Source library · 320 curated entries

Where every claim in SecProve comes from.

A dense reading catalog. Every claim is footnoted. Sort by source, filter by pillar, type, or recency. Built for analysts who want to see what we are standing on.

320SOURCES
143ORGS
50DOMAINS
320ADDED · 90 DAYS
Pillar · multi-selectall 4 selected
Domainsselect pillar(s) above
Browsing the full corpus. Pick pillars above to narrow to specific domains.
12 sources · matching filters · sorted by citation density
Sort
ACybersecurity12 sources
01

Cataloged threat groups with associated TTPs. Good for questions on attribution, TTP overlap, and intelligence-driven detection.

ToolIntermediateA8 · Threat IntelligenceNEW · 22d ago
Test your knowledge · A8
02
Diamond Model of Intrusion AnalysisCaltagirone, Pendergast, Betz

Four vertices: Adversary, Capability, Infrastructure, Victim. Complements the Kill Chain and ATT&CK. Questions on analytical frameworks and when to apply each model.

ResearchIntermediateA8 · Threat IntelligenceNEW · 22d ago
Test your knowledge · A8
03

EU-focused annual threat assessment. Covers ransomware, supply chain, disinformation, state-sponsored threats. Useful counterpoint to US-centric sources.

Test your knowledge · A8
04

Indicator hierarchy from hash values (trivial) to TTPs (tough). Foundational concept for detection engineering and threat intelligence questions.

Test your knowledge · A11
05

Investigative journalism on cybercrime, breaches, and network security incidents. Good for real-world scenario questions grounded in actual events.

Test your knowledge · A2
06

Seven phases from Reconnaissance to Actions on Objectives. Widely adopted but also widely critiqued (assumes perimeter-centric model). Good for compare/contrast with ATT&CK and Unified Kill Chain.

Test your knowledge · A8
07
Mandiant APT ReportsMandiant (Google Cloud)

Detailed campaign analyses with TTPs mapped to ATT&CK. APT1, APT28/29, UNC groups. Primary source for threat-actor-specific IR questions. Not marketing — these are original threat research.

Test your knowledge · A7
08
Mandiant M-Trends ReportMandiant (Google Cloud)

Annual IR data: dwell time trends, initial access vectors, detection sources. Empirical data from thousands of engagements. One of the few sources for real-world detection/response metrics.

Test your knowledge · A7
09

Open-source threat intelligence platform for sharing, storing, and correlating indicators of compromise and threat data.

ToolIntermediateA8 · Threat IntelligenceNEW · 1mo ago
Test your knowledge · A8
10

Structured Threat Information Expression (STIX) and Trusted Automated Exchange of Intelligence Information (TAXII). The standard for sharing cyber threat intelligence.

FrameworkIntermediateA8 · Threat IntelligenceNEW · 1mo ago
Test your knowledge · A8
11

Open-source and dark web intelligence trends. Useful for questions about intelligence sources, collection methods, and the intelligence lifecycle.

Test your knowledge · A8
12

Annual analysis of real breach data. The gold standard for empirical questions about attack patterns, threat actor motivations, and time-to-detection. Updated annually.

Test your knowledge · A7

Ready to test what you've learned?

Our questions are built directly from these resources. Take a quiz and see how your knowledge stacks up.