Source library · 320 curated entries

Where every claim in SecProve comes from.

A dense reading catalog. Every claim is footnoted. Sort by source, filter by pillar, type, or recency. Built for analysts who want to see what we are standing on.

320SOURCES
143ORGS
50DOMAINS
320ADDED · 90 DAYS
Pillar · multi-selectall 4 selected
Domainsselect pillar(s) above
Browsing the full corpus. Pick pillars above to narrow to specific domains.
10 sources · matching filters · sorted by citation density
Sort
ACybersecurity10 sources
01

Open-source digital forensics tools for disk image analysis. Industry standard for incident investigation and evidence collection.

ToolIntermediateA7 · Incident Response & ForensicsNEW · 1mo ago
Test your knowledge · A7
02

Federal hub for ransomware prevention, mitigation, and recovery guidance. Joint advisories with FBI/MS-ISAC, no-cost CISA services, and the ransomware-specific recovery checklist.

Test your knowledge · A23
03

Investigative journalism on cybercrime, breaches, and network security incidents. Good for real-world scenario questions grounded in actual events.

Test your knowledge · A2
04
Mandiant APT ReportsMandiant (Google Cloud)

Detailed campaign analyses with TTPs mapped to ATT&CK. APT1, APT28/29, UNC groups. Primary source for threat-actor-specific IR questions. Not marketing — these are original threat research.

Test your knowledge · A7
05
Mandiant M-Trends ReportMandiant (Google Cloud)

Annual IR data: dwell time trends, initial access vectors, detection sources. Empirical data from thousands of engagements. One of the few sources for real-world detection/response metrics.

Test your knowledge · A7
06

Four phases: Preparation, Detection & Analysis, Containment/Eradication/Recovery, Post-Incident Activity. The canonical IR reference. Questions should test decision-making within phases, not just naming them.

FrameworkIntermediateA7 · Incident Response & ForensicsNEW · 22d ago
Test your knowledge · A7
07

Guide to integrating forensic techniques into incident response. Covers data collection, examination, analysis, and reporting.

FrameworkIntermediateA7 · Incident Response & ForensicsNEW · 1mo ago
Test your knowledge · A7
08

Practitioner-oriented IR methodology. Six steps (Preparation, Identification, Containment, Eradication, Recovery, Lessons Learned). Compare/contrast with NIST for methodology questions.

GuideIntermediateA7 · Incident Response & ForensicsNEW · 22d ago
Test your knowledge · A7
09

Annual analysis of real breach data. The gold standard for empirical questions about attack patterns, threat actor motivations, and time-to-detection. Updated annually.

Test your knowledge · A7
10
Volatility FrameworkVolatility Foundation

Open-source memory forensics framework. Extracts digital artifacts from volatile memory (RAM) dumps.

ToolAdvancedA7 · Incident Response & ForensicsNEW · 1mo ago
Test your knowledge · A7

Ready to test what you've learned?

Our questions are built directly from these resources. Take a quiz and see how your knowledge stacks up.