Digital Forensics Jobs Round-Up, September 15 2025
forensicfocus.comยท2h
๐ŸšจIncident Response
SQL Database Concepts:
dev.toยท8hยท
Discuss: DEV
๐Ÿ’พDatabase Formats
Sprites mods - Hard disk hacking - Intro
web.archive.orgยท4h
๐ŸŽฎCartridge Archaeology
What is Data Exfiltration and How to Prevent It
securityscorecard.comยท2d
๐Ÿ•ณ๏ธInformation Leakage
Data destruction done wrong could cost your company millions
theregister.comยท1dยท
Discuss: Hacker News
๐Ÿ›ก๏ธPreservation Proofs
Lessons from using AI in Discovery
thoughtbot.comยท17h
๐Ÿ•ต๏ธMetadata Mining
Text-to-SQL Oriented to the Process Mining Domain: A PT-EN Dataset for Query Translation
arxiv.orgยท13h
๐Ÿ“‹Document Grammar
Data Poisoning Attacks
infosecwriteups.comยท2d
๐Ÿ”Vector Forensics
DF/IR Isnโ€™t About Computers. Itโ€™s About Hunting Humans.
brettshavers.comยท1d
๐Ÿ”—Data Provenance
A Focused Approach to Learning SQL
towardsdatascience.comยท3d
๐ŸงฎDatalog
Preserving the digital legacy of company archives: Last stop, Newhaven.
dpconline.orgยท9h
๐Ÿ’พData Preservation
Gucci, Balenciaga and Alexander McQueen private data ransomed by hackers
bbc.comยท3h
๐Ÿ”—Data Provenance
Why Cybersecurity is More Important Today for Data Science Than Ever
kdnuggets.comยท3h
๐Ÿ”Vector Forensics
PostgreSQL partitioning, logical replication and other Q&A about PostgreSQL Superpowers
architecture-weekly.comยท7hยท
Discuss: r/programming
๐Ÿ—„๏ธPostgreSQL WAL
Project: Pi Stats
connortumbleson.comยท15h
๐Ÿ•ต๏ธDomain Enumeration
Detecting click fraud with only 1px
tirreno.comยท7hยท
Discuss: Hacker News
๐Ÿ”—Binary Similarity
Rowhammer: TRR on DDR5 DRAM has been broken
comsec.ethz.chยท1hยท
Discuss: Hacker News
๐Ÿ”RISC-V Forensics
InfoSec News Nuggets 9/15/2025
aboutdfir.comยท4h
๐Ÿ”“Hacking
Unlock Hidden Connections: Mapping Relationships Across Disparate Data Graphs
dev.toยท1hยท
Discuss: DEV
๐Ÿ•ธ๏ธGraph Embeddings
Staffology Payroll by IRIS review
techradar.comยท1h
๐Ÿ”—Data Provenance