Research

Tackling Detection Models’ Explainability with SHAP

Introduction At Hunters we aim to detect threat actors hiding in our customers’ assets. In order to do so, Hunters’ platform autonomously analyzes security logs to search for various types of information: IOCs from threat intel feeds, signatures of malicious behaviour based on a variety of TTPs, or anomalies in the data that could potentially…

Scroll to Top