Report Template Obsidian
# [REPORT TITLE - MAKE IT VIRAL]
*Template for Cybersecurity Reports | Created: {{date}} | Status: *
Meta Information
- **Primary Tags**: cybersecurity analysis report
- **Target Audience**: Target Audience
- **Publication Timeline**: Publication Schedule
- **Viral Hook Rating**: âââââ (Rate 1-5)
- **Complexity Level**: [Beginner/Intermediate/Advanced]
---
🔒 Analysis Tracker
*Use this section to track what needs more work*
🔴 NEEDS IMMEDIATE ATTENTION
- [ ] **Hook Development**: Does the title grab attention immediately?
- [ ] **Evidence Gathering**: Evidence Collection
- [ ] **Expert Quotes**: Expert Sources
- [ ] **Technical Accuracy**: Technical Review
NEEDS MORE ANALYSIS
- [ ] **Threat Actor Attribution**: Attribution Analysis
- [ ] **Impact Assessment**: Impact Metrics
- [ ] **Timeline Verification**: Timeline Sources
- [ ] **Geopolitical Context**: Geopolitical Background
COMPLETE
- [ ] **Initial Research**: Research Notes
- [ ] **Source Verification**: Source List
---
# PART I: PLAIN LANGUAGE VERSION
*This section should hook readers and explain complex concepts simply*
Executive Summary
**[VIRAL HOOK PLACEHOLDER]** - *Start with the most shocking/important finding*
> 🚨 **THE BOTTOM LINE**: [One sentence that captures why this matters to regular people]
[Main findings paragraph - 2-3 sentences maximum, written for general audience]
**Key Implications:**
- [Impact 1] → See Technical Analysis: Technical Finding 1
- [Impact 2] → See Technical Analysis: Technical Finding 2
- [Impact 3] → See Technical Analysis: Technical Finding 3
The Story in Plain English
What Happened?
*[PLACEHOLDER: Narrative of events in chronological order]*
**ANALYSIS NEEDED**:
- Verify timeline with Timeline Sources
- Cross-reference with Media Reports
- Check against Official Statements
[^1]: Incident Timeline - Detailed technical timeline
Who’s Behind It?
*[PLACEHOLDER: Attribution discussion for general audience]*
**🔠ANALYSIS NEEDED**:
- Review attribution evidence in Attribution Analysis
- Compare with Previous Campaigns
- Validate with Intelligence Sources
[^2]: Attribution Methodology - Technical attribution details
Why Should You Care?
*[PLACEHOLDER: Impact on regular people/organizations]*
**ANALYSIS NEEDED**:
- Quantify impact using Impact Metrics
- Gather victim testimonials from Victim Interviews
- Research economic impact via Economic Analysis
[^3]: Impact Assessment - Detailed impact analysis
What’s the Bigger Picture?
