Haidy Hisham

Take Control of Your Threat Hunts Like Never Before!

Managing cybersecurity hunts just got smarter, faster, and more efficient! With our latest enhancements, you can now streamline scheduled hunts, gain deeper visibility into hunt cancellations, and optimize results management—all with an intuitive, user-friendly experience.

🔍 Manage Scheduled Hunts
Gain full visibility and control over your scheduled hunts with our new calendar view. Easily list, edit, cancel, or reschedule hunts, ensuring maximum efficiency and coordination across your security teams.

🚨 Intelligent Hunt Cancellations with Detailed Error Handling
No more generic errors—our enhanced cancellation process now provides granular error insights into why a hunt was stopped, including:
✅ Resource limits exceeded (Memory/CPU)
✅ Sensor updates or restarts
✅ User-initiated cancellations with attribution
✅ Asset unreachability alerts
✅ Automated time-out handling

📂 Asynchronous Hunt Result Management
Instantly download or delete hunt result files (YARA and others) without waiting. Our asynchronous processing ensures a smoother, non-blocking experience for faster incident resolution and smoother operations without workflow disruptions.

👤 Users & Last Logged-In User Visibility
Gain full visibility into logged-in users for any asset with a detailed list of all users and the last logged-in user—streamlining investigations and access audits.

🎨 UX/UI Enhancements for Seamless Navigation
Bulk selection of assets for faster actions
Sticky headers in tables for improved visibility
Optimized scrollbars for better accessibility
Dynamic breadcrumb shortening for clutter-free navigation
Ascending/Descending sorting in tables for quick data analysis
Universal country code & phone number validation for seamless integrations

These enhancements are designed to boost security operations, provide real-time visibility, and enhance analyst productivity.


Blogs
March 3, 2025

Lateral Movement: Threat Hunting “Processes Launching cmd.exe”

Lateral Movement: Threat Hunting “Processes Launching cmd.exe”  Many lateral movement techniques rely on system utilities…

Blogs
February 26, 2025

Registry Keys are Keys to Your Network

Threat Hunting Scenario  “Registry Keys are Keys to Your Network” This Blog focuses on a…

Release Notes
February 25, 2025

V.2.3.0 Release Notes

Take Control of Your Threat Hunts Like Never Before! Managing cybersecurity hunts just got smarter,…