Phishing Playbook SummaryPhishing PlaybookWannaCry Response Playbookwannacry playbook

Download PDF   WannaCry Incident Response Plan This response plan includes steps to contain the threat, hunt for existing infections, and remediation. Following is a list of tasks that should be performed across your organization.   These tasks can and should be parallelized. The patching process can be slower but it’s important to start as […]

Cyber/Typo-squatting PlaybookCyber squatting playbook

Introduction Internet is mainly made of names and numbers by means of URLs and IPs; when a user connects to a website, the DNS (Domain Name System) translates the human-friendly domain name into website’s IP address. Businesses and social activities are, of course, strictly related to these identifiers and so does cyber criminals. While in […]