In the wild jungle of cyberspace, the defenders have started actively hunting the intruders entering the organizational networks