Automated Data Lineage Reconstruction via Multi-Modal Graph Analysis & HyperScore Validation
dev.toยท11hยท
Discuss: DEV
๐Ÿ”—Data Provenance
Sprites mods - Hard disk hacking - Intro
web.archive.orgยท17h
๐ŸŽฎCartridge Archaeology
Is IP fragmentation still considered vulnerable?
blog.apnic.netยท5h
๐ŸŒDNS Security
Digital Forensics Jobs Round-Up, September 15 2025
forensicfocus.comยท15h
๐ŸšจIncident Response
Rowhammer: TRR on DDR5 DRAM has been broken
comsec.ethz.chยท14hยท
๐Ÿ”RISC-V Forensics
Fastest copy
forums.anandtech.comยท14h
๐Ÿ“„Document Digitization
Data Poisoning Attacks
infosecwriteups.comยท2d
๐Ÿ”Vector Forensics
<p>๐Ÿ”— <a href="https://stephango.com/file-over-app">Steph Ango: File over app</a></p>
lmika.orgยท8h
๐ŸŽฏDependent Preservation
Navigating Amazon GuardDuty protection plans and Extended Threat Detection
aws.amazon.comยท10h
๐Ÿ“ฆContainer Security
Data destruction done wrong could cost your company millions
theregister.comยท1dยท
๐Ÿ›ก๏ธPreservation Proofs
Semantic Dictionary Encoding
falvotech.comยท16hยท
Discuss: Hacker News
๐ŸŒ€Brotli Dictionary
Cryptanalysis and design for a family of plaintext non-delayed chaotic ciphers
arxiv.orgยท2h
๐Ÿ”Cryptographic Archaeology
Hackers steal millions of Gucci, Balenciaga, and Alexander McQueen customer records
securityaffairs.comยท8h
๐Ÿ”“Hacking
Active Directory Forest & Domain Levels
adsecurity.orgยท6h
๐ŸขActive Directory
The Web That Was, Is
cogdogblog.comยท1d
๐Ÿ”—Online Curation
How fast do websites load from Google Search? Comparing loading methods
pawelpokrywka.comยท13hยท
Discuss: Hacker News
๐Ÿ’จCache Analysis
The Risks of Code Assistant LLMs: Harmful Content, Misuse and Deception
unit42.paloaltonetworks.comยท8h
โšกProof Automation
Preserving the digital legacy of company archives: Last stop, Newhaven.
dpconline.orgยท22h
๐Ÿ’พData Preservation
<h2>Resurrected - Two Latin Texts</h2>
naomiceder.techยท5h
๐Ÿ”คFont Archaeology