A threat analysis task
In this task, as a level one security operations center (SOC) analyst at an undisclosed company, I have received an alert about a suspicious file being downloaded on an employee’s computer. The employee received an email with a password-protected spreadsheet attachment, and upon opening it with the provided password, a [...]
