Compare commits
10 Commits
bd36c22db5
...
5af69a0d47
| Author | SHA1 | Date | |
|---|---|---|---|
| 5af69a0d47 | |||
| 73cba12c9b | |||
| ebc3023208 | |||
| 23cc9934f7 | |||
| 7457f04dc6 | |||
| e820832d91 | |||
| 11e0a8ed9e | |||
| 467c579a80 | |||
| 7f4d71b829 | |||
| d192da1e39 |
+1
-1
@@ -1 +1 @@
|
||||

|
||||

|
||||
|
||||
Binary file not shown.
Binary file not shown.
|
After Width: | Height: | Size: 1.1 MiB |
Binary file not shown.
Binary file not shown.
Binary file not shown.
|
After Width: | Height: | Size: 590 KiB |
@@ -19,7 +19,9 @@ Incident response is a critical aspect of maintaining the security of any organi
|
||||
|
||||
Our playbooks are organized into categories for easy navigation and access. You can explore these categories to find playbooks that match your specific needs:
|
||||
|
||||
- [Phishing](Phishing)
|
||||
- [Ransomware](Ransomware)
|
||||
- [Malware](Malware)
|
||||
|
||||
Feel free to use, modify, and contribute to these playbooks to improve incident response across the security community.
|
||||
|
||||
|
||||
Reference in New Issue
Block a user