Search adversary activity, malware, techniques, and victim targeting in one place, with the source text preserved so you can verify every claim before you use it.
For an analyst, this is the core question: can you validate the database quickly instead of re-reading every report from scratch?
These coverage rates tell you whether the current searchable corpus supports actor tracking and targeting analysis, not just isolated lookups.
Enough indicator depth for enrichment, hunting pivots, and historical lookups across the latest extracted corpus.
Linked actors, malware, techniques, victims, and infrastructure let you move from one fact to the next without rebuilding the chain by hand.
This mix shows whether the database helps with adversary profiling, technical analysis, and vulnerability context, not just IOC storage.
The archive is ahead of the latest extraction pass, but the searchable slice already covers the vast majority of ingested articles.
This horizontal bar measures total ingested article volume by source. Extraction coverage above shows how much of that inventory already has a current normalized result.