Digital Forensics Round-Up, October 29 2025
forensicfocus.comยท2d
๐Ÿ”Audio Forensics
Flag this post
Know Audio: Lossy Compression Algorithms And Distortion
hackaday.comยท3d
๐ŸŽตAudio Codecs
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.comยท5h
๐Ÿ›ก๏ธeBPF Security
Flag this post
How to collect memory-only filesystems on Linux systems, (Wed, Oct 29th)
isc.sans.eduยท2d
๐Ÿ“ŸTerminal Forensics
Flag this post
REVEAL: A large-scale comprehensive image dataset for steganalysis
sciencedirect.comยท1d
๐Ÿ•ต๏ธSteganographic Archives
Flag this post
Request for Quote for Data Recovery from a 512GB SSD
dolphindatalab.comยท16h
๐Ÿ’พFloppy Imaging
Flag this post
The internet was made for privacy
doctorow.medium.comยท3h
๐ŸงฒMagnetic Philosophy
Flag this post
Proton's new observatory reveals over 100 billion records breached - here's what you need to know
techradar.comยท1h
๐Ÿ”Archive Cryptanalysis
Flag this post
Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.comยท1d
๐Ÿฆ Parasitic Storage
Flag this post
Registry Analysis
windowsir.blogspot.comยท6hยท
๐Ÿ”NTLM Archaeology
Flag this post
Best Open Source Observability Solutions
clickhouse.comยท1hยท
Discuss: Hacker News
๐Ÿ“ŠHomelab Monitoring
Flag this post
Sound Blasterโ€™s modular hub is a reconfigurable Stream Deck for audio
theverge.comยท5h
๐Ÿ“ผTape Simulation
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.comยท13h
๐Ÿ”Hash Functions
Flag this post
When do you decide that a storage device hasn't got enough capacity any more?
forums.anandtech.comยท6h
๐ŸŽต8-track Revival
Flag this post
5 more arrests made in the investigation into Louvre jewel heist
the-independent.comยท1d
๐ŸšจIncident Response
Flag this post
TEAC Adds To Its Reference 500 Series With The Launch Of The NT-507T Network Transport
forbes.comยท1d
๐Ÿ’ฟFLAC Archaeology
Flag this post
Tracking an evolving Discord-based RAT family
reversinglabs.comยท2d
๐Ÿฆ Malware Analysis
Flag this post
Note
hsu.cyยท1d
๐Ÿ”Archive Semantics
Flag this post
The B2B Case Study as a Data Structure: A Developer's Template for Showcasing Success
dev.toยท8hยท
Discuss: DEV
๐Ÿฆ‹Format Metamorphosis
Flag this post
How scammers use your data to create personalized tricks that work
malwarebytes.comยท1d
๐Ÿ”—Binary Similarity
Flag this post