🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🎼 Acoustic Analysis

Sound Authentication, Audio Verification, Voice Forensics, Frequency Investigation

Configurable Open Source Audio Spectrum Visualizer
github.comΒ·2dΒ·
Discuss: Hacker News, Hacker News
🌈Spectral Audio
Intelligence Brief: UNC6040 Threat Assessment
cstromblad.comΒ·18m
🎫Kerberos History
Interpolating Speaker Identities in Embedding Space for Data Expansion
arxiv.orgΒ·2h
🎡Acoustic Fingerprinting
Research on smartphone image source identification based on PRNU features collected multivariate sampling strategy
sciencedirect.comΒ·17h
πŸ‘οΈPerceptual Hashing
New Issue: International Association of Sound and Audiovisual Archives (IASA) Journal
archivespublishing.comΒ·16h
🎡Audio Archaeology
Job Posting: Systems and Security Administrator
citizenlab.caΒ·16h
🏠Homelab Security
Course Review: "Advanced Detection Engineering in the Enterprise"
lockboxx.blogspot.comΒ·3dΒ·
Discuss: www.blogger.com
🎯Threat Hunting
Calibrating an Ultrasonic Humidifier for Glycol Vapors
jefftk.comΒ·17h
β˜•Precision Brewing
Techno Security & Digital Forensics Conference Returns To San Diego With Deep Dive Into AI, Cybercrime, And Justice
forensicfocus.comΒ·20h
🚨Incident Response
Data Is the New Diamond: Heists in the Digital Age
unit42.paloaltonetworks.comΒ·7h
🎯Threat Hunting
Undersound: The Secret Lives of Ponds and the Mysterious Musicality of the World
themarginalian.orgΒ·14h
🎡Music Universality
The Impact of the Cyber Assessment Framework (CAF) on Digital Investigations
digitalforensicsmagazine.comΒ·1d
🎯Threat Hunting
Music to Break Models By
matthodges.comΒ·1dΒ·
Discuss: Hacker News
πŸ“ΌCassette Hacking
Researchers Discover a Cyber-Physical Bank Heist Powered by A 4G Raspberry Pi Implant
bastille.netΒ·15h
πŸ“‘Network Monitoring
runZero Hour, ep. 21 recap: highlights from hacker summer camp
runzero.comΒ·16h
πŸ”eBPF
Decentralizing AIS: Trustless Maritime Tracking with SDR
rtl-sdr.comΒ·1d
πŸ‘οΈObservatory Systems
When It’s Acceptable to Be on Speakerphone in Public
newyorker.comΒ·20h
🎡Audio Steganography
Spate of hoax calls about active shooters stir fear at college campuses around the US
the-independent.comΒ·11h
🎯Threat Hunting
The Developer's Complete Guide to CIAM Providers in 2025: 30+ Platforms Analyzed
guptadeepak.comΒ·32mΒ·
Discuss: DEV, Hacker News
πŸ”Capability Systems
Automated Anomaly Detection in Microfluidic Devices via Hybrid Tensor Decomposition and Spectral Analysis
dev.toΒ·3dΒ·
Discuss: DEV
🌊Stream Processing
Loading...Loading more...
AboutBlogChangelogRoadmap