Tue, 02 Sep 2025

Cyber-Security SOC

Using playbooks to analyse the connection or firewall logs to identify the intrusion attempts