Remove 2008 Remove Data Analyst Remove DNS Remove Technology
article thumbnail

Indicators of compromise (IOCs): how we collect and use them

SecureList

It is a highly demanding activity, which requires time, multidisciplinary skills, efficient technology, innovation and dedication. We have been doing so since 2008, benefiting from Kaspersky’s decades of cyberthreat data management, and unrivaled technologies. By searching for any previously known IOC (e.g.,