🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔬 Archive Forensics

Digital Evidence, File Carving, Metadata Recovery, Timeline Analysis

Digital Forensics Jobs Round-Up, August 04 2025
forensicfocus.com·22h
🚨Incident Response
Evading Data Provenance in Deep Neural Networks
arxiv.org·8h
🔍Vector Forensics
Schizophrenic Zip Files
blog.isec.pl·2h·
Discuss: Hacker News
💣ZIP Vulnerabilities
Ghost in the Zip | New PXA Stealer and Its Telegram-Powered Ecosystem
sentinelone.com·1d
🦠Malware Analysis
Thousands of formerly secret files on police misconduct in California made public through searchable database
the-independent.com·13h·
Discuss: r/news
🚨Incident Response
Tackling the Mobile Data Deluge: Lessons from Masters Conference NYC 2025
cloudnine.com·1d
🚨Incident Response
A deeper dive into Spotlight indexing and local search
eclecticlight.co·1d
🏺ZIP Archaeology
pdfRest Launches New Sign PDF API Tool for Legally Compliant Digital Signatures
pdfa.org·23h
📄PDF Archaeology
Best of use of small structured media enclosure
i.redd.it·4h·
Discuss: r/homelab
💽MiniDisc Technology
'Universal' detector spots AI deepfake videos with record accuracy
newscientist.com·1d
🎞️MKV Forensics
Fighting coordinated publication fraud is like ‘emptying an overflowing bathtub with a spoon,’ study coauthor says
retractionwatch.com·17h
💧Manuscript Watermarks
The 5 Best Scanners We Tested and Researched for Archiving Documents and Photos
popularmechanics.com·16h
📄Document Digitization
People can exploit your social media pictures and so I've made a tool
news.ycombinator.com·14h·
Discuss: Hacker News
⛏️File Carving
From face scans to credit checks: how UK age verification works and why it’s a privacy nightmare
techradar.com·21h
🔐Homomorphic Encryption
OMG! Summary of the 3rd Open Measurement Gathering (OMG) Ask Me Anything (AMA) event
ooni.org·1d
📰RSS Archaeology
Exploring Non-Traditional Imaging at IS&T Archiving 2025
dpconline.org·4d
📄Document Digitization
Extensions and Shadows (9)
sites.psu.edu·22h
✨Effect Handlers
Northwest Radiologists data breach hits 350,000 in Washington
securityaffairs.com·20h
🚨Incident Response
Software Internals Book Club
eatonphil.com·7h
⚙️Operating System Design
Digital Fraud in the Jewellery Business — How Hackers Are Misusing Trusted Jewellery Brands?
infosecwriteups.com·4h
🚨Incident Response
Loading...Loading more...
AboutBlogChangelogRoadmap