A long-lost ancient Roman artifact reappears in a New Orleans backyard
the-independent.comยท2h
๐Ÿ“œPalimpsest Analysis
UNREDACTED Magazine Issue 009
inteltechniques.comยท8h
๐Ÿ“กRSS Readers
MultiPar 1.3.3.5 Beta / 1.3.2.9
scour.ingยท22h
๐ŸบZIP Archaeology
Getting Real: How to Communicate the Value of Information Management
info.aiim.orgยท1d
๐Ÿ“‹records management
Apple doubles maximum bug bounty to $2M for zero-click RCEs
securityaffairs.comยท7h
๐Ÿ›ก๏ธARM TrustZone
Offensive OSINT s05e10 - Interactive investigative stories part 1
offensiveosint.ioยท2d
๐ŸŒWARC Forensics
Welcome to LILโ€™s Data.gov Archive Search
lil.law.harvard.eduยท10h
๐Ÿ’พData Preservation
Crafting a Full Exploit RCE from a Crash in Autodesk Revit RFA File Parsing
thezdi.comยท2d
๐ŸงชBinary Fuzzing
InfoSec News Nuggets 10/10/2025
aboutdfir.comยท14h
๐Ÿ”“Hacking
Hardware Vulnerability Allows Attackers to Hack AI Training Data โ€“ NC State News
news.ncsu.eduยท10hยท
Discuss: Hacker News
๐Ÿ”RISC-V Cryptography
Adaptive Predictive Maintenance of PLC-Controlled Conveyor Systems via Multi-Modal Data Fusion and Anomaly Scoring
dev.toยท2dยท
Discuss: DEV
๐ŸŒŠStream Processing
Reverse Engineering keyboard firmware with Ghidra
blog.usedbytes.comยท2dยท
Discuss: Hacker News
๐Ÿ”“Reverse engineering
Autonomous AI Hacking and the Future of Cybersecurity
schneier.comยท19hยท
Discuss: Hacker News
๐ŸŽฏThreat Hunting
Show HN: Spottr: Ctrl+F for Videos
usespottr.comยท2dยท
Discuss: Hacker News
๐ŸŽž๏ธMKV Forensics
FCKGW: How an internal Microsoft leak fueled Windows XP piracy
techspot.comยท12h
๐ŸบKerberos Archaeology
No Bullshit Guide to Statistics prerelease
minireference.comยท13hยท
Discuss: Hacker News
๐ŸงฎKolmogorov Bounds
Automated Genotoxicity Screening via Microfluidic-Integrated Raman Spectroscopy and Machine Learning
dev.toยท1dยท
Discuss: DEV
๐ŸŒˆSpectroscopy
Imagery HTB WriteUp: Season 9 Machine 2
infosecwriteups.comยท1d
๐Ÿ“ŸTerminal Forensics
Revisiting Karpathy's 'Unreasonable Effectiveness of Recurrent Neural Networks'
gilesthomas.comยท5hยท
Discuss: Hacker News
๐ŸŽงLearned Audio
Zero-day in file-sharing software leads to RCE, and attacks are ongoing
theregister.comยท14hยท
Discuss: Hacker News
๐Ÿ’ฃZIP Vulnerabilities