Sun, 01 Jun 2025

Cyber-Security SOC

Using playbooks to analyse the connection or firewall logs to identify the intrusion attempts