SERVICES
Managed Detection & Response (MDR)
Breach & Attack Simulation (BAS)
Threat Hunting (TH)
Incident Response (IR)
Security Program Gap Assessment (SPGA)
CyberConnect Roundtables
THREATS
Sector-based threat landscape
Overview
Agriculture
Energy
Maritime
Manufacturing
Technology
Logistics
Governments
Country threat profiles
Overview
Russian Federation
China
Iran
North Korea
United States
Israel
ABOUT US
ARTICLES
CONTACT
Managed Services:
Managed Detection & Response (MDR)
Breach & Attack Simulation (BAS)
Professional Services:
Threat Hunting (TH)
Incident Response (IR)
Security Program Gap Assessment (SPGA)
Information about NIS2
CyberConnect Roundtables
Our Approach
Sector-based threat landscape
Overview
Agriculture
Energy
Maritime
Manufacturing
Technology
Logistics
Governments
Country threat profiles
Overview
Russian Federation
China
North Korea
Iran
United States
Israel
Detecting targeted attacks
Articles, News and Updates
All the recent articles and news delivered by your experts from Hunt & Hackett
K-means Clustering for Lateral Movement Detection
NIS2 to ISO27001 Mapping Tool
Cyber Siege on the Fourth Estate: Protecting the Press in a Digital Battleground
Hunt & Hackett sluit contract met ICT Rijk van Nijmegen voor Managed Detection and Response (MDR) dienstverlening
Data Science for Cybersecurity
Spear Phishing: How it works and why you should care
NIS2 to CIS Controls Mapping Tool
The Definitive Guide To Process Cloning on Windows
Scalable forensics timeline analysis using Dissect and Timesketch
Kennissessies: de digitale dreiging, oplossingen en ervaringen in de land- en tuinbouwsector
Introducing Antignis: A data driven tool to configure Windows host-based firewall
Bypassing FileBlockExecutable in Sysmon 14.0: A Lesson In Analyzing Assumptions
Concealed code execution: Techniques and detection
The SolarWinds attack: A contrarian view and lessons learned
Researching access tokens for fun and knowledge
Red Mudnester: Een incident response zaak bij de Gemeente Buren (NL)
Hunt & Hackett versterkt managementteam met Marcel van Oirschot
Manufacturing industry under attack due to cyber threats
Hunt & Hackett adds Google Cloud Chronicle to their security portfolio as a core technology for its advanced MDR services
Increasing the value of Managed Detection & Response (MDR)
Lights can go out: Espionage & disruption in the energy sector
Lights can go out: Espionage & disruption in the energy sector (5/5)
Lights can go out: Espionage & disruption in the energy sector (4/5)
Lights can go out: Espionage & disruption in the energy sector (3/5)
Lights can go out: Espionage & disruption in the energy sector (2/5)
Lights can go out: Espionage & disruption in the energy sector (1/5)
Advanced IP Scanner: the preferred scanner in the A(P)T toolbox
1 year anniversary – A year in review
All hands on deck: Attackers have entered the maritime industry
All hands on deck: Attackers have entered the maritime industry (4/4)
All hands on deck: Attackers have entered the maritime industry (3/4)
All hands on deck: Attackers have entered the maritime industry (2/4)
All hands on deck: Attackers have entered the maritime industry (1/4)
Agriculture in the crosshairs of nation-state sponsored hackers
Agriculture in the crosshairs of nation-state sponsored hackers (5/5)
Agriculture in the crosshairs of nation-state sponsored hackers (4/5)
Agriculture in the crosshairs of nation-state sponsored hackers (3/5)
Agriculture in the crosshairs of nation-state sponsored hackers (2/5)
Agriculture in the crosshairs of nation-state sponsored hackers (1/5)
Buyer's Guide to Managed Detection & Response (MDR)
REvil: the usage of legitimate remote admin tooling
Insights: the driving force behind a digital immune system
Closing the loop with Breach & Attack Simulation
Applied Threat Diagnostics
Threat Modelling as starting point