Commonly organizations ask their users to forward phishing emails as .eml attachments to a phishing inbox. This technique shows how to read an email, any attachments, and any attachments that are also .eml files.
Receive screenshots of potential SMSishing attacks and extract URLs. These URLs are then analyzed using another Tines story before the report returns to the user. If the user responds to the attacker, an incident is raised on a true positive.
Tools: OCRSpace, OpenAI, PagerDuty
By Rajesh Kumar
Instantly import stories to your tenant where you can adapt them to meet your unique business requirements.
We’d love to hear your ideas or see what you’ve created.