🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔍 Cassette Forensics

Tape Analysis, Audio Investigation, Magnetic Media Recovery, Historical Evidence

Is this video of a Tehran prison explosion AI-generated?
abc.net.au·1d
🎞️MKV Analysis
iPRES Digital Preservation Bake Off 2025 - Amuse Bouche Challenge: Tiny Tools, Tasty Wins
ipres2025.nz·3d
🔄Archival Workflows
How keys are used in FileVault and encryption
eclecticlight.co·19h·
Discuss: Lobsters, Hacker News
💣Compression Security
Amazon's Ring can now use AI to 'learn the routines of your residence'
theregister.com·6h
🏠Home Automation
davidchisnall/igk: I got Knuth'd: A compiler for documents
github.com·19h
📝Concrete Syntax
$28 external HDD on Amazon actually does what it claims, still not a good buy
arstechnica.com·1d·
Discuss: Hacker News
💿Floppy Forensics
Week 25 – 2025
thisweekin4n6.com·3d
🌐WARC Forensics
AI and collaboration tools: how cyberattackers are targeting SMBs in 2025
securelist.com·15h
🎯Threat Hunting
Cambridge Cybercrime Conference 2025 – Liveblog
lightbluetouchpaper.org·10h
🎯Threat Hunting
Show HN: TableSprint- Supabase alternative with vibe coding features
tablesprint.com·22h·
Discuss: Hacker News
📲Digitization
The cryptoterrestrial hypothesis: a covert earthly explanation for UAP
researchgate.net·12h·
Discuss: Hacker News
🏺Kerberos Archaeology
Cybercrime is surging across Africa
bitdefender.com·16h
🔓Hacking
Mastering Malware Analysis: A SOC Analyst’s Guide to Dynamic Analysis with AnyRun
infosecwriteups.com·17h
🦠Malware Analysis
How to (Almost) solve cybersecurity once and for all
adaptive.live·1d·
Discuss: Hacker News
🔐Systems Hardening
Abusing copyright strings to trick software into thinking it’s running on your competitor’s PC
devblogs.microsoft.com·1d·
Discuss: Lobsters, Hacker News
🏺Kerberos Archaeology
PicoEMP: low-cost Electromagnetic Fault Injection (EMFI) tool
github.com·22h·
Discuss: Hacker News
⚡Circuit Archaeology
North Korea - Cyber Threat Actor Profile
cstromblad.com·7h
🇸🇪Nordic Cryptography
Driving cost-efficiency and speed in claims data processing with Amazon Nova Micro and Amazon Nova Lite
aws.amazon.com·8h
🌊Stream Processing
Your Forensics, Your Way: Flexible Deployment For Real-Time Results
forensicfocus.com·16h
🚨Incident Response
Using OpenTelemetry to Diagnose a Critical Memory Leak
hackernoon.com·10h
👁️System Observability
Loading...Loading more...
AboutBlogChangelogRoadmap