Indicators of Compromise (IoC) are clues or pieces of evidence that suggest a computer system or network has been breached or attacked. These indicators can include unusual files, unexpected network traffic, suspicious login attempts, or changes to system settings. Security professionals use IoCs to detect, investigate, and respond to cyber threats more effectively. By identifying IoCs early, organizations can limit damage, prevent further attacks, and strengthen their defenses against future incidents.