Digital Forensics Round-Up, October 29 2025
forensicfocus.comยท2d
๐Ÿ”Audio Forensics
Flag this post
REVEAL: A large-scale comprehensive image dataset for steganalysis
sciencedirect.comยท1d
๐Ÿ•ต๏ธSteganographic Archives
Flag this post
Registry Analysis
windowsir.blogspot.comยท6hยท
๐Ÿ”NTLM Archaeology
Flag this post
A Peek Inside the Physical Archive: Where the Past Finds a Future
blog.archive.orgยท2dยท
Discuss: Hacker News
๐Ÿ’พData Preservation
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.comยท13h
๐Ÿ”Hash Functions
Flag this post
How unstructured data turns your business into a junk drawer - and how to fix it
techradar.comยท4h
๐Ÿ“„Document Digitization
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.comยท5h
๐Ÿ›ก๏ธeBPF Security
Flag this post
How to collect memory-only filesystems on Linux systems, (Wed, Oct 29th)
isc.sans.eduยท2d
๐Ÿ“ŸTerminal Forensics
Flag this post
Best Open Source Observability Solutions
clickhouse.comยท1hยท
Discuss: Hacker News
๐Ÿ“ŠHomelab Monitoring
Flag this post
One Week to Go: World Digital Preservation Day 2025!
dpconline.orgยท1d
๐Ÿ›๏ธPREMIS Metadata
Flag this post
The internet was made for privacy
doctorow.medium.comยท3h
๐ŸงฒMagnetic Philosophy
Flag this post
Tracking an evolving Discord-based RAT family
reversinglabs.comยท2d
๐Ÿฆ Malware Analysis
Flag this post
Linkdump No 79
82mhz.netยท20h
๐Ÿ•น๏ธRetro Gaming
Flag this post
The Great Firewall Part 1: The Dump
dti.domaintools.comยท22hยท
Discuss: Hacker News
๐Ÿ“กDNS Archaeology
Flag this post
AI and the strengthening of records management approaches
thinkingrecords.co.ukยท1d
๐Ÿ“Archive Calculus
Flag this post
Adobeโ€™s experimental AI tool can edit entire videos using one frame
theverge.comยท2h
๐ŸงชArchive Fuzzing
Flag this post
โœ… Day 56 of My Data Analytics Journey โ€” Deep Dive into Pandas ๐Ÿผโœจ
dev.toยท1dยท
Discuss: DEV
๐ŸงชData science
Flag this post
ProstNFound+: A Prospective Study using Medical Foundation Models for Prostate Cancer Detection
arxiv.orgยท16h
๐Ÿ‘๏ธOCR Enhancement
Flag this post
BRONZE BUTLER exploits Japanese asset management software vulnerability
news.sophos.comยท1d
๐ŸŒDNS Security
Flag this post
Beyond User-Agent: A Guide to TLS, HTTP/2, Canvas, and Behavioral Fingerprinting
pydoll.techยท7hยท
Discuss: Hacker News
๐Ÿ”NTLM Forensics
Flag this post