{"id":16653,"date":"2026-02-02T13:13:22","date_gmt":"2026-02-02T13:13:22","guid":{"rendered":"https:\/\/dmsretail.com\/RetailNews\/agentic-ai-to-supercharge-your-hunt\/"},"modified":"2026-02-02T13:13:22","modified_gmt":"2026-02-02T13:13:22","slug":"agentic-ai-to-supercharge-your-hunt","status":"publish","type":"post","link":"https:\/\/dmsretail.com\/RetailNews\/agentic-ai-to-supercharge-your-hunt\/","title":{"rendered":"Agentic AI to Supercharge Your Hunt"},"content":{"rendered":"<p> <p><a href=\"https:\/\/dmsretail.com\/online-workshops-list\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-496\" src=\"https:\/\/dmsretail.com\/RetailNews\/wp-content\/uploads\/2022\/05\/RETAIL-ONLINE-TRAINING-728-X-90.png\" alt=\"Retail Online Training\" width=\"729\" height=\"91\" srcset=\"https:\/\/dmsretail.com\/RetailNews\/wp-content\/uploads\/2022\/05\/RETAIL-ONLINE-TRAINING-728-X-90.png 729w, https:\/\/dmsretail.com\/RetailNews\/wp-content\/uploads\/2022\/05\/RETAIL-ONLINE-TRAINING-728-X-90-300x37.png 300w\" sizes=\"auto, (max-width: 729px) 100vw, 729px\" \/><\/a><\/p><br \/>\n<\/p>\n<div>\n<p>Threat hunting is a critical, proactive strategy to uncover hidden threats and drive security improvement, yet security teams are busy, and even the most seasoned hunters face time and resource constraints.<\/p>\n<p>Hunt preparation is a particularly crucial hunting phase involving deep research into threat actors, techniques, and internal security data.\u00a0However, it\u2019s often time-consuming, tedious, and, let\u2019s be honest, sometimes skipped or abbreviated.\u00a0The result? Hunts that are less effective, inconsistent, and\u00a0fail to\u00a0deliver maximum value.<\/p>\n<p>At\u00a0SURGe\u00a0by\u00a0Cisco Foundation AI, we believe in empowering defenders with cutting-edge technology. That\u2019s why we\u2019re thrilled to announce the release of\u00a0The PEAK Threat Hunting Assistant,\u00a0an innovative, open-source tool designed to transform and accelerate the research and planning of hypothesis-driven threat hunts. Much like our\u00a0previous\u00a0work exploring agentic AI, this project is designed to experiment with the practical implementation of agents to\u00a0assist\u00a0security practitioners in a real-world scenario.<\/p>\n<h2 class=\"wp-block-heading has-cisco-green-color has-text-color has-link-color wp-elements-91a45b30061e6959b3ece9f6f37d256d\" id=\"h-the-challenge-research-overload-in-threat-hunting\" style=\"font-style:normal;font-weight:400\">The Challenge: Research Overload in Threat Hunting<\/h2>\n<p>The\u00a0PEAK Threat Hunting Framework, which we introduced two years ago, provides a structured, vendor-agnostic approach to hunting, emphasizing three phases: Prepare, Execute, and Act, with Knowledge being a crucial component of each. While the framework itself offers invaluable guidance, the initial research and planning within the \u201cPrepare\u201d phase can be a significant hurdle. Threat hunters must:<\/p>\n<ul class=\"wp-block-list\">\n<li>Research complex\u00a0threat\u00a0actor behaviors and techniques.<\/li>\n<li>Scour public sources for the latest intelligence.<\/li>\n<li>Dig through internal wikis, incident tickets, and threat intelligence databases.<\/li>\n<li>Identify relevant data sources within their SIEM.<\/li>\n<li>Determine\u00a0which analysis technique(s) to use with their data to support or refute their hunting hypothesis.<\/li>\n<\/ul>\n<p>This deep dive is essential for crafting effective hunt hypotheses and plans, but it can be a bottleneck, leading to fatigue and overload even before the hunt begins.