Hmm, I'm not sure about F. Wouldn't that just be internal information for the security team? I'd focus on the external indicators that could help identify the phishing source.
Ha! I bet the security team would also want to know the 'state of the phishing email' - you know, like if it was opened, clicked, or forwarded. That's a good one, C!
A, D, and E for sure. I mean, that's the basic info you'd want to capture, right? The URLs, IPs, and file hashes could be clues to the source of the phishing attack.
Art
10 months agoLorrine
10 months agoYolande
9 months agoAmber
9 months agoCarissa
10 months agoLucia
10 months agoDevora
10 months agoJamika
10 months agoBrittney
9 months agoErick
10 months agoWilda
10 months agoLatanya
11 months agoAnastacia
11 months agoSolange
10 months agoLigia
11 months agoLeontine
11 months ago