... happens. Let's go RED on this:
- How do you respond?
- define strategy, feedback, UX
- What is the evidence?
- aka IoC (indicator of compromise), intel, ...
- databases / lists of attack vectors
- in code: hashes, signatures, ...
- How do you detect?
- validation frameworks
- ...
... happens. Let's go RED on this: