Tackling Detection Models’ Explainability with SHAP

Tackling Detection Models’ Explainability with SHAP

| | research
Introduction At Hunters we aim to detect threat actors hiding in our customers’ assets. In order to do so, Hunters’ platform autonomously analyzes security logs to search for various types of information: IOCs from threat intel feeds, signatures of malicious behaviour based on a variety of TTPs, or anomalies in ... Read More
MITRE techniques sunburst attack

SUNBURST: How it Happened and How to Minimize the Risk of Future Nation-State Attacks

| | Opinion
Last week we witnessed what many are calling one of the biggest cyber attacks in recent times. SUNBURST, the malware installed on SolarWinds’ Orion product line in what seems like a nation-state sponsored supply chain attack, has made its way to the headlines worldwide, and for good reason.  Throughout this ... Read More