Browse docs sections

Threat Intelligence

From fragmented reporting to structured briefs and investigation pivots.

Use this workflow to convert scattered reporting into prioritized, actionable intelligence for operations teams.

Intelligence Workflow

Collection and Correlation

  1. Start with actor or campaign hypothesis.
  2. Pull related incidents and technique patterns.

Operational Translation

  1. Extract observable IOCs and behavior patterns.
  2. Build a concise internal brief for operations.

Example Prompt

bash

Summarize recent activity linked to [actor], include known TTP shifts, likely target sectors, and high-confidence indicators for detection engineering.

Quality Checks Before Distribution

  • Differentiate confirmed reporting from inference.
  • Mark confidence level for each key claim.
  • Include detection pivots with direct operational value.