Evidence-based knowledge about existing or emerging cyber threats, including context, mechanisms, indicators, and actionable advice. Threat intelligence informs defensive decisions by understanding adversary capabilities, infrastructure, and motives.
Related Terms
Indicators of Compromise (IOC)
incident-responseObservable artifacts or evidence that indicate a system has been compromised or is under attack. IOCs include unusual ne...
MITRE ATT&CK
generalA globally accessible knowledge base of adversary tactics, techniques, and procedures based on real-world observations....
Threat Hunting
incident-responseThe proactive process of searching for cyber threats that have evaded existing security controls. Threat hunters use hyp...