Threat Hunting – An In-depth Explanation