Skip to content

Latest commit

 

History

History
36 lines (19 loc) · 2.2 KB

File metadata and controls

36 lines (19 loc) · 2.2 KB

Cyberattack-Case-Studies

Description

A repository of cyberattack case studies, focusing on the compromised components of the CIA triad (Confidentiality, Integrity, Availability), identity theft vectors, and detailed Tactics, Techniques, and Procedures (TTPs). Each report offers concise analysis of real-world breaches, helping researchers and students understand evolving threat patterns across industries.

Contents

Each case study includes a case-study.md file containing detailed analysis report

Use Cases

This repository is useful for:

  • Cybersecurity students learning about real-world attack scenarios

  • Professionals and analysts doing threat modeling or security awareness

  • Educators building case-based learning modules

  • CTF / Blue teamers referencing realistic breach narratives

How to Contribute

Contributions are welcome! If you’d like to add a new case study:

  • Fork the repo

  • Add your case study in the given format (/case-studies/YourCase.md)

  • Submit a Pull Request (PR)

License

This repository is licensed under the MIT License.