SOC Prime, a threat detection marketplace provider, has announced the Quick Hunt threat hunting module for its Detection as Code platform.Quick Hunt supports one-click threat hunting capabilities, SOC Prime asserted. It lets security teams run threat queries in various security information and event management (SIEM) and endpoint detection and response (EDR) tools, including:CrowdStrike Elasticsearch Google Chronicle Security Humio Microsoft Defender Advanced Threat Protection (ATP) Microsoft Azure Sentinel Quick Hunt recommends queries based on peer feedback collected from the SOC Prime's managed detection and response (MDR) and MSSP partners, the SOC Prime Lab and the global threat hunting community, SOC Prime indicated. From there, security teams can use Quick Hunt to access trending content tailored to their SIEM or EDR tools and explore ways to accelerate threat investigation and remediation. In addition, Quick Hunt provides MITRE ATT&CK details, SOC Prime stated. As such, security teams can leverage Quick Hunt to identify cyberattack tactics, techniques and sub-techniques related to their queries.Detection as Code users can leverage Quick Hunt to conduct unmetered hunts with Community queries starting Nov. 22, 2021, SOC Prime indicated. They can continue to do so until Dec. 31, 2021.