Mon, 11 Aug 2025

Cyber-Security SOC

Using playbooks to analyse the connection or firewall logs to identify the intrusion attempts