๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŽต Audio Steganography

Hidden Data, Covert Channels, Signal Embedding, Acoustic Hiding

A Robust Method for Pitch Tracking in the Frequency Following Response using Harmonic Amplitude Summation Filterbank
arxiv.orgยท10h
๐ŸŒˆSpectral Audio
What Are Best Practices for Data Security for Sensitive Data?
securityscorecard.comยท17h
๐Ÿ”—Data Provenance
Show HN: TableSprint- Supabase alternative with vibe coding features
tablesprint.comยท11hยท
Discuss: Hacker News
๐Ÿ“ฒDigitization
Bitmasking for Granular Backend RBAC: A Beginner's Guide
dev.toยท1hยท
Discuss: DEV
๐Ÿ”Homomorphic Encryption
Keystroke Forensics 101: Extracting Secrets from USB Traffic
infosecwriteups.comยท6h
๐Ÿ”NTLM Forensics
In the Blink of an LED, Secrets Slip Away: The Rise of Optical Data Theft
hackernoon.comยท20h
๐Ÿ’ฟOptical Forensics
Piano Place Hold in Am music video
hypertexthero.comยท1d
๐ŸŒˆSpectral Audio
Russia-linked APT28 use Signal chats to target Ukraine official with malware
securityaffairs.comยท1d
๐Ÿ•ต๏ธVector Smuggling
Digital Forensics Round-Up, June 25 2025
forensicfocus.comยท24m
๐Ÿ”ฌArchive Forensics
Encrypting identifiers in practice
sjoerdlangkemper.nlยท9h
๐ŸŒŠStream Ciphers
HackRF Pro Pre-Order: Frequency Range and RF Performance Improvements, USB-C, TCXO Added
rtl-sdr.comยท12h
๐Ÿ“žWebRTC
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.comยท2h
๐Ÿฆ Malware Analysis
How keys are used in FileVault and encryption
eclecticlight.coยท8hยท
Discuss: Lobsters, Hacker News
๐Ÿ’ฃCompression Security
Show HN: MIDI Transport to Mute
github.comยท15hยท
Discuss: Hacker News
๐ŸŽ›๏ธCassette DSP
Using Wavelets and Clustering to Predict Odd or Even Numbers: An Overengineered Approach with Pretty (But Confusing) Plots
dev.toยท54mยท
Discuss: DEV
๐Ÿง Machine Learning
Trusting the tech: using password managers and passkeys to help you stay secure online
ncsc.gov.ukยท1d
๐Ÿ”“Password Cracking
Thousands of private camera feeds found online. Make sure yours isn’t one of them
malwarebytes.comยท17h
๐Ÿ”“Hacking
Amplifying Machine Learning Attacks Through Strategic Compositions
arxiv.orgยท1d
โš”๏ธLean Tactics
OpenADP, needs volunteers to help prevent mass secret surveillance
openadp.orgยท12hยท
Discuss: Hacker News
๐Ÿ”Homomorphic Encryption
Week 25 โ€“ 2025
thisweekin4n6.comยท3d
๐ŸŒWARC Forensics
Loading...Loading more...
AboutBlogChangelogRoadmap