*[PLACEHOLDER: Geopolitical context and implications]*
**ANALYSIS NEEDED**:
- Research historical context in Historical Context
- Analyze geopolitical implications via Geopolitical Analysis
- Connect to broader trends in Threat Landscape
[^4]: Geopolitical Context - Technical geopolitical analysis
Quote Bank
*[Collect viral-worthy quotes here]*
> “[PLACEHOLDER QUOTE 1]” - Expert Name 1, Expert Title 1
> “[PLACEHOLDER QUOTE 2]” - Expert Name 2, Expert Title 2
**🔠EXPERT OUTREACH NEEDED**:
- [ ] Contact Expert List for quotes
- [ ] Verify credentials in Expert Verification
- [ ] Follow up on Pending Interviews
---
# PART II: TECHNICAL ANALYSIS
*Deep technical dive for cybersecurity professionals*
Technical Finding 1
Methodology
*[PLACEHOLDER: How analysis was conducted]*
**🔠TECHNICAL ANALYSIS NEEDED**:
- Validate findings with Technical Validation
- Peer review via Technical Review
- Cross-check with Tool Analysis
Evidence
*[PLACEHOLDER: Technical evidence and artifacts]*
**Linked Evidence Files:**
- Sample 1
- Sample 2
- IOC List
Technical Details
*[PLACEHOLDER: In-depth technical analysis]*
**🔠VERIFICATION NEEDED**:
- Reproduce findings in Lab Environment
- Validate IOCs via IOC Validation
- Cross-reference with Threat Intelligence
Technical Finding 2
*[Repeat structure above]*
Technical Finding 3
*[Repeat structure above]*
Attribution Methodology
Technical Indicators
*[PLACEHOLDER: Technical attribution evidence]*
Behavioral Analysis
*[PLACEHOLDER: TTP analysis]*
Infrastructure Analysis
*[PLACEHOLDER: Infrastructure analysis]*
**🔠ATTRIBUTION VERIFICATION**:
- Cross-check with Threat Intelligence Sources
- Validate against Known TTP Database
- Review with Attribution Experts
Impact Assessment
Technical Impact
*[PLACEHOLDER: Technical impact details]*
Scope Analysis
*[PLACEHOLDER: Scope of compromise]*
**🔠IMPACT VALIDATION**:
- Verify scope with Victim Organizations
- Quantify damage via Damage Assessment
- Timeline correlation in Impact Timeline
Geopolitical Context
Technical Implications
*[PLACEHOLDER: Technical policy implications]*
Strategic Analysis
*[PLACEHOLDER: Strategic cybersecurity implications]*
---
# 🔚 CITATION MANAGEMENT
Primary Sources
- Primary Source 1 - *Description*
- Primary Source 2 - *Description*
Expert Sources
- Expert 1 - *Credentials and contact*
- Expert 2 - *Credentials and contact*
Technical Sources
- Technical Report 1 - *Analysis relevance*
- Technical Report 2 - *Analysis relevance*
Media Sources
- Media Report 1 - *Verification status*
- Media Report 2 - *Verification status*
Citation Checklist
- [ ] All claims have supporting sources
- [ ] Expert quotes properly attributed
- [ ] Technical sources peer-reviewed
- [ ] Links between plain language and technical sections verified
- [ ] All wikilinks resolve to actual notes
---
# 🚀 PUBLICATION WORKFLOW
Pre-Publication Checklist
- [ ] **Viral Hook Optimized**: Title grabs attention immediately
- [ ] **Evidence Verified**: All claims backed by solid sources
- [ ] **Expert Review**: Technical accuracy confirmed
- [ ] **Plain Language Flow**: Non-experts can follow the story
- [ ] **Citation Completeness**: All sources properly linked
- [ ] **Obsidian Links**: All internal links working
- [ ] **Longform Ready**: Structured for compilation
Viral Optimization
- [ ] **Title A/B Testing**: Title Variations
- [ ] **Hook Refinement**: First paragraph grabs attention
- [ ] **Expert Quote Selection**: Most impactful quotes highlighted
- [ ] **Visual Elements**: Graphics Planning
- [ ] **Social Media Angles**: Social Media Strategy
Distribution Strategy
- [ ] **Primary Publication**: Publication Platform
- [ ] **Cross-posting**: Distribution List
- [ ] **Expert Outreach**: Expert Sharing
- [ ] **Community Engagement**: Community Strategy
---
# 🔗 RELATED NOTES & TEMPLATES
Connected Analysis
- Previous Related Reports
- Ongoing Investigations
- Follow-up Story Ideas
Template Family
- Quick Analysis Template
- Breaking News Template
- Deep Dive Template
---
*Template Notes: This template uses Obsidian’s linking features extensively. Create linked notes for placeholders as needed. The Longform extension can compile this into a final report by treating each major section as a scene.*
**🎯 SUCCESS METRICS**:
- Viral potential score: [1-10]
- Technical accuracy score: [1-10]
- Plain language clarity: [1-10]
- Citation completeness: [1-10]