Devo Security Operations - Phishing Use Case
Table of Contents:
00:00 - Introduction
00:10 - Phishing definition
00:28 - Phishing examples
00:46 - Use case: installing malware
01:38 - Use case procedure
02:18 - Detecting access to suspicious site
04:05 - Searching for recurrent accesses
05:41 - Searching for malware installations
06:36 - Further actions