Indicators of Compromise (IoCs) serve as forensic evidence of potential intrusions on a host system or network. These artifacts enable information security (InfoSec) professionals and system administrators to detect intrusion attempts or other malici
Industrial control system (ICS) is a collective term used to describe different types of control systems and associated instrumentation, which include the devices, systems, networks, and controls used to operate and/or automate industrial processes.
An information stealer (or info stealer) is a Trojan that is designed to gather information from a system. The most common form of info stealer gathers login information, like usernames and passwords, which it sends to another system either via email
This is the measure that is based on how a threat steals data and what it does to the data stolen. Information theft is associated with this field. Most, if not all, malware have information theft routines that steal specific data.
In-the-wild threats are threats spreading among real world computers - as opposed to test systems. The infection channel is the avenue of distribution for a particular malware and includes email, IRC, bluetooth and peer-to-peer networks