Mark, a security analyst, was tasked with performing threat hunting to detect imminent threats in an organization's network. He generated a hypothesis based on the observations in the initial step and started the threat-hunting process using existing data collected from DNS and proxy logs.
Identify the type of threat-hunting method employed by Mark in the above scenario.
Eileen
8 days agoStevie
9 days agoMichael
9 days agoSantos
10 days agoHobert
16 days ago