
Introducing the ‘Hands-On Security’ Podcast
Hunters’ New Podcast Series Dives Deep Into Cybersecurity Events and Best Practices Cyber attackers increasingly become better at “blending in”, while we, security teams, become better at finding them nonetheless. Every time ...

The Security Benefits of Integrating Identity with Detection & Response
Identity Management – Playing a Key Role in Organization Security Participating in Oktane21, Okta’s annual conference, made it clear that this year, more than ever, that identity management takes a critical role ...

Goodbye Event Management, Hello Extended Detection and Response
Last week Hunters hosted an exciting webinar featuring Omer Singer, Head of Cyber Security Strategy at Snowflake. While we had an engaging discussion on the evolution of security operations, security as a ...

Silver Sparrow – A New Dawn of MacOS Malware
Last week, a malware dubbed “Silver Sparrow” was discovered by Red Canary. The malware targets MacOS machines with either x86 or M1 chips. Silver Sparrow installations were found in approximately 30K MacOS ...

Tackling Detection Models’ Explainability with SHAP
Introduction At Hunters we aim to detect threat actors hiding in our customers’ assets. In order to do so, Hunters’ platform autonomously analyzes security logs to search for various types of information: ...

SUNBURST: How it Happened and How to Minimize the Risk of Future Nation-State Attacks
Last week we witnessed what many are calling one of the biggest cyber attacks in recent times. SUNBURST, the malware installed on SolarWinds’ Orion product line in what seems like a nation-state ...

XDR at the Center of the New SOC
Key Takeaways from ESG’s most recent survey report “The Impact of XDR in the Modern SOC” ESG’s new survey “The Impact of XDR in the Modern SOC” is out, and one thing ...
The Dangers of Persistent Binaries and How to Spot Them – Part II
The Second Blog in a Two-Blog Series on Persistent Binary Risks and Strategies Identifying the Persistent Binaries that Matter Finding all the persistent binaries in your environment, which we covered in the ...
The Dangers of Persistent Binaries and How to Spot Them – Part II
The Second Blog in a Two-Blog Series on Persistent Binary Risks and Strategies Identifying the Persistent Binaries that Matter Finding all the persistent binaries in your environment, which we covered in the ...

Podcast: Uri May Talks XDR with Neil Hughes
Neil Hughes, the author of The Tech Talks Daily podcast, wanted to learn more about the hot emerging category of Extended Threat Detection and Response (XDR). His curiosity led him to Hunters ...