Incident Response dalam Cybersecurity
Tags
maec-delivery-vectors: | Watering Hole |
attack-pattern: | Data Malware - T1587.001 Malware - T1588.001 Phishing - T1660 Phishing - T1566 |
Common Information
Type | Value |
---|---|
UUID | e170dcc7-a0e2-45e1-976b-25382d833190 |
Fingerprint | 8d6941dde3b8b2bd |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Oct. 15, 2024, 12:21 a.m. |
Added to db | Oct. 15, 2024, 2:50 a.m. |
Last updated | Nov. 17, 2024, 5:57 p.m. |
Headline | Incident Response dalam Cybersecurity |
Title | Incident Response dalam Cybersecurity |
Detected Hints/Tags/Attributes | 15/2/6 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 167 | ✔ | Cybersecurity on Medium | https://medium.com/feed/tag/cybersecurity | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 1 | itbox.id |
|
Details | Domain | 397 | www.microsoft.com |
|
Details | Domain | 2 | widyasecurity.com |
|
Details | Url | 1 | https://itbox.id/cyber-security/apa-itu-incident-response |
|
Details | Url | 1 | https://www.microsoft.com/id-id/security/business/security-101/what-is-incident-response |
|
Details | Url | 1 | https://widyasecurity.com/2024/06/26/incident-response-kenapa-dan-kapan-harus-dilakukan |