Business Email Compromise

Targeted attack leveraging compromised or spoofed executive email accounts to authorize fraudulent transactions or redirect sensitive communications.

Triage

5 procedures

Containment

3 procedures
Sponsored

Preservation

5 procedures

Collection

7 procedures

Analysis

4 procedures

Eradication

3 procedures

Recovery

1 procedure

Post-Incident Review

5 procedures