<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Threat Vector | The Art of Threat Hunting in Threat Vector</title>
    <link>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-the-art-of-threat-hunting/ta-p/1225655</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Title_Threat-Hunter_palo-alto-networks.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/66951iEC28541164275897/image-size/large?v=v2&amp;amp;px=999" role="button" title="Title_Threat-Hunter_palo-alto-networks.jpg" alt="Title_Threat-Hunter_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In this episode of &lt;STRONG&gt;&lt;FONT color="#FF6600"&gt;Threat Vector&lt;/FONT&gt;&lt;/STRONG&gt;, host David Moulton, &lt;EM&gt;Director of Thought Leadership&lt;/EM&gt; at Palo Alto Networks, welcomes Ryan Chapman, a seasoned &lt;EM&gt;Threat Hunter and digital forensics expert&lt;/EM&gt;. With over 20 years of experience, Ryan has led incident response teams and authored courses on ransomware, making him a leading voice in the field.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4 id="toc-hId-1367122179"&gt;&lt;FONT color="#FF6600"&gt;&lt;SPAN&gt;What You'll Learn&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;The discussion covers the evolving landscape of cybersecurity, with a deep dive into modern threats like LumaStealer and the CUPS vulnerability. Ryan shares actionable insights on how organizations can enhance their defenses by prioritizing threat hunting and staying on top of the latest tactics and vulnerabilities. Tune in to learn strategies to bolster your security posture in an ever-changing threat landscape.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Eager to hear from more about threat hunting from Palo Alto Networks experts? Listen to The Role of Threat-Hunting in Cybersecurity,&amp;nbsp; Inside the Mind of State-Sponsored Cyberattackers and Decoding Cyber Adversaries: Unveiling Intent and Strategy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4 id="toc-hId--1206280664"&gt;&lt;FONT color="#FF6600"&gt;&lt;SPAN&gt;Join the conversation on our social media channels:&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN&gt;Website: ⁠⁠⁠⁠&lt;A href="https://www.paloaltonetworks.com/unit42%E2%81%A0" target="_blank" rel="noopener nofollow noreferrer"&gt;https://www.paloaltonetworks.com/unit42⁠&lt;/A&gt;⁠⁠⁠&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Threat Research: ⁠⁠⁠⁠&lt;A href="https://unit42.paloaltonetworks.com/%E2%81%A0" target="_blank" rel="noopener nofollow noreferrer"&gt;https://unit42.paloaltonetworks.com/⁠&lt;/A&gt;⁠⁠⁠&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Facebook: ⁠⁠⁠⁠&lt;A href="https://www.facebook.com/LifeatPaloAltoNetworks/%E2%81%A0" target="_blank" rel="noopener nofollow noreferrer"&gt;https://www.facebook.com/LifeatPaloAltoNetworks/⁠&lt;/A&gt;⁠⁠⁠&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;LinkedIn: ⁠⁠⁠⁠&lt;A href="https://www.linkedin.com/company/unit42/%E2%81%A0" target="_blank" rel="noopener nofollow noreferrer"&gt;https://www.linkedin.com/company/unit42/⁠&lt;/A&gt;⁠⁠⁠&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;YouTube: ⁠⁠⁠⁠@PaloAltoNetworksUnit42⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Twitter: ⁠⁠⁠⁠&lt;A href="https://twitter.com/PaloAltoNtwks%E2%81%A0" target="_blank" rel="noopener nofollow noreferrer"&gt;https://twitter.com/PaloAltoNtwks⁠&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;IFRAME src="https://playlist.megaphone.fm?e=CYBW9048361945" width="100%" height="200" frameborder="0" scrolling="no"&gt;&lt;/IFRAME&gt;&lt;/DIV&gt;</description>
    <pubDate>Thu, 03 Apr 2025 21:19:06 GMT</pubDate>
    <dc:creator>dmoulton</dc:creator>
    <dc:date>2025-04-03T21:19:06Z</dc:date>
    <item>
      <title>Threat Vector | The Art of Threat Hunting</title>
      <link>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-the-art-of-threat-hunting/ta-p/1225655</link>
      <description>&lt;P&gt;In this episode of &lt;STRONG&gt;&lt;FONT color="#FF6600"&gt;Threat Vector&lt;/FONT&gt;&lt;/STRONG&gt;, host David Moulton, &lt;EM&gt;Director of Thought Leadership&lt;/EM&gt; at Palo Alto Networks, welcomes Ryan Chapman, a seasoned &lt;EM&gt;Threat Hunter and digital forensics expert&lt;/EM&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Title_Threat-Hunter_palo-alto-networks.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/66953iBEA19FABB1C9FB87/image-size/large?v=v2&amp;amp;px=999" role="button" title="Title_Threat-Hunter_palo-alto-networks.jpg" alt="Title_Threat-Hunter_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Apr 2025 21:19:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-the-art-of-threat-hunting/ta-p/1225655</guid>
      <dc:creator>dmoulton</dc:creator>
      <dc:date>2025-04-03T21:19:06Z</dc:date>
    </item>
  </channel>
</rss>

