{"id":10817,"date":"2024-03-27T09:54:02","date_gmt":"2024-03-27T08:54:02","guid":{"rendered":"https:\/\/sits.com\/jagen-statt-gejagt-werden-threat-hunting-als-geheimwaffe-der-cyber-sicherheit\/"},"modified":"2024-11-22T11:33:46","modified_gmt":"2024-11-22T10:33:46","slug":"jagen-statt-gejagt-werden-threat-hunting-als-geheimwaffe-der-cyber-sicherheit","status":"publish","type":"post","link":"https:\/\/sits.friendventure.dev\/da\/blog\/jagen-statt-gejagt-werden-threat-hunting-als-geheimwaffe-der-cyber-sicherheit\/","title":{"rendered":"At jage i stedet for at blive jaget: \u201dthreat hunting\u201d som et hemmeligt v\u00e5ben i cybersikkerhed"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text]N\u00e5r det drejer sig om threat hunting inden for cybersikkerhed, glider samtalerne ofte over i en b\u00f8lge af tekniske udtryk og forkortelser som IoA - Indicator of Attack, IoC - Indicators of Compromise eller TTP - Tactics, Techniques and Procedures. Termerne er selvf\u00f8lgelig vigtige, men de siger ikke meget om konceptet bag threat hunting, og hvad denne teknik handler om.[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<h1  class=\"h1 smx-headline \">Hvem er \u201cthreat hunterne\u201c?<\/h1>[vc_column_text]Ikke alle threat hunters har de samme opgaver, n\u00e5r de s\u00f8ger efter nye angrebsmetoder eller evaluerer koder, scripts og klassiske data- og databaseanalyser. Groft sagt er der fire grupper, hvor de tre f\u00f8rste leverer mere data, som threat hunter i virksomheder ogs\u00e5 bruger som thread intelligence:<\/p>\n<ul>\n<li>Evangelister: Selvom disse eksperter ikke er direkte threat hunters, har nogle af dem et fremragende overblik over det aktuelle IT-trusselslandskab gennem \u00e5rtier og ved, hvordan man fortolker data, der allerede er blevet analyseret. De leverer vigtigt datamateriale, som bliver til efterretningsdata. Et eksempel p\u00e5 dette er computersikkerhedsekspert og trusselsj\u00e6ger Mikko Hypp\u00f6nen. Han jagtede allerede angribere online og analyserede deres data, da alle disse begreber endnu ikke var defineret. Det er v\u00e6rd at f\u00f8lge hans foredrag og pr\u00e6sentationer. Hans forudsigelser, selv mange \u00e5r ud i fremtiden, g\u00e5r desv\u00e6rre alt for ofte i opfyldelse, som f.eks. hans tidlige citat om IoT: \"Hvis det er smart, er det s\u00e5rbart\".<\/li>\n<li>Researchers: P\u00e5 mange universiteter udf\u00f8rer ekspertteams forskning og threat hunting ved at unders\u00f8ge, hvad der er muligt med nye teknologier, og hvilke metoder angriberene bruger i \u00f8jeblikket og vil bruge i fremtiden. Amerikanske MIT CSAIL og Fraunhofer Institute SIT er i front her.<\/li>\n<li>Headsr: Nogle specialister \u00f8nsker ikke at v\u00e6re officielt kendte, men er kun i kontakt med hinanden og udveksler informationer. Check Point Research-teamet er noget mere kendt og beskriver i sin blog, hvordan de f\u00f8rst udf\u00f8rer threat hunting og derefter analyserer den n\u00f8jagtige sekvens af et malwareangreb i alle dets trin. For eksempel hvordan et angreb p\u00e5 et system til administration af mobile enheder - MDM - fandt sted. Teamet pr\u00e6senterede f\u00f8rst taktikken og sporede derefter angrebet trin for trin. Dokumentationen viser de anvendte scripts, koder, porte og v\u00e6rkt\u00f8jer. Men institutter som AV-TEST Institute besk\u00e6ftiger sig ogs\u00e5 med aktiv threat hunting. AV-TEST bruger sine egne analysev\u00e6rkt\u00f8j til dette og producerer en masse information som \"Threat Intelligence\" (TI) gennem sin datastr\u00f8m og forel\u00f8bige analyser - grundlaget for threat hunting.