{"id":7428,"date":"2024-11-04T17:49:50","date_gmt":"2024-11-04T15:49:50","guid":{"rendered":"https:\/\/heliview.com\/cyber-security-experience\/?p=7428"},"modified":"2024-11-04T17:49:50","modified_gmt":"2024-11-04T15:49:50","slug":"whitepaper-threat-hunting-report","status":"publish","type":"post","link":"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-threat-hunting-report\/","title":{"rendered":"Whitepaper: Threat Hunting Report"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row][vc_column width=&#8221;2\/3&#8243;][vc_column_text css=&#8221;&#8221;]Threat hunting insights to stay ahead of modern adversaries. The trends and tactics revealed in the CrowdStrike 2024 Threat Hunting Report show how modern adversaries are increasing in stealth and sophistication. This year&#8217;s report underscores how adversaries are moving across domains and evading detection more easily than ever. Join this session to get an overview of key report findings.[\/vc_column_text]        <div class=\"lgx-subscriber-area\" >\n            <form class=\"vc-whitepaper-form\">\n                <h3>Download de whitepaper<\/h3>\n                <p class=\"nieuwsbrief-validation-error nieuwsbrief-validation-error--message hidden\">\n                    E\u00e9n of meerdere velden zijn niet of incorrect ingevuld.\n                <\/p>\n                <div class=\"row\">\n                    <label class=\"col-xs-6\">\n                        Voornaam*<br>\n                        <input type=\"text\" name=\"firstname\" maxlength=\"50\" autocomplete=\"given-name\">\n                    <\/label>\n                    <label class=\"col-xs-6\">\n                        Achternaam*<br>\n                        <input type=\"text\" name=\"lastname\" maxlength=\"50\" autocomplete=\"family-name\">\n                    <\/label>\n                <\/div>\n                <div class=\"row\">\n                    <label class=\"col-xs-6\">\n                        Bedrijfsnaam*<br>\n                        <input type=\"text\" name=\"companyname\" value=\"\" size=\"50\" autocomplete=\"organization\">\n                    <\/label>\n                    <label class=\"col-xs-6\">\n                        Functie*<br>\n                        <input type=\"text\" name=\"workdescription\" value=\"\" size=\"100\" autocomplete=\"organization\">\n                    <\/label>\n                <\/div>\n                <label>\n                    Zakelijk E-mailadres*\n                    <input type=\"email\" id=\"EmailAddressNewsletter\" name=\"email\" \/>\n                <\/label>\n                <p>Door op aanmelden te klikken geeft u toestemming om gemaild te worden, u ontvangt de whitepaper in uw mailbox.<\/p>\n                <input onclick=\"Website.SubscribeToNewsletter('851292295237', '40f51da4-c8b0-48d3-b630-8ef165170e86')\" type=\"button\" class=\"lgx-btn\" value=\"Aanmelden\">\n                <div id=\"NewsletterSuccess\" class=\"nieuwsbrief-succes hidden\">Bedankt, je ontvangt binnen een paar minuten een e-mail om de whitepaper te downloaden.<\/div>\n                <div id=\"NewsletterError\" class=\"nieuwsbrief-error hidden\">Er is helaas iets mis gegaan; uw aanvraag is niet gelukt. Probeer het later nog eens.<\/div>\n            <\/form>\n        <\/div>[\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_wp_search][vc_wp_posts number=&#8221;5&#8243;]<div class=\"wpb-content-wrapper\">[vc_row][vc_column][vc_raw_html]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[\/vc_raw_html][\/vc_column][\/vc_row]\n<\/div>[\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"Threat hunting insights to stay ahead of modern adversaries. The trends and tactics revealed in the CrowdStrike 2024 Threat Hunting Report show how modern adversaries are increasing in stealth and sophistication. This year's report underscores how adversaries are moving across domains and evading detection more easily than ever. Join this session to get an overview [...]","protected":false},"author":16,"featured_media":7429,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2,3,1,16],"tags":[],"class_list":["post-7428","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-branche-nieuws","category-congres-update","category-geen-categorie","category-home"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>Whitepaper: Threat Hunting Report<\/title>\r\n<meta name=\"description\" content=\"The trends and tactics revealed in the CrowdStrike 2024 Threat Hunting Report show how modern adversaries are increasing in stealth and sophistication\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-threat-hunting-report\/\" \/>\r\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Whitepaper: Threat Hunting Report\" \/>\r\n<meta property=\"og:description\" content=\"The trends and tactics revealed in the CrowdStrike 2024 Threat Hunting Report show how modern adversaries are increasing in stealth and sophistication\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-threat-hunting-report\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Cyber Security Experience\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/HeliviewCT\" \/>\r\n<meta property=\"article:published_time\" content=\"2024-11-04T15:49:50+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2024\/11\/Untitled-design-3.png\" \/>\r\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\r\n\t<meta property=\"og:image:height\" content=\"350\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\r\n<meta name=\"author\" content=\"miki\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:creator\" content=\"@HeliviewConf\" \/>\r\n<meta name=\"twitter:site\" content=\"@HeliviewConf\" \/>\r\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"miki\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuut\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-threat-hunting-report\/\",\"url\":\"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-threat-hunting-report\/\",\"name\":\"Whitepaper: Threat Hunting Report\",\"isPartOf\":{\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-threat-hunting-report\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-threat-hunting-report\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2024\/11\/Untitled-design-3.png\",\"datePublished\":\"2024-11-04T15:49:50+00:00\",\"author\":{\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/#\/schema\/person\/23de5087e16c5804417bbcf834dc1a3d\"},\"description\":\"The