<\/p>\n<h2 class=\"wp-block-heading has-cisco-green-color has-text-color has-link-color wp-elements-dcba4e2a9c60753e13346e0db46a8eed\" id=\"h-the-solution-an-intelligent-agentic-assistant\" style=\"font-style:normal;font-weight:400\">The Solution: An Intelligent, Agentic Assistant<\/h2>\n<p>The PEAK Threat Hunting Assistant is a\u00a0game-changer\u00a0for those struggling to find the time to properly research and plan their hunts. Leveraging intelligent agentic AI, it acts as your personal research analyst, gathering and synthesizing vast amounts of information to provide you with a tailored, actionable hunt plan in minutes rather than hours or days. This\u00a0isn\u2019t\u00a0just automation;\u00a0it\u2019s about\u00a0intelligent\u00a0assistance\u00a0that works\u00a0<em>with<\/em>\u00a0the human hunter.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"936\" height=\"608\" data-lazy-type=\"image\" src=\"https:\/\/blogs.cisco.com\/gcs\/ciscoblogs\/1\/2026\/01\/peak-blog-image.webp\" alt=\"PEAK blog image showcasing topic research kerberoasting\" class=\"lazy lazy-hidden wp-image-484670\" style=\"width:778px;height:auto\"\/><noscript><img loading=\"lazy\" decoding=\"async\" width=\"936\" height=\"608\" src=\"https:\/\/blogs.cisco.com\/gcs\/ciscoblogs\/1\/2026\/01\/peak-blog-image.webp\" alt=\"PEAK blog image showcasing topic research kerberoasting\" class=\"wp-image-484670\" style=\"width:778px;height:auto\"\/><\/noscript><\/figure>\n<\/div>\n<p>Specifically, the PEAK Assistant uses teams of agents to\u00a0assist\u00a0with the following tasks:<\/p>\n<ul class=\"wp-block-list\">\n<li>Internet-based public research on threat actors, tactics, and techniques<\/li>\n<li>Private research through your own security data to incorporate your organization\u2019s prior experiences with the subject of your hunt<\/li>\n<li>Hypothesis generation and refinement<\/li>\n<li>Scoping via the PEAK\u00a0ABLE table<\/li>\n<li>Automated discovery of relevant SIEM data<\/li>\n<li>Generation of a customized step-by-step hunting plan, with sample queries and interpretation guidance built in<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading has-cisco-green-color has-text-color has-link-color wp-elements-3b358d72517ceaab4243400f2204a4ab\" id=\"h-how-it-works-agentic-ai-with-human-in-the-loop-control\" style=\"font-style:normal;font-weight:400\">How it Works: Agentic AI with Human-in-the-Loop Control<\/h2>\n<p>At its core, the PEAK Assistant is an agentic AI system created by threat hunters for threat hunters.\u00a0It goes beyond simple Large Language Model (LLM) calls and is designed around teams of cooperating agents capable of goal-directed reasoning, tool use, and automated feedback loops.<\/p>\n<p>A key design principle is\u00a0<strong>human-in-the-loop feedback<\/strong>. You can \u201cchat\u201d with the PEAK Assistant at any point to guide its research, clarify findings, or incorporate requirements unique to your organization. This\u00a0ensures\u00a0the output is always relevant and aligned with your specific hunting\u00a0objectives\u00a0and environment.<\/p>\n<h2 class=\"wp-block-heading has-cisco-green-color has-text-color has-link-color wp-elements-47c03ec3fae504501e798297d4a295df\" id=\"h-flexibility-the-key-to-ai-success\" style=\"font-style:normal;font-weight:400\">Flexibility: The Key to AI Success<\/h2>\n<p>At Cisco Foundation AI, we believe flexibility and user choice is one of the keys to successful AI deployment, and this is especially true for cybersecurity applications. The PEAK Assistant is designed to provide the\u00a0maximum\u00a0amount of flexibility when it comes to both model choice and data access.<\/p>\n<h2 class=\"wp-block-heading has-cisco-green-color has-text-color has-link-color wp-elements-6cb813feeda5ca8b604ec536875f86bb\" id=\"h-bring-your-own-models-byom\" style=\"font-style:normal;font-weight:400\">Bring Your Own Models (BYOM)<\/h2>\n<p>Our \u201cbring-your-own-models\u201d approach means users can integrate their preferred LLMs, including Cisco Foundation AI\u2019s own open-source, security-focused\u00a0<strong>Foundation-Sec-8b-Instruct<\/strong>\u00a0model.\u00a0This flexibility allows for fine-grained control.\u00a0You can easily switch from one LLM (or one provider) to another at any time, using the same model for all agentic tasks.