detecting-email-account-compromise
mukul975/Anthropic-Cybersecurity-Skills
Analyze Microsoft 365 audit logs, inbox rules, sign-in data, and Graph API activity to spot compromised O365 and Google Workspace mailboxes, then report malicious forwarding, impossible travel, suspicious OAuth access, and containment steps.