Advanced Cyber Threat Intelligence and Hunting: Detect APTs and zero-day attacks using CTI, behavioral analytics, and AI techniques

Author:   Gianluca Tiepolo ,  Dan Sorensen
Publisher:   Packt Publishing Limited
ISBN:  

9781806380398


Pages:   656
Publication Date:   30 April 2026
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $131.97 Quantity:  
Add to Cart

Share |

Advanced Cyber Threat Intelligence and Hunting: Detect APTs and zero-day attacks using CTI, behavioral analytics, and AI techniques


Overview

Develop actionable strategies to proactively hunt advanced persistent threats and detect zero-days using CTI and behavior-based detection techniques Key Features Intelligence-led threat hunting framework for detecting APTs and zero-day attacks at scale Hands-on detection of stealthy adversaries using behavioral analytics and machine learning Real-world hunting workflows across cloud, hybrid, and enterprise environments Book DescriptionModern adversaries rely on stealth, living-off-the-land techniques, and zero-day exploitation to evade traditional security controls. This practical guide shows experienced defenders how to move beyond reactive alerts and build a proactive threat hunting capability driven by cyber threat intelligence. Written for seasoned cybersecurity professionals, the book demonstrates how to formulate CTI-driven hunt hypotheses and detect advanced persistent threats by analyzing adversary behavior across the Cyber Kill Chain. You’ll learn how to track APT infrastructure, map attacker TTPs using the MITRE ATT&CK framework, and identify post-exploitation activity that signals successful compromise. Through hands-on exercises, you’ll apply behavioral analytics, detection engineering, and machine learning–based anomaly detection to uncover what signature-based tools miss. Coverage includes threat hunting in cloud, hybrid, and ICS/OT environments, with real-world techniques for lateral movement, persistence, privilege escalation, and data exfiltration. By the end of this book, you’ll be equipped to run intelligence-led threat hunts, detect advanced threats earlier, and operationalize CTI as a core part of your defensive strategy.What you will learn Build CTI-driven hypotheses for proactive threat hunting Detect APT behavior across the Cyber Kill Chain Identify zero-day activity using behavioral analytics Apply MITRE ATT&CK to map adversary TTPs Use machine learning for anomaly-based detection Hunt post-exploitation activity and lateral movement Investigate threats in cloud and hybrid environments Design a scalable, resilient threat hunting program Who this book is forThis book is tailored for experienced, mid-to-senior level cybersecurity professionals operating in roles focused on proactive defense. The audience includes cyber threat hunters, cybersecurity analysts, cyber intelligence analysts, and incident responders. These profiles are looking to bridge the gap between intelligence production and its actionable application in live hunting operations, and this book will help them to achieve this.

Full Product Details

Author:   Gianluca Tiepolo ,  Dan Sorensen
Publisher:   Packt Publishing Limited
Imprint:   Packt Publishing Limited
ISBN:  

9781806380398


ISBN 10:   1806380390
Pages:   656
Publication Date:   30 April 2026
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Table of Contents Revisiting CTI for Advanced Threat Hunting Understanding APTs – Actors, Motivations, and TTPs Deep Dive – CTI Collection and Enrichment for APTs Core Principles of Proactive Threat Hunting Understanding Data Sources for Threat Hunting Hunting Zero-Days Through Behavioral Signatures Advanced Hunting Techniques and Queries Hunting Delivery and Initial Access Hunting for Exploitation and Execution Hunting for Persistence and Privilege Escalation Hunting for Lateral Movement and Discovery Hunting for Command and Control Hunting for Collection, Exfiltration, and Impact Attribution – Challenges and Techniques Behavioral Clustering for Zero-Day Detection Hunting in Cloud and Specialized Environments Building a Resilient Threat Hunting Program Emerging Trends in Threat Hunting and CTI

Reviews

Author Information

Gianluca Tiepolo is a cybersecurity researcher who specializes in mobile forensics and incident response. He holds a BSc degree in Computer Science and an MSc in Information Security, as well as several security-related certifications. Over the past 12 years, he has performed security monitoring, threat hunting, incident response, and intelligence analysis as a consultant for dozens of organizations, including several Fortune 100 companies. Gianluca is also the co-founder of the startup Sixth Sense Solutions, which developed AI-based anti-fraud solutions. Today, Gianluca works as a Security Delivery Team Lead for consulting firm Accenture Security. In 2016, he authored the book Getting Started with RethinkDB, published by Packt Publishing. Dan Sorensen has a vast experience as a Chief Information Security Officer (CISO) and advisor. He has directed $50M+ cybersecurity programs, briefed boards and senior leaders, and delivered results that align security with business outcomes. His work spans cyber risk management, Zero Trust, FedRAMP/CMMC, IAM/PAM, and compliance with global frameworks including NIST RMF, ISO 27001, HIPAA, PCI-DSS, and the EU AI Act. He has guided organizations through digital transformation, regulatory change, and emerging threats, transforming risk posture with AI-driven solutions and measurable ROI.

Tab Content 6

Author Website:  

Countries Available

All regions
Latest Reading Guide

MRGC26

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List