<\/p>\n<p>You can even mix and match models from multiple providers, assigning specific LLMs for different tasks or data types. For example, some agents may\u00a0benefit\u00a0from more intense thought, though it may be slower and more expensive.\u00a0Selecting a reasoning model for these specific tasks might make a lot of sense.<\/p>\n<p>With our BYOM approach, you are free to choose\u00a0whichever\u00a0combination of models gives you the best results, meets your AI usage policies, and fits your budget.<\/p>\n<h2 class=\"wp-block-heading has-cisco-green-color has-text-color has-link-color wp-elements-73ca4b00ceadbb3da0a67ab546a4eb20\" id=\"h-user-provided-mcp-servers\" style=\"font-style:normal;font-weight:400\">User-Provided MCP Servers<\/h2>\n<p>The PEAK Assistant is built for data flexibility, too. Rather than code support for specific data sources and SIEMs, it relies on user-configured MCP (Model Context Protocol) servers for data operations:<\/p>\n<ol class=\"wp-block-list\">\n<li><strong>Internet Research:<\/strong>\u202fQueries public sources for the latest threat intelligence. You provide the MCP server for internet search, ensuring you control the external data access.<\/li>\n<li><strong>Local Security Data:<\/strong>\u202fCrucially, the PEAK Assistant can access your internal data sources like incident tickets, hunting wikis, and private threat intelligence databases. To prevent sensitive data leakage, the PEAK Assistant uses a separate team of agents for local data access. You provide the MCP access to these local sources,\u00a0maintaining\u00a0strict data governance.<\/li>\n<li><strong>SIEM Data Discovery and Searches:<\/strong>\u202fThis is where the PEAK Assistant truly shines in tailoring the hunt to\u202f<em>your<\/em>\u202fenvironment. It can query your existing SIEM to automatically\u00a0identify\u00a0relevant data sources and fields. This is invaluable for navigating unfamiliar environments, such as during a merger or acquisition, or for an MSSP onboarding a new customer. While you can provide \u201chints\u201d with prior knowledge, the PEAK Assistant can discover these details itself.<\/li>\n<\/ol>\n<h2 class=\"wp-block-heading has-cisco-green-color has-text-color has-link-color wp-elements-11c8a7370fd5eff814729be4a6a2b2c1\" id=\"h-comprehensive-and-actionable-output\" style=\"font-style:normal;font-weight:400\">Comprehensive and Actionable Output<\/h2>\n<p>The PEAK Assistant\u00a0doesn\u2019t\u00a0just dump raw data. It intelligently processes and presents the gathered information in structured, easy-to-digest reports:<\/p>\n<ul class=\"wp-block-list\">\n<li><strong>Internet Research Summary Report:<\/strong>\u202fThis detailed report explains the\u00a0threat\u00a0actor or technique (in plain language), why\u00a0it\u2019s\u00a0used, how it works, what log sources are relevant for hunting it, and details of any published detections or\u00a0previous\u00a0hunts.<\/li>\n<li><strong>Local Data Research Report:<\/strong>\u202fA separate report compiles insights from your internal data, highlighting\u00a0previous\u00a0interactions with threat actors, past incidents involving specific techniques, or relevant internal threat intelligence. This\u00a0ensures\u00a0all available knowledge is\u00a0leveraged\u00a0without compromising data security.<\/li>\n<li><strong>Custom Hunt Plan:<\/strong>\u202fThe culmination of the PEAK Assistant\u2019s work is a custom hunt plan, meticulously tailored to your hypothesis, your available data, and your computing environment. This plan includes step-by-step directions with real SIEM queries and clear guidance on how to interpret the outputs of each step.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading has-cisco-green-color has-text-color has-link-color wp-elements-4fc4a97dbffd59743449edc43847c3a0\" id=\"h-empowering-threat-hunters-of-all-levels\" style=\"font-style:normal;font-weight:400\">Empowering Threat Hunters of All Levels<\/h2>\n<p>The PEAK Threat Hunting Assistant is designed for threat hunters at every stage of their career. It serves as a powerful force multiplier:<\/p>\n<ul class=\"wp-block-list\">\n<li><strong>Elevates New Hunters:<\/strong>\u202fBy providing comprehensive research and structured hunt plans, it significantly improves the quality and depth of output, while teaching good hunt\u00a0preparation by example.