Remove Cyber threats Remove Data Analyst Remove Data collection Remove Information Security
article thumbnail

Indicators of compromise (IOCs): how we collect and use them

SecureList

Usually after the phrase there are MD5 hashes [1] , IP addresses and other technical data that should help information security specialists to counter a specific threat. What is cyber threat intelligence, and how do we use it in GReAT? This is what we call cyber threat intelligence.