<\/li>\n<li>SecOps-eksperter: Denne st\u00f8rste gruppe er den virkelige s\u00f8jle i den daglige threat hunting. De drager fordel af evangelisternes, forskernes og ledernes analyser. Disse eksperter arbejder i mange SecOps-afdelinger hos sikkerhedsleverand\u00f8rer og tjenesteudbydere, der tilbyder managed SOC som en tjeneste. Mange detektionssystemer producerer datastr\u00f8mme med anomalier, som f\u00f8rst analyseres ved hj\u00e6lp af maskinl\u00e6ring (ML) eller AI. Den vigtige rest, den egentlige trusselsinformation, bruges derefter til efterforskning og threat hunting. Gennem l\u00f8bende evaluering identificerer specialteams s\u00e5rbarheder og sender dem videre som detektionsdata. Dette sikrer et passende forsvar mod udnyttelser, klassificerer s\u00e5rbarheder eller iv\u00e6rks\u00e6tter modforanstaltninger til angrebskampagner.<\/li>\n<\/ul>\n<p>[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<h2  class=\"h2 smx-headline \">Threat Intelligence - TI - kilden til threat hunters<\/h2>[vc_column_text]Enkelt forklaret er threat intelligence indsamlingen af alle de oplysninger, som threat hunters bruger til at unders\u00f8ge uregelm\u00e6ssigheder. Sp\u00f8rger man CTO og threat hunter Maik Morgenstern fra AV-TEST, er det klart, at \"threat hunting ikke kan fungere uden god trusselsinformation fra forskellige kilder og it-sikkerhedsv\u00e6rkt\u00f8jer\".[\/vc_column_text][vc_column_text]En s\u00e5dan datastr\u00f8m kan sammens\u00e6ttes af mange dele. Hvis trusselsj\u00e6gere f.eks. arbejder i en virksomheds SecOps, bruger de alle de data, der leveres af de lokale sikkerhedsv\u00e6rkt\u00f8jer. Ud over netv\u00e6rksprotokoller og strukturelle data om it-infrastrukturen omfatter dette data fra en EDR-, XDR- (med NDR) eller SIEM-l\u00f8sning. V\u00e6rkt\u00f8jerne kender it-strukturen og registrerer alle dataoverf\u00f8rsler i netv\u00e6rket, genkender softwareafh\u00e6ngigheder og deres kommunikation i netv\u00e6rket, fra klient-pc'en til cloud-applikationen.[\/vc_column_text][vc_column_text]Threat hunters tjekker normalt i\u00f8jnefaldende processer, anomalier eller unders\u00f8ger s\u00e5rbarheder baseret p\u00e5 indikationer eller tidligere offentliggjorte s\u00e5rbarheder. I bedste fald er disse allerede beskrevet som CVE (Common Vulnerabilities and Exposures) i en offentliggjort database. Ekspert Maik Morgenstern fra AV-TEST kender et praktisk eksempel, der illustrerer dette: \"Hvis man f.eks. ved, at en aktuel malware-kampagne bruger port 777 til kommunikation efter en infektion, kan en threat hunter ogs\u00e5 tjekke, om hans virksomhed kan v\u00e6re ber\u00f8rt og dermed spore angrebet. Men de kan ogs\u00e5 forhindre skader ved at overv\u00e5ge porten mere intensivt eller endda blokere den forebyggende.\"[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<h2  class=\"h2 smx-headline \">F\u00f8rst threat hunter, s\u00e5 forensic ekspert<\/h2>[vc_column_text]Threat huntere tjekker konstant deres eget netv\u00e6rk for uregelm\u00e6ssigheder eller andre mist\u00e6nkelige aktiviteter. Til det form\u00e5l bruger de threat intelligence, som er den viden, de har f\u00e5et fra aktuelle h\u00e6ndelser, der er sket andre steder. Hvis de finder de processer, eksekverede filer og adgange, de leder efter, sender de normalt disse vigtige oplysninger videre til incident response-teamet, som stopper angrebet. EDR-, XDR- (med NDR) eller SIEM-l\u00f8sninger hj\u00e6lper igen her, da de kan bruges til hurtigt at rulle omfattende netv\u00e6rksregler ud og andre handlinger og sikre yderligere overv\u00e5gning. F\u00f8rst n\u00e5r angrebet og al adgang er indd\u00e6mmet, kommer forensic eksperter i spil, da de er de bedste analytikere af farlige scripts, koder eller malware, der er brugt til angrebet.[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<h2  class=\"h2 smx-headline \">Hvorfor threat hunting er vigtigt for CISO'er og CTO'er<\/h2>[vc_column_text]<\/p>\n<ul>\n<li>Threat Hunting giver dig et bedre overblik over det aktuelle trusselsbillede i virksomhedens eget netv\u00e6rk. Hvis der identificeres en trussel eller et angreb, aktiveres incident response-teamet og den endelige forensic forts\u00e6tter.