{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreiftfkoudffrgzp5suvgpmtrd47cxmbrp72txevv3hx4ztjdvz45oe",
"uri": "at://did:plc:iir655mcoipvnewhnkv6fb3u/app.bsky.feed.post/3mej6xbiwoqq2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreigtrg76vt266h6zlvzbislcyj5gqzy3pl7rvw6gopiz3ieux42xvy"
},
"mimeType": "image/png",
"size": 209330
},
"path": "/cybersecurity-blog/threat-hunting-for-soc-and-mssp/",
"publishedAt": "2026-02-10T13:20:03.000Z",
"site": "https://any.run",
"tags": [
"link"
],
"textContent": "\nLearn how SOCs scale threat hunting using real attack behavior, fresh intel, and TI Lookup to reduce business risk.",
"title": "How to Build Threat Hunting that Defends Your Organization Against Real Attacks"
}