Indicator of Compromise (IoC) vs. Indicator of Attack (IoA)

Photo by George Prentzas on Unsplash

Additional Resources

--

--

--

Cyber threat intelligence (CTI), cybersecurity, & privacy enthusiast. Seeking a CTI job. Bookworm. Fan of Tolkien & LEGO.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Fuzzing is always fun..!!

Review of BSC Grant Round-1 on HackerLink

What The Heck Is Securityness?

OraiBridge Subnet goes live on OraiDEX

Nmap Scan Types CheatSheet

Hello Readers,

The Ultimate Guide To Stop Email Spoofing!

{UPDATE} okeyalemi Hack Free Resources Generator

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Chad Warner

Chad Warner

Cyber threat intelligence (CTI), cybersecurity, & privacy enthusiast. Seeking a CTI job. Bookworm. Fan of Tolkien & LEGO.

More from Medium

MISP (Malware Information Sharing Platform) Setup

How to set up your own Threat Intel infrastructure (II)

Do you involve the business when doing the analysis on cyber security threats?

What is Business Risk Management? by TechFunnel

Launching a community-driven insider threat knowledge base