<\/li>\n<li>Threat hunters bruger ikke kun eksisterende it-sikkerhedsanalysesystemer, s\u00e5som EDR, XDR (med NDR) eller SIEM-l\u00f8sninger, der arbejder sammen med endpoint-sikkerhed. De kan ogs\u00e5 tr\u00e6ne systemer, implementere regler og dermed reducere angrebsvektorer.<\/li>\n<li>Threat huntere har som regel et godt netv\u00e6rk og har derfor dyb indsigt i de fora, som potentielle angribere bruger til at udveksle oplysninger. Threat hunters s\u00f8ger p\u00e5 Darknet, hvor kriminelle ofte handler med stj\u00e5lne credentials oplysninger eller andre virksomhedsdata. En s\u00e5dan research kan ogs\u00e5 afsl\u00f8re et datatab eller en cyberindtr\u00e6ngen, som ingen endnu har bem\u00e6rket.<\/li>\n<li>Enhver CISO og CTO b\u00f8r selv bruge ti minutter p\u00e5 threat hunting, f.eks. ved at kigge p\u00e5 Shodan.io, en s\u00f8gemaskine for internetforbundne enheder med IP-adresser. Hvis man der s\u00f8ger efter \"VMware vCenter\"-servere, som er s\u00e5rbare uden en patch via port 443, pr\u00e6senterer Shodan over 1.700 s\u00e5rbare servere i testen. Er din virksomhed p\u00e5 listen?<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text]N\u00e5r det drejer sig om threat hunting inden for cybersikkerhed, glider samtalerne ofte over i en b\u00f8lge af tekniske udtryk og forkortelser som IoA &#8211; Indicator of Attack, IoC &#8211; Indicators of Compromise eller TTP &#8211; Tactics, Techniques and Procedures. Termerne er selvf\u00f8lgelig vigtige, men de siger ikke meget om konceptet bag threat hunting, og [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":10390,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[313],"tags":[],"class_list":["post-10817","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-defense-en-da"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>At jage i stedet for at blive jaget: \u201dthreat hunting\u201d som et hemmeligt v\u00e5ben i cybersikkerhed | SITS<\/title>\n<meta name=\"description\" content=\"At jage i stedet for at blive jaget: \u201dthreat hunting\u201d som et hemmeligt v\u00e5ben i cybersikkerhed \u00bb Jetzt informieren!\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"da_DK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"At jage i stedet for at blive jaget: \u201dthreat hunting\u201d som et hemmeligt v\u00e5ben i cybersikkerhed | SITS\" \/>\n<meta property=\"og:description\" content=\"At jage i stedet for at blive jaget: \u201dthreat hunting\u201d som et hemmeligt v\u00e5ben i cybersikkerhed \u00bb Jetzt informieren!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sits.friendventure.dev\/da\/blog\/jagen-statt-gejagt-werden-threat-hunting-als-geheimwaffe-der-cyber-sicherheit\/\" \/>\n<meta property=\"og:site_name\" content=\"SITS\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-27T08:54:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-22T10:33:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement1_Cyber_Defense.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1334\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ilackinger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Skrevet af\" \/>\n\t<meta name=\"twitter:data1\" content=\"ilackinger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimeret l\u00e6setid\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sits.friendventure.dev\/da\/blog\/jagen-statt-gejagt-werden-threat-hunting-als-geheimwaffe-der-cyber-sicherheit\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sits.friendventure.dev\/da\/blog\/jagen-statt-gejagt-werden-threat-hunting-als-geheimwaffe-der-cyber-sicherheit\/\"},\"author\":{\"name\":\"ilackinger\",\"@id\":\"https:\/\/sits.friendventure.dev\/da\/#\/schema\/person\/1c8a57badeeb21935ae47de41016610d\"},\"headline\":\"At