• v7.7.0
    • v7.11.0 (latest)
    • v7.10.0
    • v7.9.0
    • v7.8.0
    • v7.7.0
    • v7.6.0
    • v7.5.0
    • v7.3.0
    • v7.2.0
    • v7.1.1
    • v7.1.0
    • v7.0.8
  • Services & Support
  • Devo.com
  • Contact
    • Contact Us
    • Request a Demo
    • Partner Inquiry
  • Log In
    • USA Devo
    • EU Devo
PREVIOUS
Use cases
NEXT
Command & Control

Applications / Devo Security Operations / Use cases / Phishing attack

Download as PDF

Phishing attack

  • Overview
  • Video tutorial

Phishing is a fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by using a known sender (usually a bank or a telephone company) that tries to trick users with a friendly message.

A phishing emailing campaign has been sent to several employees, with the objective of installing malware inside the company. We will use Devo Security Operations application (SecOps) and its set of alerts to detect this attack.

In the following video, you can see how SecOps can help you detect this phishing attack, as well as the potential consequences derived from it.

Download as PDF

PREVIOUS
Use cases
NEXT
Command & Control

Export

See what Devo can do for you. Request a demo!
Discover what's new (Release notes)
  • v7.7.0
    • v7.11.0 (latest)
    • v7.10.0
    • v7.9.0
    • v7.8.0
    • v7.7.0
    • v7.6.0
    • v7.5.0
    • v7.3.0
    • v7.2.0
    • v7.1.1
    • v7.1.0
    • v7.0.8
  • Services & Support
  • Devo.com
  • Contact
    • Contact Us
    • Request a Demo
    • Partner Inquiry
  • Log In
    • USA Devo
    • EU Devo
  • +1 888 6830910 (USA)
  • +34 900 838 880 (Spain)
Copyright © 2019 Legal Terms Privacy Policy Cookies Policy

Powered by Confluence and Scroll Viewport