Prompt Sloth Logo

Analyze Incident

Extract key details from cybersecurity incident articles, focusing on concise, organized data about attack dates, types, and impacted entities. Include specific information on attackers, vulnerabilities, and remediation steps, prioritizing direct use of the article's content.

Analysis PromptsCybersecurityData ExtractionAnalyze TextAdded: 9/2/2024

Prompts for Marketers

Brainstorm Ideas Customer Pain · Brainstorm Ideas Recent Experiences · Create Real Estate SEO

223

Prompts for Sales Teams

Business Development Strategy.md · B2B Sales Call Brief.md · Email Follow-Up Essentials

23

Prompts for Developers

Agility Story · Analyze Tech Impact · Explain Code

11

Prompts for Writers

Strategies for Clearing Creditors' Debit Balances · Copywriter

2

Email Prompts

Summarize Newsletter · Non-Profit Organization Guide · Scheduling Restrictions for Operations Support.md

36

Writing Prompts

Agility Story · Answer Question · Analyze Prose

387

Coding Prompts

Master Therapist Prompt · Agility Story · Coding Master

50

Analysis Prompts

Answer Question · Analyze Answers · Analyze Claims

260

Creative Prompts

Agility Story · Answer Question · Brainstorm Ideas Customer Pain

120

Business Prompts

Brainstorm Job Search Plan · Create Coding Project · Create Reading Plan

234

Prompts for Designers

Ask Secure By Design Questions · Create Investigation Visualization · Create Logo

223

Prompts for Founders

Extract Business Ideas · Extract Patterns · Starting Virtual Assistant Business

63

Prompts for Students

Create Academic Paper · Create Quiz · Create Reading Plan

76

Prompts for HR Teams

Analyze Threat Report · Analyze Threat Report Trends · Create Network Threat Landscape

18

ChatGPT Prompts

Organize ChatGPT Conversations · ChatGPT for Medical Practice Efficiency · Export ChatGPT Conversations

4

Midjourney Prompts

Craft Effective Midjourney Prompts

1

SaaS Prompts

Create SaaS Sales Proposal.md · Build Saas Product Guide

2

Ecommerce Prompts

Resale Store Launch Plan · Create 5 Product Ideas · Digital Wallet for African Fintechs

22

Real Estate Prompts

Create Real Estate Listing · Create Real Estate SEO · Create Real Estate Tenant Questionnaire

19

Finance Prompts

Create Investment Strategy · Apply Financial Aid Private Schools · Forensic Accounting Guidance

59

Healthcare Prompts

Master Therapist Prompt · Create NCLEX Study Guide · Medical Record Translation

46

Education Prompts

Create Quiz · Create Reading Plan · Summarize Study Material

67

Legal Prompts

Check Agreement · Legal And Creative Writing Tasks · Guide Government Contracts Pharma

25

HR & People Ops Prompts

Analyze Threat Report · Analyze Threat Report Trends · Create Network Threat Landscape

17

Therapy & Wellness Prompts

Master Therapist Prompt · Analyze Debate · Analyze Ikigai

71

Prompt Library

Answer Interview Question · Create NPC · Optimize Resume Keywords

50
Cybersecurity Hack Article Analysis: Efficient Data Extraction

Objective: To swiftly and effectively gather essential information from articles about cybersecurity breaches, prioritizing conciseness and order.

Instructions:
For each article, extract the specified information below, presenting it in an organized and succinct format. Ensure to directly utilize the article's content without making inferential conclusions.

- Attack Date: YYYY-MM-DD
- Summary: A concise overview in one sentence.
- Key Details:
    - Attack Type: Main method used (e.g., "Ransomware").
    - Vulnerable Component: The exploited element (e.g., "Email system").
    - Attacker Information: 
        - Name/Organization: When available (e.g., "APT28").
        - Country of Origin: If identified (e.g., "China").
    - Target Information:
        - Name: The targeted entity.
        - Country: Location of impact (e.g., "USA").
        - Size: Entity size (e.g., "Large enterprise").
        - Industry: Affected sector (e.g., "Healthcare").
    - Incident Details:
        - CVE's: Identified CVEs (e.g., CVE-XXX, CVE-XXX).
        - Accounts Compromised: Quantity (e.g., "5000").
        - Business Impact: Brief description (e.g., "Operational disruption").
        - Impact Explanation: In one sentence.
        - Root Cause: Principal reason (e.g., "Unpatched software").
- Analysis & Recommendations:
    - MITRE ATT&CK Analysis: Applicable tactics/techniques (e.g., "T1566, T1486").
    - Atomic Red Team Atomics: Recommended tests (e.g., "T1566.001").
    - Remediation:
        - Recommendation: Summary of action (e.g., "Implement MFA").
        - Action Plan: Stepwise approach (e.g., "1. Update software, 2. Train staff").
    - Lessons Learned: Brief insights gained that could prevent future incidents.

Related prompts