jage i stedet for at blive jaget: \u201dthreat hunting\u201d som et hemmeligt v\u00e5ben i cybersikkerhed\",\"datePublished\":\"2024-03-27T08:54:02+00:00\",\"dateModified\":\"2024-11-22T10:33:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sits.friendventure.dev\/da\/blog\/jagen-statt-gejagt-werden-threat-hunting-als-geheimwaffe-der-cyber-sicherheit\/\"},\"wordCount\":1224,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/sits.friendventure.dev\/da\/#organization\"},\"image\":{\"@id\":\"https:\/\/sits.friendventure.dev\/da\/blog\/jagen-statt-gejagt-werden-threat-hunting-als-geheimwaffe-der-cyber-sicherheit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement1_Cyber_Defense.jpg\",\"articleSection\":[\"Cyber Defense\"],\"inLanguage\":\"da-DK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/sits.friendventure.dev\/da\/blog\/jagen-statt-gejagt-werden-threat-hunting-als-geheimwaffe-der-cyber-sicherheit\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sits.friendventure.dev\/da\/blog\/jagen-statt-gejagt-werden-threat-hunting-als-geheimwaffe-der-cyber-sicherheit\/\",\"url\":\"https:\/\/sits.friendventure.dev\/da\/blog\/jagen-statt-gejagt-werden-threat-hunting-als-geheimwaffe-der-cyber-sicherheit\/\",\"name\":\"At jage i stedet for at blive jaget: \u201dthreat hunting\u201d som et hemmeligt v\u00e5ben i cybersikkerhed | SITS\",\"isPartOf\":{\"@id\":\"https:\/\/sits.friendventure.dev\/da\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sits.friendventure.dev\/da\/blog\/jagen-statt-gejagt-werden-threat-hunting-als-geheimwaffe-der-cyber-sicherheit\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sits.friendventure.dev\/da\/blog\/jagen-statt-gejagt-werden-threat-hunting-als-geheimwaffe-der-cyber-sicherheit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement1_Cyber_Defense.jpg\",\"datePublished\":\"2024-03-27T08:54:02+00:00\",\"dateModified\":\"2024-11-22T10:33:46+00:00\",\"description\":\"At jage i stedet for at blive jaget: \u201dthreat hunting\u201d som et hemmeligt v\u00e5ben i cybersikkerhed \u00bb Jetzt informieren!\",\"breadcrumb\":{\"@id\":\"https:\/\/sits.friendventure.dev\/da\/blog\/jagen-statt-gejagt-werden-threat-hunting-als-geheimwaffe-der-cyber-sicherheit\/#breadcrumb\"},\"inLanguage\":\"da-DK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sits.friendventure.dev\/da\/blog\/jagen-statt-gejagt-werden-threat-hunting-als-geheimwaffe-der-cyber-sicherheit\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/sits.friendventure.dev\/da\/blog\/jagen-statt-gejagt-werden-threat-hunting-als-geheimwaffe-der-cyber-sicherheit\/#primaryimage\",\"url\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement1_Cyber_Defense.jpg\",\"contentUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement1_Cyber_Defense.jpg\",\"width\":1334,\"height\":1440},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sits.friendventure.dev\/da\/blog\/jagen-statt-gejagt-werden-threat-hunting-als-geheimwaffe-der-cyber-sicherheit\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/sits.friendventure.dev\/da\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"At jage i stedet for at blive jaget: \u201dthreat hunting\u201d som et hemmeligt v\u00e5ben i