (outbound spikes), and test if it’s actually gone bad or just a new spice.
Some example hypotheses:
Adopting MITRE ATT&CK allows you to form hypotheses about a specific adversary techniques for example:
You search for these activities in logs and network traffic.
Novice teams could concentrate on so-called high-signal, low-noise hunts — for phishing attempts or suspicious file downloads, for example. Advanced teams? Pursuing new malware C2 points and fileless attacks.
If you are a small security team or a security-minded small-to-medium-sized business, listen, I am on your wavelength. You may not have a SOC, let alone a battalion of analysts.
Here’s what I recommend:
When I was up in the early days of my company, our tools were primitive but curiosity limitless. A reliable drive doesn’t require a Rolls-Royce; sometimes a well-maintained old sedan can exceed your expectations.
What can’t be measured can’t be improved. Hunting effectiveness is a bit tricky — because we’re not just counting alerts, but misses and how well our hunts are reducing dwell time.
Metrics I track:
And—this is an important one—how much hunting contributes to the overall security posture, for example, by contributing to your SOC’s detection rules.
Here’s a hot one: some teams get hung up on KPIs that look good on paper but do not correlate with real security improvements. Quality over quantity all the way.
That Time I worked with the Slammer worm? The chaos ends up being the perfect reminder that you want to be on top of the threat.
And that’s why I’m convinced that threat hunting isn’t a luxury—it’s a requirement for organizations who are serious about security.
If your team isn’t hunting, it’s fishing in a net and hoping to catch something. Hunting is all about being the one with the eyes wide open.
As always, if you need a hand building or up-leveling your hunting skills — or just want to hear me rant about password policies or zero trust — I’m here for you.
Until next coffee break,
Sanjay Seth
P J Networks Pvt Ltd
Cybersecurity consultant since the days before cyber became a buzzword, when the networks were less complex but the threats were just as serious.