REVEAL: A large-scale comprehensive image dataset for steganalysis
sciencedirect.comยท12h
๐ต๏ธSteganographic Archives
Flag this post
Digital Forensics Round-Up, October 29 2025
forensicfocus.comยท1d
๐Audio Forensics
Flag this post
Tracking an evolving Discord-based RAT family
reversinglabs.comยท1d
๐ฆ Malware Analysis
Flag this post
EY 4TB Data Leak
๐Hacking
Flag this post
From Brazil with Love: New Tactics from Lampion
bitsight.comยท5h
๐ณArchive Merkle Trees
Flag this post
Suspect disguised himself as a woman to record people in gym locker room, cops say
the-independent.comยท6h
๐Tape Forensics
Flag this post
NEWS ROUNDUP โ 29th October 2025
digitalforensicsmagazine.comยท1d
๐จIncident Response
Flag this post
BRONZE BUTLER exploits Japanese asset management software vulnerability
news.sophos.comยท8h
๐DNS Security
Flag this post
Relevant โ TryHackMe Room Walkthrough
infosecwriteups.comยท17h
๐ฏNTLM Attacks
Flag this post
How scammers use your data to create personalized tricks that work
malwarebytes.comยท11h
๐Binary Similarity
Flag this post
consult + org-db-v3: Approximate search of my sketches using text, and a multi-source consult command for approximately searching sketches and blog posts
sachachua.comยท8h
๐PostScript
Flag this post
How to collect memory-only filesystems on Linux systems, (Wed, Oct 29th)
isc.sans.eduยท1d
๐Terminal Forensics
Flag this post
Speakers
dcc.ac.ukยท11h
๐ฟFLAC Archaeology
Flag this post
Cut the Noise, Keep the Signal: The Hidden Cost of Duplicate Reports
hackerone.comยท1d
โ
Archive Fixity
Flag this post
Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.comยท15h
๐ฆ Parasitic Storage
Flag this post
AI Search Tools Easily Fooled by Fake Content
darkreading.comยท1d
๐Hacking
Flag this post
Show HN: LogLens, a fast alternative to grep โ jq for structured logs
๐Log Parsing
Flag this post
Ex-Defense contractor exec pleads guilty to selling cyber exploits to Russia
securityaffairs.comยท16h
๐กCybersecurity
Flag this post
Loading...Loading more...