This n8n workflow is designed to enhance cybersecurity by automatically analyzing potential phishing URLs found in unread emails. Triggered either manually or on a schedule, it connects to Microsoft Outlook to retrieve unread emails, marks them as read to avoid reprocessing, and then scans email content for indicators of compromise (IoCs) like URLs. These URLs are examined using URLScan.io for security scanning and VirusTotal for threat detection, with reports aggregated and analyzed. If malicious or suspicious activity is detected, a detailed report is sent via Slack to alert the cybersecurity team, providing vital information such as email subject, sender, date, and threat assessments. This workflow is ideal for continuous email security monitoring, helping organizations promptly identify and respond to phishing threats and malicious URLs.
Automated Phishing URL Analysis Workflow
Node Count | >20 Nodes |
---|---|
Nodes Used | code, filter, httpRequest, if, manualTrigger, merge, microsoftOutlook, scheduleTrigger, slack, splitInBatches, stickyNote, urlScanIo, wait |
Reviews
There are no reviews yet.