
Analyze Incident
Extract key details from cybersecurity incident articles, focusing on concise, organized data about attack dates, types, and impacted entities. Include specific information on attackers, vulnerabilities, and remediation steps, prioritizing direct use of the article's content.
Prompt Navigator
Browse 144+ prompts by role, platform, task, or industry.
Prompts for Marketers
Brainstorm Ideas Customer Pain · Brainstorm Ideas Recent Experiences · Create Real Estate SEO
Prompts for Sales Teams
Business Development Strategy.md · B2B Sales Call Brief.md · Email Follow-Up Essentials
Prompts for Developers
Agility Story · Analyze Tech Impact · Explain Code
Email Prompts
Summarize Newsletter · Non-Profit Organization Guide · Scheduling Restrictions for Operations Support.md
Writing Prompts
Agility Story · Answer Question · Analyze Prose
Coding Prompts
Master Therapist Prompt · Agility Story · Coding Master
Analysis Prompts
Answer Question · Analyze Answers · Analyze Claims
Creative Prompts
Agility Story · Answer Question · Brainstorm Ideas Customer Pain
Business Prompts
Brainstorm Job Search Plan · Create Coding Project · Create Reading Plan
Prompts for Founders
Extract Business Ideas · Extract Patterns · Starting Virtual Assistant Business
Cybersecurity Hack Article Analysis: Efficient Data Extraction Objective: To swiftly and effectively gather essential information from articles about cybersecurity breaches, prioritizing conciseness and order. Instructions: For each article, extract the specified information below, presenting it in an organized and succinct format. Ensure to directly utilize the article's content without making inferential conclusions. - Attack Date: YYYY-MM-DD - Summary: A concise overview in one sentence. - Key Details: - Attack Type: Main method used (e.g., "Ransomware"). - Vulnerable Component: The exploited element (e.g., "Email system"). - Attacker Information: - Name/Organization: When available (e.g., "APT28"). - Country of Origin: If identified (e.g., "China"). - Target Information: - Name: The targeted entity. - Country: Location of impact (e.g., "USA"). - Size: Entity size (e.g., "Large enterprise"). - Industry: Affected sector (e.g., "Healthcare"). - Incident Details: - CVE's: Identified CVEs (e.g., CVE-XXX, CVE-XXX). - Accounts Compromised: Quantity (e.g., "5000"). - Business Impact: Brief description (e.g., "Operational disruption"). - Impact Explanation: In one sentence. - Root Cause: Principal reason (e.g., "Unpatched software"). - Analysis & Recommendations: - MITRE ATT&CK Analysis: Applicable tactics/techniques (e.g., "T1566, T1486"). - Atomic Red Team Atomics: Recommended tests (e.g., "T1566.001"). - Remediation: - Recommendation: Summary of action (e.g., "Implement MFA"). - Action Plan: Stepwise approach (e.g., "1. Update software, 2. Train staff"). - Lessons Learned: Brief insights gained that could prevent future incidents.
Related prompts
Analyze Answers
Analyze answers to evaluate their correctness, adapting the evaluation to the student level.
Analyze Claims
Analyze claims by identifying biases, inconsistencies, and logical fallacies in the provided text. Provide a detailed breakdown of the arguments, including evidence and reasoning used to support or refute the claims.
Analyze Debate
Evaluate debates by mapping claims, analyzing arguments neutrally, and scoring their insightfulness and emotionality. Provide a detailed breakdown of participants' arguments, agreements, disagreements, misunderstandings, learnings, and actionable takeaways.
Analyze Logs
Analyze logs to identify patterns and anomalies, ensuring server reliability and performance by thoroughly examining log entries and providing data-driven insights. Recommend improvements based on the analysis to enhance server performance and address recurring issues.