🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🚨 Incident Response

Digital Forensics, Log Analysis, Timeline Reconstruction, Evidence Collection

A Standard for Human-Centered Investigation Playbooks
chrissanders.org·5h
🎯Threat Hunting
Your Forensics, Your Way: Flexible Deployment For Real-Time Results
forensicfocus.com·15h
🔍Tape Forensics
Modernizing eDiscovery: A Huge Strategic Win for Legal Operations Executives
blog.x1discovery.com·5h
🔗Data Provenance
The Inefficiency in Digital Forensics
cyb3rops.medium.com·2d
🔬Archive Forensics
Hong Mong 5 Development Treasure Case Sharing Buried Point Development Real Battle Guide
dev.to·2h·
Discuss: DEV
🔗Data Provenance
How to (Almost) solve cybersecurity once and for all
adaptive.live·1d·
Discuss: Hacker News
🔐Systems Hardening
Program Execution, follow-up
windowsir.blogspot.com·12h·
Discuss: www.blogger.com
⚡Performance Tools
Judge approves AT&T’s $177M data breach settlement
cybersecuritydive.com·9h
🗃️Database Forensics
Behind Scattered Spider: Activity, TTPs, and What to Watch For
bitsight.com·1d
🎫Kerberos Exploitation
Mastering Malware Analysis: A SOC Analyst’s Guide to Dynamic Analysis with AnyRun
infosecwriteups.com·16h
🦠Malware Analysis
Filter smarter: A better way to investigate fraud with Search
fingerprint.com·1d
🔍BitFunnel
Cambridge Cybercrime Conference 2025 – Liveblog
lightbluetouchpaper.org·9h
🎯Threat Hunting
How to Build an OPSEC Culture in Your Organization
securityscorecard.com·8h
🎯Threat Hunting
How to Prove That An Email Was Received
metaspike.com·4h
📄Document Digitization
Cybercriminals Abuse Open-Source Tools To Target Africa’s Financial Sector
unit42.paloaltonetworks.com·1d
🎫Kerberos Exploitation
Building Real-Time SMS, WhatsApp and Slack Alerts
thenewstack.io·7h
🌊Stream Processing
What Is an AI SOC Agent? What You Need to Know About the Most Strategic Operational Imperative in Cybersecurity Today
intezer.com·6h
🎯Threat Hunting
Iranian Educated Manticore Targets Leading Tech Academics
research.checkpoint.com·11h
🎫Kerberos Attacks
Cyber insurance premiums dropped for the first time in 2024
metacurity.com·10h
🔓Hacking
Four Ways to Deal With Repeated ‘Delivery Attempted’ Messages When You’re Actually Home
lifehacker.com·6h
🎫Kerberos Attacks
Loading...Loading more...
AboutBlogChangelogRoadmap