Remote Forensic Collection Tools 2025
cybertriage.com·3d
🚨Incident Response
Flag this post
pyaccdb: Python library for Microsoft Access .accdb files
yingtongli.me·17h
🔤EBCDIC Mining
Flag this post
Show HN: Onlymaps, a Python Micro-ORM
🧩SQLite Extensions
Flag this post
NEWS ROUNDUP – 21st November 2025
digitalforensicsmagazine.com·1d
🚨Incident Response
Flag this post
Percona Brings Transparent Data Encryption to Postgres
thenewstack.io·1d
🗄️PostgreSQL WAL
Flag this post
ToddyCat: your hidden email assistant. Part 1
securelist.com·1d
🎯NTLM Attacks
Flag this post
Circular Transactions: The Complex Loopholes of Abusive Tax Shelters
🏠Personal Archives
Flag this post
Understanding intrinsically disordered protein regions and their roles in cancer
phys.org·1d
⚙️ABNF Mining
Flag this post
The future of fraud prevention: Insights from GartnerⓇ 2025 Hype Cycle™ for Fraud & Financial Crime Prevention
fingerprint.com·2d
🎯Threat Hunting
Flag this post
Building and Implementing Cyber Resilience Strategies
cacm.acm.org·1d
💾Persistence Strategies
Flag this post
Tracking financial crime through code and law: a review of regtech applications in anti-money laundering and terrorism financing
arxiv.org·2d
🦠Malware Analysis
Flag this post
Distributed Tracing in Go: Finding the Needle in the Microservice Haystack
👁️Observatory Systems
Flag this post
Microsoft is hoping to kill off its most embarrassing BSOD errors for good - farewell to big-screen outages in the wild
techradar.com·8h
🔌Operating system internals
Flag this post
Database Admins: Almost a Third Consider Career Change
heise.de·3d
🗄️Database Internals
Flag this post
Rethinking Internal Investigations: A New Era Of Digital Forensics Collaboration
forensicfocus.com·4d
🚨Incident Response
Flag this post
U.S. CISA adds an Oracle Fusion Middleware flaw to its Known Exploited Vulnerabilities catalog
securityaffairs.com·19h
🔓Hacking
Flag this post
Unlocking the Potential of Raw Data Analysis in OSINT
dutchosintguy.com·5d
🔎OSINT Techniques
Flag this post
Loading...Loading more...