๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Audio Forensics

Sound Authentication, Voice Analysis, Acoustic Evidence, Digital Investigation

Techno Security & Digital Forensics Conference Returns To San Diego With Deep Dive Into AI, Cybercrime, And Justice
forensicfocus.comยท2h
๐ŸšจIncident Response
Configurable Open Source Audio Spectrum Visualizer
github.comยท2dยท
Discuss: Hacker News, Hacker News
๐ŸŒˆSpectral Audio
Propose and Rectify: A Forensics-Driven MLLM Framework for Image Manipulation Localization
arxiv.orgยท9h
๐Ÿ–ผ๏ธJPEG Forensics
Course Review: "Advanced Detection Engineering in the Enterprise"
lockboxx.blogspot.comยท2dยท
Discuss: www.blogger.com
๐ŸŽฏThreat Hunting
The Impact of the Cyber Assessment Framework (CAF) on Digital Investigations
digitalforensicsmagazine.comยท1d
๐ŸŽฏThreat Hunting
Everything We Do Is Music by Elizabeth Alker review โ€“ how the classics shaped pop
theguardian.comยท5h
๐ŸŽตMusic Universality
You'll soon be able to slide into DMs on Spotify with music and podcast recommendations
businessinsider.comยท33m
๐ŸŽตAudio Codecs
Smashing up a 3D printed ghost gun won't be enough to prevent CSIs from retrieving data for forensic analysis - here's why
techradar.comยท1d
๐Ÿ’ฟOptical Forensics
I am smarter than ChatGPT (at Clues by Sam)
goose.leaflet.pubยท17hยท
Discuss: Hacker News
๐Ÿ”ฒCellular Automata
Securing the Cloud in an Age of Escalating Cyber Threats
darkreading.comยท23h
๐Ÿ›กCybersecurity
When Itโ€™s Acceptable to Be on Speakerphone in Public
newyorker.comยท3h
๐ŸŽตAudio Steganography
The Sonos Era 300 Is Down to Its Lowest Price for Labor Day
lifehacker.comยท46m
๐Ÿ’ฟFLAC Archaeology
New AI attack hides data-theft prompts in downscaled images
bleepingcomputer.comยท15hยท
Discuss: Hacker News
๐Ÿ•ต๏ธVector Smuggling
Sound and Solution-Complete CCBS
arxiv.orgยท1d
๐Ÿ›ก๏ธArchive Verification
Episode 163 - Ever Heard of the PDP-11?
adventofcomputing.libsyn.comยท1d
๐Ÿ’พvintage computing
How to spot high-activity devices & stop scaled abuse in its tracks
fingerprint.comยท15h
๐ŸŽฏThreat Hunting
Movement signatures: How we move, gesture and use facial expressions could be as unique as a fingerprint
phys.orgยท22h
๐ŸŽตAcoustic Fingerprinting
VibeVoice (1.5B) - TTS model by Microsoft
huggingface.coยท19hยท
Discuss: Hacker News, r/LocalLLaMA
๐ŸŽ™๏ธWhisper
How a scam hunter got scammed (Lock and Code S06E17)
malwarebytes.comยท1d
๐Ÿฆ Malware Analysis
Beyond the ban: A better way to secure generative AI applications
blog.cloudflare.comยท23h
๐Ÿ”’Language-based security
Loading...Loading more...
AboutBlogChangelogRoadmap