Mark, a security analyst, was tasked with performing threat hunting to detect imminent threats in an organization's network. He generated a hypothesis based on the observations in the initial step and started the threat-hunting process using existing data collected from DNS and proxy logs.
Identify the type of threat-hunting method employed by Mark in the above scenario.
Thurman
1 months agoHoward
9 days agoUla
17 days agoJoni
1 months agoDomonique
2 days agoMelinda
4 days agoAliza
17 days agoBok
23 days agoFloyd
27 days agoMeaghan
2 months agoEileen
2 months agoStevie
2 months agoIlene
9 days agoAleta
21 days agoAhmad
1 months agoMichael
2 months agoSantos
2 months agoHobert
2 months ago