Digital Forensics Round-Up, October 29 2025
forensicfocus.com·1d
🔍Audio Forensics
Flag this post
Poisoned Search: How Hackers Turn Google Results into Backdoors
lmgsecurity.com·6h
🔓Hacking
Flag this post
The European Commission Launches Digital Commons EDIC to Strengthen Europe’s Sovereign Digital Infrastructure
openfuture.eu·7h
📇Dublin Core
Flag this post
Show HN: TinyBoards – Self-Hosted FOSS Social Platform (Rust and GraphQL API)
🔄Sync Engine
Flag this post
'Singing' electrons synchronize in Kagome crystals, revealing geometry-driven quantum coherence
phys.org·7h
⏰Time Crystals
Flag this post
Proton trains new service to expose corporate infosec cover-ups
theregister.com·3h
🔓Hacking
Flag this post
dbt Labs Open Sources MetricFlow: An Independent Schema for Data Interoperability
thenewstack.io·1d
🏷️Metadata Standards
Flag this post
$1000 Bounty: GitLab Security Flaw Exposed
infosecwriteups.com·13h
🌳Archive Merkle Trees
Flag this post
Learning osquery
blog.devops.dev·3d
🔌Operating system internals
Flag this post
Evaluating YARA Rules for macOS Malware Hunting in Spectra Analyze
reversinglabs.com·7h
🦠Malware Analysis
Flag this post
How to build your own VPN, or: the history of WARP
blog.cloudflare.com·1d
🌐DNS over QUIC
Flag this post
From Power Users to Protective Stewards: How to Tune Security Training for Specialized Employees
darkreading.com·1d
🎯Threat Hunting
Flag this post
Loading...Loading more...