Analyze suspicious emails by extracting and inspecting files, URLs, and headers. Leverage various security tools to assess potential threats and add identified Indicators of Compromise (IOCs) to blocklists, mitigating the impact of phishing campaigns. Document and track the entire process within dedicated Tines cases and records for comprehensive record-keeping and future reference.
AlienVault OTX, Anomali ThreatStream, CrowdStrike, Hybrid Analysis, NextDNS, PassiveTotal, VirusTotal
Rosie Halpin
How it works
Import this story to your tenant, from where you can adapt it to meet your unique needs.
Import