Hunting
-
Blog
Google’s Big Sleep AI model just found a zero-day vulnerability in the wild — but don’t hold your breath for game-changing AI bug hunting tools any time soon
Google has claimed a vulnerability flagged by its Big Sleep AI model represents the first time an AI tool has found an unknown bug in the wild. Google clarified that this is the first time such a system has detected a memory-safety bug, acknowledging other AI tools have discovered different types of vulnerabilities before. “We believe this is the first…
Read More » -
Blog
5 Ghost Hunting Gadgets (And Why They Don’t Work)
Just like you, I’ve enjoyed watching “ghost hunting” reality TV, where professional ghost hunters make things look all scientific and official by bringing in heaps of shiny technology, supposedly to help detect the presence of ghosts. However, if you actually look into what sorts of tools they use, and what they actually do, it should be clear that, ghosts or…
Read More » -
Blog
Top 7 Cyber Threat Hunting Tools Reviewed by Experts for 2024
Cyber threat hunting is a proactive security measure taken to detect and neutralize potential threats on a network before they cause significant damage. To seek out this type of threat, security professionals use cyber threat-hunting tools. These are software solutions driven by advanced analytics, machine learning, and artificial intelligence to detect abnormal patterns in a system’s network and endpoints. They…
Read More » -
Blog
What Is Cyber Threat Hunting?
Cyber threat hunting involves proactively searching for threats on an organization’s network that are unknown to (or missed by) traditional cybersecurity solutions. A recent report from Armis found that cyber attack attempts increased by 104% in 2023, underscoring the need for pre-emptive threat detection to prevent breaches. In this article, we take a look at what cyber threat hunting is,…
Read More »