A screenshot of Smart SOAR showing the Webhook Authentication setting in Office 365 Fetch Event command

How to Build a Phishing Playbook Part 4: Testing and Publishing

Welcome to the fourth and final part of our How to build a Phishing Playbook series. If you haven’t read the other parts, take a look using the links below. In this part we’ll be running test data through our playbook, filling out the dynamic inputs, then publishing it to ... Read More
Phishing triage workflow in Smart SOAR

How to Build a Phishing Playbook Part 3: Playbook Development

Welcome the third part of our series on how to build an automated incident response playbook for phishing threats inside of Smart SOAR. In this part, we will be transferring our rough wireframes into the playbook editor to create a more realistic understanding of how the workflow will look and ... Read More
Wireframe Diagram of Phishing Playbook Triage Stage

How to Build a Phishing Playbook Part 2: Wireframing

Welcome back to our series on automating phishing investigation and response with playbooks in Smart SOAR. This is a four-part series covering preparation, wireframing, development, and testing. In this part, we’ll be designing our workflow, building on top of the integration commands prioritized in Part 1. Wireframing workflows is an ... Read More
A spreadsheet list of integration commands you can use to build a phishing playbook using Office 365, CrowdStrike, Active Directory, Checkpoint, and Recorded Future

How to Build a Phishing Playbook Part 1: Preparation

Automating response to phishing attacks remains one of the core use-cases of SOAR platforms. In 2022, the Anti-Phishing Working Group (APWG) logged ~4.7 million phishing attacks. Since 2019, the number of phishing attacks has increased by more than 150% yearly. Phishing is also a common delivery method for more destructive ... Read More