Summary
In this chapter, we discussed various types of cyber threat intelligence, including strategic, operational, and tactical, focusing on their differences and target audiences. We also looked through an open source threat report and extracted various types of cyber threat intelligence, so that you could get a solid understanding of the differences.
You already know that TTPs are the most important parts of threat actors' modus operandi, so in the next chapter, we'll look at many real-world examples. This way, you can get a good awareness of human-operated ransomware attacks.