Here are a series of playbooks that detail how we recommend you respond to certain events.
Respond to Leaked Credentials Events
Respond to Open Web Events
Respond to Look-alike Domains Events
Respond to Illicit Networks Events