Digital Forensics Round-Up, October 29 2025
forensicfocus.com·2d
🔍Audio Forensics
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.com·7h
🛡️eBPF Security
Flag this post
Show HN: AI tool to scan internal docs for GDPR violations before audits
⚖️Legal Compliance
Flag this post
Investigators arrest SF Apple Store fraud suspect
mercurynews.com·7h
🔬Hardware Forensics
Flag this post
REVEAL: A large-scale comprehensive image dataset for steganalysis
sciencedirect.com·1d
🕵️Steganographic Archives
Flag this post
How scammers use your data to create personalized tricks that work
malwarebytes.com·1d
🔗Binary Similarity
Flag this post
The internet was made for privacy
doctorow.medium.com·6h
🧲Magnetic Philosophy
Flag this post
Fighting City Hall: DF/IR Lessons from a Pro Se Plaintiff. One judgment, two years saved, half a million reasons it was worth it.
brettshavers.com·2d
👂Audio Evidence
Flag this post
EY reportedly leaked a massive 4TB database online - exposing company secrets online for all to see
techradar.com·1d
🗃️Database Forensics
Flag this post
Build reliable AI systems with Automated Reasoning on Amazon Bedrock – Part 1
aws.amazon.com·46m
⚡Proof Automation
Flag this post
French researchers find major flaws in AI age-verification software for porn
euobserver.com·8h
✅Archive Validation
Flag this post
Sean Combs Transferred to Federal Prison to Begin Sentence
rollingstone.com·1d
🔒Privacy Archives
Flag this post
French minister vows Louvre anti-intrusion devices after post-heist report finds security lapses
the-independent.com·7h
🏷️Memory Tagging
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.com·15h
🔐Hash Functions
Flag this post
DNA from 1977 murder scene likely came from prime suspect, court hears
abc.net.au·2d
💿DAT Forensics
Flag this post
Tap-and-Steal: The Rise of NFC Relay Malware on Mobile Devices
zimperium.com·2d
🎫Kerberos Attacks
Flag this post
Tracking an evolving Discord-based RAT family
reversinglabs.com·2d
🦠Malware Analysis
Flag this post
From Connectivity to Capability: Rethinking the Digital Divide
internetsociety.org·8h
🌍Cultural Computing
Flag this post
BYOD security solutions explained
proton.me·9h
🔐Capability Security
Flag this post
Loading...Loading more...