๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Audio Forensics

Sound Authentication, Voice Analysis, Acoustic Evidence, Digital Investigation

Unleashing AI: Revolutionizing Digital Forensics and Incident Response
dev.toยท14hยท
Discuss: DEV
๐ŸšจIncident Response
NumPy-like audio manipulation library
github.comยท20hยท
Discuss: Hacker News
๐ŸŽงWAV Metadata
Boffins devise voice-altering tech to jam 'vishing' schemes
theregister.comยท11h
๐ŸŽ™๏ธWhisper
Meet Forensic Focus at Forensics Europe Expo 2025
forensicfocus.comยท1d
๐Ÿ”Tape Forensics
Amped FIVE Update 37757: Writing Queue, Camera Calibration, RIFF Viewer, Timing Source for Video Writer and Much More
blog.ampedsoftware.comยท17h
โฑ๏ธSMPTE Timecode
Researchers discovered the largest data breach ever, exposing 16 billion login credentials
securityaffairs.comยท9h
๐Ÿ”“Hacking
SonicVerse: Multi-Task Learning for Music Feature-Informed Captioning
arxiv.orgยท1d
๐ŸŽตAudio ML
CyberDefender: โ€œDanaBot Labโ€ Challenge Writeup
infosecwriteups.comยท1d
๐Ÿ•ต๏ธNetwork Forensics
Former DOGE engineer Sahil Lavingia to speak at HOPE hacker conference
hope.netยท14hยท
Discuss: Hacker News
๐Ÿ”“Hacking
Boot disk structure in macOS, iOS and iPadOS, and AI cryptexes
eclecticlight.coยท15m
๐Ÿ”ŒOperating system internals
I am a data security expert and here are 5 lessons on cyber security from the Legal Aid Agency cyberattack
techradar.comยท16h
๐ŸšจIncident Response
How to Design and Execute Effective Social Engineering Attacks by Phone
blackhillsinfosec.comยท1d
๐Ÿ•ต๏ธPenetration Testing
June 17 – 20, 2025 Bellingcat Online Workshop (16-hour) [Europe-friendly time]
bellingcat.comยท6h
๐Ÿš€Indie Hacking
Audio Science Review: LS1c is a breath of fresh air
grimmaudio.comยท14h
๐ŸŽญCinema Acoustics
NTUSER.DAT Forensics Analysis 2025
cybertriage.comยท16h
๐Ÿ”NTLM Forensics
Four Things I Do to Make My Google Nest Devices More Useful
lifehacker.comยท17h
๐Ÿ Home Automation
DCP-o-matic โ€ข Re: DCP-o-matic Player reliability?
dcpomatic.comยท2h
๐ŸŽฌCinema Codecs
Apple Ecosystem: Overlooked Devices
blog.elcomsoft.comยท1d
๐Ÿ”’Hardware Attestation
GMDSOFT Tech Letter Vol.12: Artifact Analysis Using Telegram Data Exports
forensicfocus.comยท22h
๐Ÿ”ฌArchive Forensics
What You Missed at NowSecure Connect 2025: Mobile Security, Privacy & Compliance Trends
nowsecure.comยท1d
๐ŸŽฏThreat Hunting
Loading...Loading more...
AboutBlogChangelogRoadmap