Threat hunting is the proactive practice of searching for signs of attacker activity that automated alerts may have missed. It matters because not every meaningful threat is caught by default detections or noisy alert pipelines.
What is Threat Hunting?
Threat hunting is a hypothesis-driven investigation process in which analysts look for suspicious patterns, techniques, or weak signals across endpoints, identities, network traffic, cloud activity, and logs. The goal is to find malicious behavior before it causes greater damage or becomes an obvious incident.
Hunting is usually more proactive and exploratory than ordinary alert triage. It often relies on context from threat intelligence, attacker tradecraft, and local environment knowledge.
What Threat Hunting Teams Look For
Threat hunts often focus on stealthy persistence, credential abuse, suspicious process chains, unusual admin behavior, overlooked lateral movement, rare outbound traffic, or evidence of attackers using legitimate tools in abnormal ways.
Threat Hunting vs. Alert Triage
Alert triage reacts to existing detections. Threat hunting starts with questions or hypotheses and actively searches for activity that may not have triggered a reliable alert yet.
Frequently Asked Questions
Does threat hunting require a mature SOC?
It helps, but even smaller teams can hunt selectively if they have useful telemetry, a clear focus, and enough operational discipline to investigate what they find.
Why do threat hunts fail?
They often fail when telemetry is weak, scope is vague, hypotheses are poor, or findings are not translated into stronger detections and response improvements afterward.