Feeds to Scour
SubscribedAll
Scoured 16028 posts in 131.6 ms
How digital forensics could prove what’s real in the age of deepfakes
scientificamerican.com
·11h
🔬Archive Forensics
Preview
Report Post
Pruning Days: Borg Backup Cleanup
blog.wirelessmoves.com·10h
🏺ZIP Archaeology
Preview
Report Post
How Stolen AI Models Can Compromise Your Entire Organization
dev.to·7h·
Discuss: DEV
🕵️Vector Smuggling
Preview
Report Post
Tech support detective solved PC crime by looking in the carpark
theregister.com·1d
🚨Incident Response
Preview
Report Post
[$] Filesystem medley: EROFS, NTFS, and XFS
lwn.net·1d
🗄️File Systems
Preview
Report Post
A Verification Framework For Trojan Detection (U. of Kansas, U. of Florida)
semiengineering.com·23h
🔍RISC-V Forensics
Preview
Report Post
Dismantling Dark Patterns Using TDD via Discovery and Injunctions
news.ycombinator.com·1d·
Discuss: Hacker News
🧬PostgreSQL Forensics
Preview
Report Post
You Can't Fake Object Storage: Multi-Protocol Promised Everything, Delivered Compromise
blog.min.io·1d
🌐Edge Preservation
Preview
Report Post
Investigation underway after 72M Under Armour records surface online
securityaffairs.com·1d
🌐WARC Forensics
Preview
Report Post
Disko-ZFS: Declaratively Managing ZFS Datasets
redalder.org·14h·
Discuss: Hacker News
💾ZFS
Preview
Report Post
Rubrik, Inc. (RBRK) Presents at Data Recovery Summit Transcript
seekingalpha.com·3d
🗄️Database Recovery
Preview
Report Post
Preparing Investigators For Trauma Exposure In Digital Forensics
forensicfocus.com·2d
🚨Incident Response
Preview
Report Post
Tools I use
prepend.com·3d
🔌Operating system internals
Preview
Report Post
INC ransomware opsec fail allowed data recovery for 12 US orgs
bleepingcomputer.com·2d
🦠Malware Analysis
Preview
Report Post
What Is Malware: Definition and Examples
securityscorecard.com·2d
🦠Malware Analysis
Preview
Report Post
Intelligence Insights: January 2026
redcanary.com·2d
🎯Threat Hunting
Preview
Report Post
Data Structures and Algorithms
tech.stonecharioteer.com·1d·
Discuss: Hacker News
📼Tape Combinators
Preview
Report Post
On the Effectiveness of Mempool-based Transaction Auditing
arxiv.org·2d
🌳Archive Merkle Trees
Preview
Report Post
Medallion Architecture 101: Building Data Pipelines That Don't Fall Apart
dev.to·1d·
Discuss: DEV
🔗Data Provenance
Preview
Report Post
Automate your security whack-a-mole: Q&A with Exaforce
stackoverflow.blog·2d
Proof Automation
Preview
Report Post

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help