Skip to content

Commit

Permalink
Update README.md
Browse files Browse the repository at this point in the history
  • Loading branch information
mthcht authored Dec 15, 2024
1 parent f3a2ce9 commit d16f0a8
Showing 1 changed file with 6 additions and 1 deletion.
7 changes: 6 additions & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,11 @@

## Table of Contents
- [What is Threat Hunting](#what-is-threat-hunting-)
- [Advantages of Threat Hunting](#Advantages-of-Threat-Hunting)
- [Bridging Threat Hunting With Core Services](#Bridging-Threat-Hunting-With-Core-Services)
- [Detection Maturity Level](#Detection-Maturity-Level)
- [Detection Maturity Level](#Detection-Maturity-Level)
- [Key Focus Areas for Intelligence Gathering](#Threat-Hunting-Checklist---Key-Focus-Areas-for-Intelligence-Gathering)
- [Files](#Files)
- [ThreatHunting-Keywords for the blueteam](#for-the-blueteam)
- [ThreatHunting-Keywords for the redteam](#for-the-redteam)
Expand Down Expand Up @@ -59,7 +64,7 @@ My process suggestion to organizing partially automated threat hunting sessions
![image](https://github.com/user-attachments/assets/78a905f9-8f0a-49d9-bc96-511a5dc32933)
SOC teams focus on deploying high-fidelity detections across all levels of the Detection Maturity Pyramid, targeting known threats with minimal false positives. Threat hunting complements this by addressing unknown threats, advanced TTPs, and anomalies prone to **high false-positive rates**, bridging gaps and enhancing detection coverage beyond standard SOC capabilities.

### Threat Hunting Checklist: Key Focus Areas for Intelligence Gathering
### Threat Hunting Checklist - Key Focus Areas for Intelligence Gathering

![image](https://github.com/mthcht/awesome-lists/blob/main/Lists/CheatSheets/mthcht/intelligence_gathering_sheet_for_threat_hunting.png?raw=true)

Expand Down

0 comments on commit d16f0a8

Please sign in to comment.