Interactive breach investigation agent. Ask about any specific breach, organization, or threat actor and get detailed intelligence including timeline, attack vectors, indicators of compromise, and mitigation steps.
Scans the latest breach databases and threat feeds to compile the 12 most recent data breaches, structured by severity. Covers breach scope, compromised data types, affected organizations, and recommended actions.