The document discusses issues around the use of indicators of compromise (IOCs) for threat hunting. It notes that highly targeted attacks use many evolving modules and few recipients. While IOCs provide some useful information, attackers often clean up traces and infrastructure is sometimes reused between groups. The document advocates using IOCs in context with behavior patterns and correlating them with internal information rather than solely relying on external feeds. Integrating IOC consumption and prioritizing prevention over hunting is also suggested. Oversharing details could risk revealing intelligence sources and helping attackers improve.