cybersikkerhed\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sits.friendventure.dev\/da\/#website\",\"url\":\"https:\/\/sits.friendventure.dev\/da\/\",\"name\":\"SITS\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sits.friendventure.dev\/da\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sits.friendventure.dev\/da\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"da-DK\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sits.friendventure.dev\/da\/#organization\",\"name\":\"SITS\",\"url\":\"https:\/\/sits.friendventure.dev\/da\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/sits.friendventure.dev\/da\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"contentUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"width\":557,\"height\":322,\"caption\":\"SITS\"},\"image\":{\"@id\":\"https:\/\/sits.friendventure.dev\/da\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sits.friendventure.dev\/da\/#\/schema\/person\/1c8a57badeeb21935ae47de41016610d\",\"name\":\"ilackinger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/sits.friendventure.dev\/da\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4374b5318c3e575f35b3cfa5e1c98e1d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4374b5318c3e575f35b3cfa5e1c98e1d?s=96&d=mm&r=g\",\"caption\":\"ilackinger\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"At jage i stedet for at blive jaget: \u201dthreat hunting\u201d som et hemmeligt v\u00e5ben i cybersikkerhed | SITS","description":"At jage i stedet for at blive jaget: \u201dthreat hunting\u201d som et hemmeligt v\u00e5ben i cybersikkerhed \u00bb Jetzt informieren!","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"da_DK","og_type":"article","og_title":"At jage i stedet for at blive jaget: \u201dthreat hunting\u201d som et hemmeligt v\u00e5ben i cybersikkerhed | SITS","og_description":"At jage i stedet for at blive jaget: \u201dthreat hunting\u201d som et hemmeligt v\u00e5ben i cybersikkerhed \u00bb Jetzt informieren!","og_url":"https:\/\/sits.friendventure.dev\/da\/blog\/jagen-statt-gejagt-werden-threat-hunting-als-geheimwaffe-der-cyber-sicherheit\/","og_site_name":"SITS","article_published_time":"2024-03-27T08:54:02+00:00","article_modified_time":"2024-11-22T10:33:46+00:00","og_image":[{"width":1334,"height":1440,"url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement1_Cyber_Defense.jpg","type":"image\/jpeg"}],"author":"ilackinger","twitter_card":"summary_large_image","twitter_misc":{"Skrevet af":"ilackinger","Estimeret l\u00e6setid":"5 minutter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sits.friendventure.dev\/da\/blog\/jagen-statt-gejagt-werden-threat-hunting-als-geheimwaffe-der-cyber-sicherheit\/#article","isPartOf":{"@id":"https:\/\/sits.friendventure.dev\/da\/blog\/jagen-statt-gejagt-werden-threat-hunting-als-geheimwaffe-der-cyber-sicherheit\/"},"author":{"name":"ilackinger","@id":"https:\/\/sits.friendventure.dev\/da\/#\/schema\/person\/1c8a57badeeb21935ae47de41016610d"},"headline":"At jage i stedet for at blive jaget: \u201dthreat hunting\u201d som et hemmeligt v\u00e5ben i cybersikkerhed","datePublished":"2024-03-27T08:54:02+00:00","dateModified":"2024-11-22T10:33:46+00:00","mainEntityOfPage":{"@id":"https:\/\/sits.friendventure.dev\/da\/blog\/jagen-statt-gejagt-werden-threat-hunting-als-geheimwaffe-der-cyber-sicherheit\/"},"wordCount":1224,"commentCount":0,"publisher":{"@id":"https:\/\/sits.friendventure.dev\/da\/#organization"},"image":{"@id":"https:\/\/sits.friendventure.dev\/da\/blog\/jagen-statt-gejagt-werden-threat-hunting-als-geheimwaffe-der-cyber-sicherheit\/#primaryimage"},"thumbnailUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement1_Cyber_Defense.jpg","articleSection":["Cyber Defense"],"inLanguage":"da-DK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sits.friendventure.dev\/da\/blog\/jagen-statt-gejagt-werden-threat-hunting-als-geheimwaffe-der-cyber-sicherheit\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sits.friendventure.dev\/da\/blog\/jagen-statt-gejagt-werden-threat-hunting-als-geheimwaffe-der-cyber-sicherheit\/","url":"https:\/\/sits.friendventure.dev\/da\/blog\/jagen-statt-gejagt-werden-threat-hunting-als-geheimwaffe-der-cyber-sicherheit\/","name":"At jage i stedet for at blive jaget: \u201dthreat hunting\u201d som et hemmeligt v\u00e5ben i cybersikkerhed | SITS","isPartOf":{"@id":"https:\/\/sits.friendventure.dev\/da\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sits.friendventure.dev\/da\/blog\/jagen-statt-gejagt-werden-threat-hunting-als-geheimwaffe-der-cyber-sicherheit\/#primaryimage"},"image":{"@id":"https:\/\/sits.friendventure.dev\/da\/blog\/jagen-statt-gejagt-werden-threat-hunting-als-geheimwaffe-der-cyber-sicherheit\/#primaryimage"},"thumbnailUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement1_Cyber_Defense.jpg","datePublished":"2024-03-27T08:54:02+00:00","dateModified":"2024-11-22T10:33:46+00:00","description":"At jage i stedet for at blive jaget: \u201dthreat hunting\u201d som et hemmeligt v\u00e5ben i cybersikkerhed \u00bb Jetzt informieren!","breadcrumb":{"@id":"https:\/\/sits.friendventure.dev\/da\/blog\/jagen-statt-gejagt-werden-threat-hunting-als-geheimwaffe-der-cyber-sicherheit\/#breadcrumb"},"inLanguage":"da-DK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sits.friendventure.dev\/da\/blog\/jagen-statt-gejagt-werden-threat-hunting-als-geheimwaffe-der-cyber-sicherheit\/"]}]},{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/sits.friendventure.dev\/da\/blog\/jagen-statt-gejagt-werden-threat-hunting-als-geheimwaffe-der-cyber-sicherheit\/#primaryimage","url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement1_Cyber_Defense.jpg","contentUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement1_Cyber_Defense.jpg","width":1334,"height":1440},{"@type":"BreadcrumbList","@id":"https:\/\/sits.friendventure.dev\/da\/blog\/jagen-statt-gejagt-werden-threat-hunting-als-geheimwaffe-der-cyber-sicherheit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/sits.friendventure.dev\/da\/"},{"@type":"ListItem","position":2,"name":"At jage i stedet for at blive jaget: \u201dthreat hunting\u201d som et hemmeligt v\u00e5ben i cybersikkerhed"}]},{"@type":"WebSite","@id":"https:\/\/sits.friendventure.dev\/da\/#website","url":"https:\/\/sits.friendventure.dev\/da\/","name":"SITS","description":"","publisher":{"@id":"https:\/\/sits.friendventure.dev\/da\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sits.friendventure.dev\/da\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"da-DK"},{"@type":"Organization","@id":"https:\/\/sits.friendventure.dev\/da\/#organization","name":"SITS","url":"https:\/\/sits.friendventure.dev\/da\/","logo":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/sits.friendventure.dev\/da\/#\/schema\/logo\/image\/","url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","contentUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","width":557,"height":322,"caption":"SITS"},"image":{"@id":"https:\/\/sits.friendventure.dev\/da\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sits.friendventure.dev\/da\/#\/schema\/person\/1c8a57badeeb21935ae47de41016610d","name":"ilackinger","image":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/sits.friendventure.dev\/da\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4374b5318c3e575f35b3cfa5e1c98e1d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4374b5318c3e575f35b3cfa5e1c98e1d?s=96&d=mm&r=g","caption":"ilackinger"}}]}},"_links":{"self":[{"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/posts\/10817","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/comments?post=10817"}],"version-history":[{"count":4,"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/posts\/10817\/revisions"}],"predecessor-version":[{"id":18126,"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/posts\/10817\/revisions\/18126"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/media\/10390"}],"wp:attachment":[{"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/media?parent=10817"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/categories?post=10817"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/tags?post=10817"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}