🔐
RANSOMWARE
Ransomware detection, containment, and recovery procedures
🎣
PHISHING
Email phishing investigation and user compromise response
💥
DATA BREACH
Data exfiltration detection and breach response
👤
INSIDER THREAT
Malicious insider activity detection and investigation
🦠
MALWARE OUTBREAK
Malware detection, containment, and eradication
🔑
ACCOUNT COMPROMISE
Compromised account detection and remediation
📡
DDoS ATTACK
Distributed denial of service mitigation
🎯
APT DETECTION
Advanced persistent threat hunting and response