Source library · 320 curated entries

Where every claim in SecProve comes from.

A dense reading catalog. Every claim is footnoted. Sort by source, filter by pillar, type, or recency. Built for analysts who want to see what we are standing on.

320SOURCES
143ORGS
50DOMAINS
320ADDED · 90 DAYS
Pillar · multi-selectall 4 selected
Domainsselect pillar(s) above
Browsing the full corpus. Pick pillars above to narrow to specific domains.
9 sources · matching filters · sorted by citation density
Sort
ACybersecurity9 sources
01

Curated newsletter covering detection engineering practices, tools, and techniques. Practical resource for SOC and detection teams.

Test your knowledge · A11
02

Indicator hierarchy from hash values (trivial) to TTPs (tough). Foundational concept for detection engineering and threat intelligence questions.

Test your knowledge · A11
03

Seven phases from Reconnaissance to Actions on Objectives. Widely adopted but also widely critiqued (assumes perimeter-centric model). Good for compare/contrast with ATT&CK and Unified Kill Chain.

Test your knowledge · A8
04
Mandiant M-Trends ReportMandiant (Google Cloud)

Annual IR data: dwell time trends, initial access vectors, detection sources. Empirical data from thousands of engagements. One of the few sources for real-world detection/response metrics.

Test your knowledge · A7
05

Independent evaluations of security products against real-world attack scenarios. Good for questions about detection coverage, visibility gaps, and evaluation methodology.

Test your knowledge · A11
06

Open-source detection engineering methodology. Goal, categorization, strategy abstract, technical context, blind spots. Well-regarded community resource despite vendor origin.

GuideIntermediateA11 · Detection Engineering & Threat HuntingNEW · 22d ago
Test your knowledge · A11
07

Generic signature format for SIEM detection rules. Platform-agnostic detection logic. Questions on detection rule writing, tuning, and false positive management.

ToolIntermediateA11 · Detection Engineering & Threat HuntingNEW · 22d ago
Test your knowledge · A11
08

Rule language for identifying malware families by binary patterns and metadata. Foundational for both detection engineering and malware classification.

Test your knowledge · A21
09

Pattern matching tool for malware researchers. Create rules to identify and classify malware based on textual or binary patterns.

ToolIntermediateA11 · Detection Engineering & Threat HuntingNEW · 1mo ago
Test your knowledge · A11

Ready to test what you've learned?

Our questions are built directly from these resources. Take a quiz and see how your knowledge stacks up.