To effectively uncover potential security risks, organizations are often embracing “Red Team Hunt” – a process of early scanning for security holes. This involves a focused team, or a single resource, performing automated and hands-on scans of systems to simulate typical attacker behavior. Unlike reactive vulnerability reviews, Red Team Hunt