Exploring the power of the PEAK Threat Hunting framework