Mark, a security analyst, was tasked with performing threat hunting to detect imminent threats in an organization's network. He generated a hypothesis based on the observations in the initial step and started the threat-hunting process using existing data collected from DNS and proxy logs.
Identify the type of threat-hunting method employed by Mark in the above scenario.
Thurman
1 months agoHoward
18 days agoUla
26 days agoJoni
2 months agoDomonique
11 days agoMelinda
13 days agoAliza
26 days agoBok
1 months agoFloyd
1 months agoMeaghan
2 months agoEileen
2 months agoStevie
2 months agoAngelica
8 days agoIlene
18 days agoAleta
1 months agoAhmad
1 months agoMichael
2 months agoSantos
2 months agoHobert
2 months ago