The Golden Scale: Bling Libra and the Evolving Extortion Economy
unit42.paloaltonetworks.com·2h
🎫Kerberos Attacks
Forensic Video Workflow with Amped FIVE – Part One: First Steps, Verification and File Considerations
blog.ampedsoftware.com·3d
⚖️Digital Evidence
I Wrote an Imagemagick Field Guide for Myself, You Might Find It Useful
joeldare.com·10h·
Discuss: Hacker News
📸PNG Optimization
Complex networks-based anomaly detection for financial transactions in anti-money laundering
sciencedirect.com·2d
🧬PostgreSQL Forensics
From Documents to Dialogue: A step-by-step RAG Journey
dev.to·9h·
Discuss: DEV
📊Multi-vector RAG
Imagery HTB WriteUp: Season 9 Machine 2
infosecwriteups.com·1d
📟Terminal Forensics
Welcome to LIL’s Data.gov Archive Search
lil.law.harvard.edu·3h
💾Data Preservation
Show HN: Lore Engine – Turn 10-hour lectures into 2 hours of comprehensive notes
github.com·1d·
Discuss: Hacker News
📄Document Streaming
Product comparison: Detectify vs. Tenable
blog.detectify.com·15h
🎯Threat Hunting
October 7 – 10, 2025: Bellingcat Online Workshop (16-hour) [Europe-friendly time]
bellingcat.com·23h
🏠Homelab Pentesting
Take Note: Cyber-Risks With AI Notetakers
darkreading.com·1d
🎫Kerberos Attacks
Show HN: Using an LLM to sensibly sort a shopping receipt
treblig.org·1d·
Discuss: Hacker News
🔗Constraint Handling
10 Command-Line Tools Every Data Scientist Should Know
kdnuggets.com·2d
🤖Archive Automation
Reverse Engineering keyboard firmware with Ghidra
blog.usedbytes.com·2d·
Discuss: Hacker News
🔓Reverse engineering
Unboxing Newton Press – Apple’s Text Authoring Software for the Newton (research.reisen)
research.reisen·1d
🖥️Vintage Macintosh
Low quality papers are flooding the cancer literature — can this AI tool help to catch them?
nature.com·2d·
Discuss: Hacker News
💧Manuscript Watermarks
People rescuing forgotten knowledge trapped on old floppy disks
bbc.com·10h·
Discuss: Hacker News
📼Cassette Archaeology
Crafting a Full Exploit RCE from a Crash in Autodesk Revit RFA File Parsing
thezdi.com·2d
🧪Binary Fuzzing
Investigating targeted “payroll pirate” attacks affecting US universities
microsoft.com·1d
🎯NTLM Attacks
Trillion-Scale Goldbach Verification on Consumer Hardware -novel Algorithm [pdf]
zenodo.org·23h·
Discuss: Hacker News
🔢Reed-Solomon Math