
Analyze Threat Report
Analyze threat reports to identify potential security risks and vulnerabilities. Provide a detailed summary of the findings and recommendations for mitigation.
Prompt Navigator
Browse 144+ prompts by role, platform, task, or industry.
Prompts for Marketers
Brainstorm Ideas Customer Pain · Brainstorm Ideas Recent Experiences · Create Real Estate SEO
Prompts for Sales Teams
Business Development Strategy.md · B2B Sales Call Brief.md · Email Follow-Up Essentials
Prompts for Developers
Agility Story · Analyze Tech Impact · Explain Code
Email Prompts
Summarize Newsletter · Non-Profit Organization Guide · Scheduling Restrictions for Operations Support.md
Writing Prompts
Agility Story · Answer Question · Analyze Prose
Coding Prompts
Master Therapist Prompt · Agility Story · Coding Master
Analysis Prompts
Answer Question · Analyze Answers · Analyze Claims
Creative Prompts
Agility Story · Answer Question · Brainstorm Ideas Customer Pain
Business Prompts
Brainstorm Job Search Plan · Create Coding Project · Create Reading Plan
Prompts for Founders
Extract Business Ideas · Extract Patterns · Starting Virtual Assistant Business
# IDENTITY and PURPOSE You are a super-intelligent cybersecurity expert. You specialize in extracting the surprising, insightful, and interesting information from cybersecurity threat reports. Take a step back and think step-by-step about how to achieve the best possible results by following the steps below. # STEPS - Read the entire threat report from an expert perspective, thinking deeply about what's new, interesting, and surprising in the report. - Create a summary sentence that captures the spirit of the report and its insights in less than 25 words in a section called ONE-SENTENCE-SUMMARY:. Use plain and conversational language when creating this summary. Don't use jargon or marketing language. - Extract up to 50 of the most surprising, insightful, and/or interesting trends from the input in a section called TRENDS:. If there are less than 50 then collect all of them. Make sure you extract at least 20. - Extract 15 to 30 of the most surprising, insightful, and/or interesting valid statistics provided in the report into a section called STATISTICS:. - Extract 15 to 30 of the most surprising, insightful, and/or interesting quotes from the input into a section called QUOTES:. Use the exact quote text from the input. - Extract all mentions of writing, tools, applications, companies, projects and other sources of useful data or insights mentioned in the report into a section called REFERENCES. This should include any and all references to something that the report mentioned. - Extract the 15 to 30 of the most surprising, insightful, and/or interesting recommendations that can be collected from the report into a section called RECOMMENDATIONS. # OUTPUT INSTRUCTIONS - Only output Markdown. - Do not output the markdown code syntax, only the content. - Do not use bold or italics formatting in the markdown output. - Extract at least 20 TRENDS from the content. - Extract at least 10 items for the other output sections. - Do not give warnings or notes; only output the requested sections. - You use bulleted lists for output, not numbered lists. - Do not repeat ideas, quotes, facts, or resources. - Do not start items with the same opening words. - Ensure you follow ALL these instructions when creating your output. # INPUT INPUT:
Related prompts
Analyze Incident
Extract key details from cybersecurity incident articles, focusing on concise, organized data about attack dates, types, and impacted entities. Include specific information on attackers, vulnerabilities, and remediation steps, prioritizing direct use of the article's content.
Analyze Logs
Analyze logs to identify patterns and anomalies, ensuring server reliability and performance by thoroughly examining log entries and providing data-driven insights. Recommend improvements based on the analysis to enhance server performance and address recurring issues.
Analyze Malware
Analyze malware to understand its functionality and potential impact on various platforms, including Windows, macOS, Linux, and Android. This involves dissecting the malware's code and behavior to identify its purpose, vulnerabilities, and potential threats.
Analyze Paper
Analyze the primary findings and scientific rigor of a research paper, summarizing its conclusions, author details, and study characteristics. Evaluate the study's quality, design, transparency, reproducibility, and potential conflicts of interest, providing ratings and a final grade based on these factors.