Comprehensive coordination against cyberattacks.
Identifying sophisticated malicious software.
Behavioral research and the origin of threats.
Reports and alerts on emerging risks.
Collection and analysis of information on attack actors and vectors.
Specialized technical research to determine the scope and impact of incidents.
Identifying and studying fraudulent activities.