<\/li>\n<li><strong>Accelerates Experienced Hunters:<\/strong>\u202fFor seasoned practitioners, it drastically reduces the time spent on mundane research, allowing them to focus on complex analysis and strategic decision-making.<\/li>\n<\/ul>\n<p>This tool ensures that every hunt starts with comprehensive, informed intelligence, transforming the often-tedious preparation into a strategic advantage.<\/p>\n<h2 class=\"wp-block-heading has-cisco-green-color has-text-color has-link-color wp-elements-c6582bd67d76d39eaafabb8e3d3bb64a\" id=\"h-get-started-today\" style=\"font-style:normal;font-weight:400\">Get Started Today<\/h2>\n<p>The PEAK Threat Hunting Assistant\u00a0leverages\u00a0agentic AI, empowering threat hunters of all levels to conduct high-quality, human-guided research quickly and easily. It transforms the often tedious \u201cPrepare\u201d phase into a strategic advantage, ensuring every hunt starts with a comprehensive, informed plan tailored for your exact needs.<\/p>\n<p>We invite you to give\u00a0<strong>The PEAK Threat Hunting Assistant<\/strong>\u00a0a try and experience the future of hunt preparation. Your feedback is invaluable as we continue to evolve this powerful tool.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<p class=\"has-text-align-center\" id=\"block-a1b11bef-8542-478b-95c4-6b43d582001b\"><em>We\u2019d love to hear what you think! Ask a question and stay connected with Cisco Security on social media.<\/em><\/p>\n<p class=\"has-text-align-center\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-cisco-green-color\">Cisco Security Social Media<\/mark><\/strong><\/p>\n<p class=\"has-text-align-center\" id=\"block-85b5e58a-7e0a-4b88-a1bd-54a5f658e51f\">LinkedIn<br \/>Facebook<br \/>Instagram<br \/><a href=\"https:\/\/twitter.com\/CiscoSecure\" target=\"_blank\" rel=\"noreferrer noopener\">X<\/a><\/p>\n<\/p><\/div>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><script async defer src=\"https:\/\/platform.instagram.com\/en_US\/embeds.js\"><\/script><br \/>\n<br \/><p><a href=\"https:\/\/dmsretail.com\/online-workshops-list\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-496\" src=\"https:\/\/dmsretail.com\/RetailNews\/wp-content\/uploads\/2022\/05\/RETAIL-ONLINE-TRAINING-728-X-90.png\" alt=\"Retail Online Training\" width=\"729\" height=\"91\" srcset=\"https:\/\/dmsretail.com\/RetailNews\/wp-content\/uploads\/2022\/05\/RETAIL-ONLINE-TRAINING-728-X-90.png 729w, https:\/\/dmsretail.com\/RetailNews\/wp-content\/uploads\/2022\/05\/RETAIL-ONLINE-TRAINING-728-X-90-300x37.png 300w\" sizes=\"auto, (max-width: 729px) 100vw, 729px\" \/><\/a><\/p><br \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Threat hunting is a critical, proactive strategy to uncover hidden threats and drive security improvement, yet security teams are busy, and even the most seasoned [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":16654,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-16653","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"_links":{"self":[{"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/posts\/16653","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/comments?post=16653"}],"version-history":[{"count":0,"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/posts\/16653\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/media\/16654"}],"wp:attachment":[{"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/media?parent=16653"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/categories?post=16653"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/tags?post=16653"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}