Operational
DFIR Knowledge Assistant
209 forensic artifacts. 51 investigation procedures. 70 acquisition methods.
Incident Playbooks
View all🔒
Ransomware
Encryption-based extortion attack targeting files, databases, or entire systems with ransom demands for decryption keys.
33 procedures
🎣
Phishing
Social engineering attack delivered via email, SMS, or messaging platforms designed to harvest credentials or deliver malicious payloads.
29 procedures
📤
Data Exfiltration
Unauthorized transfer of sensitive data outside the organization through network channels, cloud services, or removable media.
24 procedures
👤
Insider Threat
Malicious or negligent activity by an authorized user, employee, contractor, or business partner that compromises data or systems.
25 procedures
Sponsored