<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Untagged on Fabrice's Blog</title><link>https://blog.redteamshell.com/tags/untagged/</link><description>Recent content in Untagged on Fabrice's Blog</description><generator>Hugo</generator><language>en</language><copyright>&lt;a href="https://creativecommons.org/licenses/by-nc/4.0/" target="_blank" rel="noopener">CC BY-NC 4.0&lt;/a></copyright><lastBuildDate>Mon, 12 May 2025 20:11:48 -0400</lastBuildDate><atom:link href="https://blog.redteamshell.com/tags/untagged/index.xml" rel="self" type="application/rss+xml"/><item><title>Threat Hunting vs Threat Intelligence</title><link>https://blog.redteamshell.com/posts/2025/05/threat-hunting-vs-threat-intelligence/</link><pubDate>Mon, 12 May 2025 20:11:48 -0400</pubDate><guid>https://blog.redteamshell.com/posts/2025/05/threat-hunting-vs-threat-intelligence/</guid><description>&lt;p>&lt;img src="https://blog.redteamshell.com/images/ThreatHuntingvsThreatResearch.png" alt="Cover">&lt;/p>
&lt;p>As part of my learning journey through the Hack The Box Certified Defensive Security Analyst (CDSA) certification, I’ve recently explored a fascinating topic—&lt;strong>threat hunting&lt;/strong>. The more I dive in, the more I realize how important it is to distinguish between &lt;strong>threat hunting&lt;/strong> and &lt;strong>cyber threat intelligence (CTI)&lt;/strong>. While both disciplines play vital roles in modern cybersecurity programs, they serve different functions and require distinct approaches.&lt;/p>
&lt;p>In this inaugural post for my new blog section dedicated to threat hunting, CTI, and threat actors, I want to explore how these two areas intersect, how they differ, and why both are essential to defending against today’s cyber threats.&lt;/p></description></item></channel></rss>