๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Audio Forensics

Sound Authentication, Voice Analysis, Acoustic Evidence, Digital Investigation

Build Your Own Road Map for Igbo Language Digital Activism
diff.wikimedia.orgยท6h
๐ŸŒCultural Computing
Apple AirPods pro 2โ€™s noise cancelling is still so impressive, I couldnโ€™t hear myself type this review
the-independent.comยท1h
๐Ÿ‘‚Psychoacoustics
AI and collaboration tools: how cyberattackers are targeting SMBs in 2025
securelist.comยท8h
๐ŸŽฏThreat Hunting
Tom Oldroyd From Semantics 21 On Protecting Investigators And Reducing CSAM Exposure
forensicfocus.comยท1d
๐Ÿ”ฌArchive Forensics
Using OpenTelemetry to Diagnose a Critical Memory Leak
hackernoon.comยท3h
๐Ÿ‘๏ธSystem Observability
Filter smarter: A better way to investigate fraud with Search
fingerprint.comยท20h
๐Ÿ”BitFunnel
Iranian Educated Manticore Targets Leading Tech Academics
research.checkpoint.comยท5h
๐ŸŽซKerberos Attacks
ICSA Colloquium Talk - 10/07/2025
informatics.ed.ac.ukยท8h
๐ŸงฒRISC-V Archaeology
Unveiling Insights: 18 Essential Resources for Exploratory Data Analysis (EDA)
dev.toยท11hยท
Discuss: DEV
โ›๏ธArchive Mining
How the Music Industry is Building the Tech to Hunt Down AI-Generated Songs
entertainment.slashdot.orgยท3d
๐ŸŽตAcoustic Fingerprinting
Who is most at risk from the billions of leaked Facebook and Google passwords?
restofworld.orgยท8h
๐Ÿ”“Hacking
Dire Wolf Ransomware Comes Out Snarling, Bites Technology, Manufacturing
darkreading.comยท2h
๐Ÿ’ฟWORM Storage
A Robust Method for Pitch Tracking in the Frequency Following Response using Harmonic Amplitude Summation Filterbank
arxiv.orgยท14h
๐ŸŒˆSpectral Audio
Your Forensics, Your Way: Flexible Deployment For Real-Time Results
forensicfocus.comยท9h
๐ŸšจIncident Response
Cybercriminals Abuse Open-Source Tools To Target Africaโ€™s Financial Sector
unit42.paloaltonetworks.comยท20h
๐ŸŽซKerberos Exploitation
Digital Privacy Everywhere
arxiv.orgยท1d
๐Ÿ”Homomorphic Encryption
Show HN: Logcat.ai โ€“ AI-powered observability for Operating Systems | Free Beta
logcat.aiยท1dยท
Discuss: Hacker News
๐Ÿ”eBPF
Unsupervised Learning NO. 486
newsletter.danielmiessler.comยท1d
๐Ÿ•ต๏ธVector Smuggling
OpenADP, needs volunteers to help prevent mass secret surveillance
openadp.orgยท16hยท
Discuss: Hacker News
๐Ÿ”Homomorphic Encryption
How to (Almost) solve cybersecurity once and for all
adaptive.liveยท22hยท
Discuss: Hacker News
๐Ÿ”Systems Hardening
Loading...Loading more...
AboutBlogChangelogRoadmap