Observable artifacts or evidence that indicate a system has been compromised or is under attack. IOCs include unusual network traffic, suspicious file hashes, unexpected registry changes, and anomalous login patterns.
Related Terms
Malware Analysis
incident-responseThe process of studying malware to understand its functionality, origin, and impact. Static analysis examines code witho...
Security Information and Event Management (SIEM)
incident-responseA solution that aggregates and analyzes security log data from across an organization's IT infrastructure to detect thre...
Threat Hunting
incident-responseThe proactive process of searching for cyber threats that have evaded existing security controls. Threat hunters use hyp...