{"id":296,"date":"2025-10-27T03:39:24","date_gmt":"2025-10-27T03:39:24","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/smorgan\/?p=296"},"modified":"2025-10-27T03:39:24","modified_gmt":"2025-10-27T03:39:24","slug":"cyber-threat-hunter","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/smorgan\/2025\/10\/27\/cyber-threat-hunter\/","title":{"rendered":"Cyber Threat Hunter"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p>Cybersecurity is the practice of protecting systems and data from attacks. Often used<\/p>\n\n\n\n<p>situationally, the term cybersecurity can be extended to protect a range from individual attacks to<\/p>\n\n\n\n<p>attacks on government infrastructure. Morten Bay (2016) found in his research that<\/p>\n\n\n\n<p>cybersecurity, as a concept, incorporates theory from philosophy and sociology to create a<\/p>\n\n\n\n<p>multifaceted approach to the protection of assets. One job within the cybersecurity field that<\/p>\n\n\n\n<p>depends on social science is that of a cyber threat hunter. Cyber threat hunters proactively search<\/p>\n\n\n\n<p>across all aspects of a system to hunt for malicious or suspicious activities that evade detection<\/p>\n\n\n\n<p>by existing tools (Delaney 2025). By combining social science and cybersecurity practices, cyber<\/p>\n\n\n\n<p>threat hunters can identify and neutralize potential risks.<\/p>\n\n\n\n<p>Cyber threat hunters use behavioral analysis, social network analysis, and cognitive<\/p>\n\n\n\n<p>psychology in their quest to root out malicious or suspicious activity. Behavioral analysis allows<\/p>\n\n\n\n<p>cyber threat hunters to analyze the behavior of hackers and malicious actors. Understanding the<\/p>\n\n\n\n<p>motives can lead to the discovery of patterns that distinguish regular network activity from signs<\/p>\n\n\n\n<p>of an attack. Social network analysis examines the relationships among individuals or groups<\/p>\n\n\n\n<p>within cybercriminal organizations. These relationships can identify how threat actors<\/p>\n\n\n\n<p>collaborate and recruit members. Lastly, cyber threat hunters rely on principles from cognitive<\/p>\n\n\n\n<p>psychology, studying how people make decisions and perceive risk. By understanding cognitive<\/p>\n\n\n\n<p>biases such as overconfidence and confirmation bias, cyber threat hunters can train an<\/p>\n\n\n\n<p>organization\u2019s employees to recognize social engineering attempts, thereby strengthening the<\/p>\n\n\n\n<p>human firewall (Klimburg-Witjes &amp; Wentland, 2021).<\/p>\n\n\n\n<p>While the main work of cyber threat hunters is protecting systems, assets, and<\/p>\n\n\n\n<p>information, it also affects marginalized groups. Many cyber attacks target vulnerable<\/p>\n\n\n\n<p>populations. Low income communities, minorities, the elderly, and LGBTQ+ individuals are<\/p>\n\n\n\n<p>often targeted through social engineering and other scams. Cyber threat hunters stop the<\/p>\n\n\n\n<p>proliferation of such scams, thereby protecting those who may not have the knowledge and<\/p>\n\n\n\n<p>resources to defend themselves. However, cyber threat hunters can also pose privacy risks to<\/p>\n\n\n\n<p>marginalized groups as their work can be seen as a form of digital surveillance, especially when<\/p>\n\n\n\n<p>done by the government or other organizations without transparency. There is a need for ethical<\/p>\n\n\n\n<p>guidelines to ensure threat hunting does not cross the line into unintentionally violating privacy<\/p>\n\n\n\n<p>rights.<\/p>\n\n\n\n<p>Cyber threat hunters affect society by protecting the digital infrastructure that plays a<\/p>\n\n\n\n<p>large role in the day to day lives of many people. Cyber threat hunters identify and neutralize<\/p>\n\n\n\n<p>threats before they cause harm, helping the public maintain trust in digital systems ranging from<\/p>\n\n\n\n<p>personal communication to more sensitive sectors such as healthcare or banking (Carley, 2020).