threat Intelligence Question - shivammittal2403/Threatintelligence GitHub Wiki

  1. What are the latest emerging threat actors and their motivations?
  2. What industries or sectors are currently under attack or at high risk?
  3. What are the trending attack vectors (e.g., phishing, ransomware, supply chain attacks)?
  4. Which geographic regions are experiencing increased cyber threat activity?
  5. Are there any recent data breaches or leaks relevant to our organisation?
  6. What vulnerabilities have been recently disclosed and pose a significant risk?
  7. What indicators of compromise (IOCs) are associated with known threat actors?
  8. Are there any signs of Advanced Persistent Threats (APTs) targeting our organisation?
  9. Have there been any recent changes in tactics, techniques, and procedures (TTPs) of threat actors?
  10. Are there any nation-state cyber activities affecting our organisation's region or sector?
  11. What are the latest malware families and their capabilities?
  12. Are there any threat intelligence sharing platforms or forums we should participate in?
  13. What are the most common social engineering tactics currently being used?
  14. Are there any threats targeting specific hardware or software used by our organisation?
  15. What is the impact of new or proposed cybersecurity regulations on our organisation?
  16. How do recent legal or geopolitical events affect the threat landscape?
  17. Are there any specific vulnerabilities or threats related to third-party vendors?
  18. What are the potential reputational risks to our organisation due to cyber threats?
  19. What is the likelihood of a successful cyber attack on our critical assets?
  20. Are there any threat intelligence reports specific to our industry or sector?
  21. How can threat actors exploit our organisation's supply chain?
  22. What are the recent trends in data exfiltration techniques?
  23. Are there any active or ongoing cyber espionage campaigns relevant to us?
  24. What are the current tactics used in business email compromise (BEC) attacks?
  25. How can our organisation improve its threat hunting capabilities?
  26. What are the top threat hunting use cases for our industry?
  27. What are the most effective incident response strategies against prevalent threats?
  28. Are there any emerging threats in the Internet of Things (IoT) ecosystem?
  29. How can we leverage threat intelligence to enhance our security awareness programme?
  30. What are the prevalent vulnerabilities in our organisation's web applications?
  31. Are there any indicators of malicious insider activity within our network?
  32. How are threat actors utilising cryptocurrencies or blockchain technology for their activities?
  33. Are there any recent trends in nation-state cyber capabilities and operations?
  34. What are the potential cyber threats posed by emerging technologies (e.g., AI, quantum computing)?
  35. How are threat actors utilising social media for reconnaissance or attack purposes?
  36. What are the potential cyber threats arising from remote work and Bring Your Own Device (BYOD) policies?
  37. How can we monitor and mitigate risks associated with our organisation's digital footprint?
  38. Are there any specific threat intelligence feeds or vendors we should subscribe to?
  39. How do we measure the effectiveness of our threat intelligence programme?
  40. What are the potential threats posed by geopolitical tensions in our organisation's operating regions?