Cyber Threat Hunting (1): Intro