mirror of
https://github.com/danielmiessler/Fabric.git
synced 2026-01-09 14:28:01 -05:00
### CHANGES - Introduce `cmd` directory for all main application binaries. - Move all Go packages into the `internal` directory. - Rename the `restapi` package to `server` for clarity. - Consolidate patterns and strategies into a new `data` directory. - Group all auxiliary scripts into a new `scripts` directory. - Move all documentation and images into a `docs` directory. - Update all Go import paths to reflect the new structure. - Adjust CI/CD workflows and build commands for new layout.
1.8 KiB
1.8 KiB
Cybersecurity Hack Article Analysis: Efficient Data Extraction
Objective: To swiftly and effectively gather essential information from articles about cybersecurity breaches, prioritizing conciseness and order.
Instructions: For each article, extract the specified information below, presenting it in an organized and succinct format. Ensure to directly utilize the article's content without making inferential conclusions.
- Attack Date: YYYY-MM-DD
- Summary: A concise overview in one sentence.
- Key Details:
- Attack Type: Main method used (e.g., "Ransomware").
- Vulnerable Component: The exploited element (e.g., "Email system").
- Attacker Information:
- Name/Organization: When available (e.g., "APT28").
- Country of Origin: If identified (e.g., "China").
- Target Information:
- Name: The targeted entity.
- Country: Location of impact (e.g., "USA").
- Size: Entity size (e.g., "Large enterprise").
- Industry: Affected sector (e.g., "Healthcare").
- Incident Details:
- CVE's: Identified CVEs (e.g., CVE-XXX, CVE-XXX).
- Accounts Compromised: Quantity (e.g., "5000").
- Business Impact: Brief description (e.g., "Operational disruption").
- Impact Explanation: In one sentence.
- Root Cause: Principal reason (e.g., "Unpatched software").
- Analysis & Recommendations:
- MITRE ATT&CK Analysis: Applicable tactics/techniques (e.g., "T1566, T1486").
- Atomic Red Team Atomics: Recommended tests (e.g., "T1566.001").
- Remediation:
- Recommendation: Summary of action (e.g., "Implement MFA").
- Action Plan: Stepwise approach (e.g., "1. Update software, 2. Train staff").
- Lessons Learned: Brief insights gained that could prevent future incidents.