trends and tactics revealed in the CrowdStrike 2024 Threat Hunting Report show how modern adversaries are increasing in stealth and sophistication\",\"breadcrumb\":{\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-threat-hunting-report\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-threat-hunting-report\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-threat-hunting-report\/#primaryimage\",\"url\":\"https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2024\/11\/Untitled-design-3.png\",\"contentUrl\":\"https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2024\/11\/Untitled-design-3.png\",\"width\":1140,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-threat-hunting-report\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/heliview.com\/cyber-security-experience\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Whitepaper: Threat Hunting Report\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/#website\",\"url\":\"https:\/\/heliview.com\/cyber-security-experience\/\",\"name\":\"Cyber Security Experience\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/heliview.com\/cyber-security-experience\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/#\/schema\/person\/23de5087e16c5804417bbcf834dc1a3d\",\"name\":\"miki\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e2072894c7d31a87cfcb8ffc4168a4302d3f97f0927b9f9d897e41a34a857d26?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e2072894c7d31a87cfcb8ffc4168a4302d3f97f0927b9f9d897e41a34a857d26?s=96&d=mm&r=g\",\"caption\":\"miki\"}}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Whitepaper: Threat Hunting Report","description":"The trends and tactics revealed in the CrowdStrike 2024 Threat Hunting Report show how modern adversaries are increasing in stealth and sophistication","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-threat-hunting-report\/","og_locale":"nl_NL","og_type":"article","og_title":"Whitepaper: Threat Hunting Report","og_description":"The trends and tactics revealed in the CrowdStrike 2024 Threat Hunting Report show how modern adversaries are increasing in stealth and sophistication","og_url":"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-threat-hunting-report\/","og_site_name":"Cyber Security Experience","article_publisher":"https:\/\/www.facebook.com\/HeliviewCT","article_published_time":"2024-11-04T15:49:50+00:00","og_image":[{"width":1140,"height":350,"url":"https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2024\/11\/Untitled-design-3.png","type":"image\/png"}],"author":"miki","twitter_card":"summary_large_image","twitter_creator":"@HeliviewConf","twitter_site":"@HeliviewConf","twitter_misc":{"Geschreven door":"miki","Geschatte leestijd":"1 minuut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-threat-hunting-report\/","url":"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-threat-hunting-report\/","name":"Whitepaper: Threat Hunting Report","isPartOf":{"@id":"https:\/\/heliview.com\/cyber-security-experience\/#website"},"primaryImageOfPage":{"@id":"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-threat-hunting-report\/#primaryimage"},"image":{"@id":"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-threat-hunting-report\/#primaryimage"},"thumbnailUrl":"https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2024\/11\/Untitled-design-3.png","datePublished":"2024-11-04T15:49:50+00:00","author":{"@id":"https:\/\/heliview.com\/cyber-security-experience\/#\/schema\/person\/23de5087e16c5804417bbcf834dc1a3d"},"description":"The trends and tactics revealed in the CrowdStrike 2024 Threat Hunting Report show how modern adversaries are increasing in stealth and sophistication","breadcrumb":{"@id":"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-threat-hunting-report\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/heliview.com\/cyber-security-experience\/whitepaper-threat-hunting-report\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-threat-hunting-report\/#primaryimage","url":"https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2024\/11\/Untitled-design-3.png","contentUrl":"https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2024\/11\/Untitled-design-3.png","width":1140,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-threat-hunting-report\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/heliview.com\/cyber-security-experience\/"},{"@type":"ListItem","position":2,"name":"Whitepaper: Threat Hunting Report"}]},{"@type":"WebSite","@id":"https:\/\/heliview.com\/cyber-security-experience\/#website","url":"https:\/\/heliview.com\/cyber-security-experience\/","name":"Cyber Security Experience","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/heliview.com\/cyber-security-experience\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Person","@id":"https:\/\/heliview.com\/cyber-security-experience\/#\/schema\/person\/23de5087e16c5804417bbcf834dc1a3d","name":"miki","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/heliview.com\/cyber-security-experience\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e2072894c7d31a87cfcb8ffc4168a4302d3f97f0927b9f9d897e41a34a857d26?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e2072894c7d31a87cfcb8ffc4168a4302d3f97f0927b9f9d897e41a34a857d26?s=96&d=mm&r=g","caption":"miki"}}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/posts\/7428","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/comments?post=7428"}],"version-history":[{"count":1,"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/posts\/7428\/revisions"}],"predecessor-version":[{"id":7430,"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/posts\/7428\/revisions\/7430"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/media\/7429"}],"wp:attachment":[{"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/media?parent=7428"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/categories?post=7428"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/tags?post=7428"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}