Source library · 320 curated entries

Where every claim in SecProve comes from.

A dense reading catalog. Every claim is footnoted. Sort by source, filter by pillar, type, or recency. Built for analysts who want to see what we are standing on.

320SOURCES
143ORGS
50DOMAINS
320ADDED · 90 DAYS
Pillar · multi-selectall 4 selected
Domainsselect pillar(s) above
Browsing the full corpus. Pick pillars above to narrow to specific domains.
7 sources · matching filters · sorted by citation density
Sort
ACybersecurity2 sources
01

EU-focused annual threat assessment. Covers ransomware, supply chain, disinformation, state-sponsored threats. Useful counterpoint to US-centric sources.

Test your knowledge · A8
02

Open-source and dark web intelligence trends. Useful for questions about intelligence sources, collection methods, and the intelligence lifecycle.

Test your knowledge · A8
BApplied AI in Security5 sources
01

Knowledge base of adversary tactics and techniques based on real-world observations. The industry standard for threat modeling.

Test your knowledge · B5
02

Law enforcement perspective on how LLMs enable cybercrime (phishing, malware, social engineering) and how AI assists threat intelligence and investigation.

Test your knowledge · B5
03

Open-source platform for managing cyber threat intelligence. Integrates with MITRE ATT&CK and STIX/TAXII.

ToolIntermediateB5 · AI for Threat IntelligenceNEW · 1mo ago
Test your knowledge · B5
04

Web-based tool for annotating and exploring the ATT&CK matrix. Useful for threat modeling, gap analysis, and red team planning.

Test your knowledge · B5
05

Analysis of how NLP/LLMs are being used for automated threat intelligence: dark web monitoring, malware family classification, campaign attribution. Practical applications beyond the hype.

GuideIntermediateB5 · AI for Threat IntelligenceNEW · 22d ago
Test your knowledge · B5

Ready to test what you've learned?

Our questions are built directly from these resources. Take a quiz and see how your knowledge stacks up.