Attack Vectors are the pathways through which attackers infiltrate computer systems, networks, or data to carry out cyberattacks
Threat Hunting
Threat Hunting is a proactive process aimed at locating and identifying advanced or sophisticated threats that have not been detected through automated security measures