<\/p>\n\n\n\n<p>The field of cyber threat hunting raises ethical questions about privacy and surveillance, which in<\/p>\n\n\n\n<p>turn influence corporate policies and laws. Cyber threat hunters apply social science ethics to<\/p>\n\n\n\n<p>ensure that cybersecurity practices respect civil liberties while still maintaining safety (Yan,<\/p>\n\n\n\n<p>2022).<\/p>\n\n\n\n<p>In conclusion, cyber threat hunters combine social sciences and cybersecurity practices to<\/p>\n\n\n\n<p>identify and neutralize potential risks. The job is deeply rooted in social sciences, applying<\/p>\n\n\n\n<p>principles of behavioral analysis, social network analysis, and cognitive psychology to<\/p>\n\n\n\n<p>understand the human side of cyber risk and root out malicious or suspicious activity. Their work<\/p>\n\n\n\n<p>protects marginalized groups such as low income communities, minorities, the elderly, and<\/p>\n\n\n\n<p>LGBTQ+ individuals by stopping the spread of social engineering and scams. It also raises<\/p>\n\n\n\n<p>ethical questions related to privacy and surveillance. Cyber threat hunters also impact society by<\/p>\n\n\n\n<p>maintaining public trust through their work, protecting digital infrastructure, and influencing<\/p>\n\n\n\n<p>corporate policies and laws. Cyber threat hunters combine technical expertise with social<\/p>\n\n\n\n<p>sciences to shape a cybersecurity landscape that is not only more secure but also more in tune<\/p>\n\n\n\n<p>with its human side.<\/p>\n\n\n\n<p>References<\/p>\n\n\n\n<p>Bay, M. (2016, June).&nbsp;<em>What is cybersecurity? In search of an encompassing definition for the<\/em><\/p>\n\n\n\n<p><em>post-Snowden era<\/em>. <\/p>\n\n\n\n<p><em>Computational and<\/em><\/p>\n\n\n\n<p>Carley, K. M. (2020). Social cybersecurity: an emerging science.\u00a0<em>Mathematical Organization Theory<\/em>,\u00a0<em>26<\/em>(4), 365\u2013381.\u00a0https:\/\/doi.org\/10.1007\/s10588-020-09322-9<\/p>\n\n\n\n<p>Delaney, R. (2025, May 28).\u00a0<em>What Is Cyber Threat Hunting?<\/em>\u00a0Trellix.com. <\/p>\n\n\n\n<p>Klimburg-Witjes, N., &amp; Wentland, A. (2021). Hacking Humans? Social Engineering and the<\/p>\n\n\n\n<p>Construction of the \u201cDeficient User\u201d in Cybersecurity Discourses.&nbsp;<em>Science, Technology,<\/em><\/p>\n\n\n\n<p><em>&amp; Human Values<\/em>,&nbsp;<em>46<\/em>(6), 1316\u20131339. https:\/\/doi.org\/10.1177\/0162243921992844<\/p>\n\n\n\n<p>Yan, Z. (2022). The Dual Foundation of Cybersecurity Legislation.&nbsp;<em>Social Sciences in<\/em><\/p>\n\n\n\n<p><em>China<\/em>,&nbsp;<em>43<\/em>(3), 4\u201320. https:\/\/doi.org\/10.1080\/02529203.2022.2093065<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is the practice of protecting systems and data from attacks. Often used situationally, the term cybersecurity can be extended to protect a range from individual attacks to attacks on government infrastructure. Morten Bay (2016) found in his research that cybersecurity, as a concept, incorporates theory from philosophy and sociology to create a multifaceted approach&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/smorgan\/2025\/10\/27\/cyber-threat-hunter\/\">Read More<\/a><\/div>\n","protected":false},"author":31304,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":3},"categories":[4,3],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/smorgan\/wp-json\/wp\/v2\/posts\/296"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/smorgan\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/smorgan\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/smorgan\/wp-json\/wp\/v2\/users\/31304"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/smorgan\/wp-json\/wp\/v2\/comments?post=296"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/smorgan\/wp-json\/wp\/v2\/posts\/296\/revisions"}],"predecessor-version":[{"id":298,"href":"https:\/\/sites.wp.odu.edu\/smorgan\/wp-json\/wp\/v2\/posts\/296\/revisions\/298"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/smorgan\/wp-json\/wp\/v2\/media?parent=296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/smorgan\/wp-json\/wp\/v2\/categories?post=296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/smorgan\/wp-json\/wp\/v2\/tags?post=296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}