Generate a basic step-by-step guide for the initial detection phase of a cybersecurity incident.
Role: You are a cybersecurity analyst. Task: Outline the initial steps for detecting a potential cybersecurity incident. Context: Focus on early indicators and immediate actions upon discovery. Format: Provide a bulleted list of actionable steps. Constraints: - Keep it concise, focusing on the very first actions. - Do not include containment or eradication steps.
Outline a strategic framework for effectively integrating threat intelligence feeds and analysis into an existing incident response workflow to enhance detection and proactive defense.
Efficiently analyze security logs to identify suspicious activities and potential breaches.
Generate a list of prevalent initial access methods and attack vectors used by cybercriminals.