Threat hunting is necessary because sophisticated threats can evade automated cybersecurity. Although automated security technologies and tier 1 and 2 security operations centere (SOC) analysts should be able to deal with around 80% of attacks, the other 20% must be addressed. The other 20% of threats are more likely to be sophisticated threats that can inflict considerable damage. Given enough time and resources, they can sneak into any network and avoid discovery for up to 280 days on average. Effective threat hunting shortens the period between intrusion and discovery, lowering the amount of damage done by attackers.
Attackers frequently skulk for weeks, if not months, before being discovered. They calmly wait to siphon off data and unearth enough confidential information or credentials to gain additional access, so laying the groundwork for a large data breach. How much harm might prospective threats do? According to the "Cost of a Data Breach Report 2020," a data breach costs a corporation around USD 4 million on average. And the consequences of a breach might last for years. The longer the time elapses between system failure and response deployment, the more an organization may pay.