Thu, 04 Sep 2025

Cyber-Security SOC

Using playbooks to analyse the connection or firewall logs to identify the intrusion attempts