Investigation Playbooks

Select an incident type to view step-by-step response procedures organized by lifecycle stage.

Ransomware

Encryption-based extortion attack targeting files, databases, or entire systems with ransom demands for decryption keys.

35 procedures|8 stages covered

Phishing

Social engineering attack delivered via email, SMS, or messaging platforms designed to harvest credentials or deliver malicious payloads.

30 procedures|8 stages covered

Data Exfiltration

Unauthorized transfer of sensitive data outside the organization through network channels, cloud services, or removable media.

26 procedures|8 stages covered

Insider Threat

Malicious or negligent activity by an authorized user, employee, contractor, or business partner that compromises data or systems.

30 procedures|8 stages covered

Web Application Compromise

Exploitation of web application vulnerabilities such as injection flaws, authentication bypasses, or server-side request forgery leading to unauthorized access.

26 procedures|8 stages covered

Cloud & Identity Compromise

Unauthorized access to cloud infrastructure or identity provider through stolen tokens, OAuth abuse, or misconfigured access policies.

34 procedures|8 stages covered

Business Email Compromise

Targeted attack leveraging compromised or spoofed executive email accounts to authorize fraudulent transactions or redirect sensitive communications.

33 procedures|8 stages covered

Credential Theft

Theft of authentication credentials through brute force, credential stuffing, keylogging, LSASS dumping, or password database compromise.

31 procedures|8 stages covered

Supply Chain Attack

Compromise of a trusted software vendor, update channel, or third-party library to distribute malicious code to downstream customers through legitimately signed artifacts.

7 procedures|5 stages covered

APT / Nation-State Intrusion

Advanced Persistent Threat activity by a sophisticated, well-resourced adversary characterized by long dwell time, custom tooling, stealthy persistence, and focused intelligence or strategic targeting.

13 procedures|7 stages covered

Crypto Mining

Unauthorized deployment of cryptocurrency mining software on compromised infrastructure โ€” often a foothold indicator for broader compromise, not just a resource theft issue.

7 procedures|4 stages covered

DDoS Attack

Distributed denial-of-service attack targeting application or network availability through volumetric floods, reflection/amplification, or Layer 7 exhaustion patterns.

3 procedures|3 stages covered

Zero-Day Exploitation

Active exploitation of a previously undisclosed vulnerability with no public patch or signature, requiring behavioral hunting, vendor coordination, and compensating controls.

0 procedures|0 stages covered