threat Intelligence Question - shivammittal2403/Threatintelligence GitHub Wiki
- What are the latest emerging threat actors and their motivations?
- What industries or sectors are currently under attack or at high risk?
- What are the trending attack vectors (e.g., phishing, ransomware, supply chain attacks)?
- Which geographic regions are experiencing increased cyber threat activity?
- Are there any recent data breaches or leaks relevant to our organisation?
- What vulnerabilities have been recently disclosed and pose a significant risk?
- What indicators of compromise (IOCs) are associated with known threat actors?
- Are there any signs of Advanced Persistent Threats (APTs) targeting our organisation?
- Have there been any recent changes in tactics, techniques, and procedures (TTPs) of threat actors?
- Are there any nation-state cyber activities affecting our organisation's region or sector?
- What are the latest malware families and their capabilities?
- Are there any threat intelligence sharing platforms or forums we should participate in?
- What are the most common social engineering tactics currently being used?
- Are there any threats targeting specific hardware or software used by our organisation?
- What is the impact of new or proposed cybersecurity regulations on our organisation?
- How do recent legal or geopolitical events affect the threat landscape?
- Are there any specific vulnerabilities or threats related to third-party vendors?
- What are the potential reputational risks to our organisation due to cyber threats?
- What is the likelihood of a successful cyber attack on our critical assets?
- Are there any threat intelligence reports specific to our industry or sector?
- How can threat actors exploit our organisation's supply chain?
- What are the recent trends in data exfiltration techniques?
- Are there any active or ongoing cyber espionage campaigns relevant to us?
- What are the current tactics used in business email compromise (BEC) attacks?
- How can our organisation improve its threat hunting capabilities?
- What are the top threat hunting use cases for our industry?
- What are the most effective incident response strategies against prevalent threats?
- Are there any emerging threats in the Internet of Things (IoT) ecosystem?
- How can we leverage threat intelligence to enhance our security awareness programme?
- What are the prevalent vulnerabilities in our organisation's web applications?
- Are there any indicators of malicious insider activity within our network?
- How are threat actors utilising cryptocurrencies or blockchain technology for their activities?
- Are there any recent trends in nation-state cyber capabilities and operations?
- What are the potential cyber threats posed by emerging technologies (e.g., AI, quantum computing)?
- How are threat actors utilising social media for reconnaissance or attack purposes?
- What are the potential cyber threats arising from remote work and Bring Your Own Device (BYOD) policies?
- How can we monitor and mitigate risks associated with our organisation's digital footprint?
- Are there any specific threat intelligence feeds or vendors we should subscribe to?
- How do we measure the effectiveness of our threat intelligence programme?
- What are the potential threats posed by geopolitical tensions in our organisation's operating regions?