How I investigate crypto hacks and security incidents: A-Z