A threat hunting team received a new IoC from an ISAC that follows a threat actor's profile and activities. Which of the following should be updated NEXT?
A. The whitelist
B. The DNS
C. The blocklist
D. The IDS signature
A. The whitelist
B. The DNS
C. The blocklist
D. The IDS signature