Skip to content

Systematic analysis of major cyberattacks based on CIA triad impact, identity theft, and attacker TTPs.

Notifications You must be signed in to change notification settings

abds059/Cyberattack-Case-Studies

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 

Repository files navigation

Cyberattack-Case-Studies

Description

A repository of cyberattack case studies, focusing on the compromised components of the CIA triad (Confidentiality, Integrity, Availability), identity theft vectors, and detailed Tactics, Techniques, and Procedures (TTPs). Each report offers concise analysis of real-world breaches, helping researchers and students understand evolving threat patterns across industries.

Contents

Each case study includes a case-study.md file containing detailed analysis report

Use Cases

This repository is useful for:

  • Cybersecurity students learning about real-world attack scenarios

  • Professionals and analysts doing threat modeling or security awareness

  • Educators building case-based learning modules

  • CTF / Blue teamers referencing realistic breach narratives

How to Contribute

Contributions are welcome! If you’d like to add a new case study:

  • Fork the repo

  • Add your case study in the given format (/case-studies/YourCase.md)

  • Submit a Pull Request (PR)

License

This repository is licensed under the MIT License.

About

Systematic analysis of major cyberattacks based on CIA triad impact, identity theft, and attacker TTPs.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published