Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Badges, Bytes and Blackmail

February 7, 2026

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»NCSC: Observability and Threat Hunting Must Improve
News

NCSC: Observability and Threat Hunting Must Improve

Team-CWDBy Team-CWDOctober 9, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


UK organizations must improve observability and threat hunting “in the vital pursuit of raising the national ability” to detect cyber threats, the National Cyber Security Centre (NCSC) has urged.

NCSC CTO, Ollie Whitehouse, argued in a blog post yesterday that there is still “significant variation” in ability in these areas.

“Observability and threat hunting are core and interdependent components of modern cyber defense,” he added.

“Maturing capability across both of these components is essential to strengthening our national cyber resilience.”

Observability is the foundation for effective threat hunting, because “you can’t hunt what you can’t see,” he argued. Yet many organizations may not have a comprehensive view into account activity, devices, networks, applications and cloud services. Shadow IT may also complicate these efforts, Whitehouse said.

Read more on NCSC guidance: NCSC Updates Cyber Assessment Framework to Build UK CNI Resilience

Even when organizations do collect data across all of their assets, they often can’t apply advanced analytics to it in order to perform effective threat hunting, he added.

To address these shortcomings, the NCSC urged security teams to:

  • Maximize visibility of systems and the ability to query across combined data sets, spanning networks, hosts, devices and on-premises and cloud services
  • Encourage tech vendors to follow NCSC guidance on building systems that support improved monitoring and investigation

Time to Mature Threat Hunting

The NCSC also shared some tips on how to improve threat hunting. It advised organizations to:

  • Move beyond indicators of compromise (IOCs) such as IP addresses, domain names and file hashes, because threat actors are getting better at quickly changing or hiding these signals, for example using living-off-the-land techniques
  • Develop their use of tactics, techniques and procedures (TTPs) “which reveal how attackers operate, not just what they use.” To do so, organizations need comprehensive visibility across systems, infrastructure that allows for searching and correlation, and network defenders who can “build and test hypotheses” based on attackers’ behavior and objectives

“Organizations – or those who provide services to them – should not only ingest and detect IOCs but also be capable of consuming, creating, sharing, and detecting TTPs in their threat hunting,” said Whitehouse.

“This dual approach enhances both reactive and proactive security capabilities, improving overall resilience against sophisticated adversaries.”

The security agency also recommended its NCSC Assured list of incident response providers to help organizations struggling with threat hunting, and its Cyber Adversary Simulation (CyAS) scheme to validate approaches for those who are further along in the process.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNew Android Banking Trojan “Klopatra” Uses Hidden VNC to Control Infected Smartphones
Next Article Hackers Exploit Milesight Routers to Send Phishing SMS to European Users
Team-CWD
  • Website

Related Posts

News

Badges, Bytes and Blackmail

February 7, 2026
News

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Children and chatbots: What parents should know

January 23, 2026

Your information is on the dark web. What happens next?

January 13, 2026

Why LinkedIn is a hunting ground for threat actors – and how to protect yourself

January 16, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.