Cybersecurity Threat Hunting Explained