๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿšจ Incident Response

Digital Forensics, Log Analysis, Timeline Reconstruction, Evidence Collection

Yaphe, Joshua. - Time and Narrative in Intelligence Analysis. [Elektronisk resurs] : A New Framework for the Production of Meaning.
libris.kb.seยท1d
๐ŸŽญCultural Informatics
The 20TB Seagate Expansion Desktop HDD drops to 1 cent per gigabyte of storage โ€” $229 gets you tons of storage, not tons of debt
tomshardware.comยท3h
๐Ÿ’ฟDisk Geometry
I Hacked Monster Energy and You Won't Believe What They Think You Look Like
bobdahacker.comยท1dยท
Discuss: Lobsters, Hacker News
๐Ÿ”“Hacking
How much power does gzip save on IoT web access?
bitbanksoftware.blogspot.comยท3hยท
Discuss: Lobsters, Hacker News
๐Ÿ“ฆDeflate
Investigators Used Terrible Computer Fraud Laws To Ensure People Were Punished For Leaking Air Crash Footage To CNN
techdirt.comยท2dยท
Discuss: Hacker News
๐Ÿ”Tape Forensics
The Day I Logged in with a Hash
gsociety.frยท23hยท
Discuss: Hacker News
๐Ÿ”“Hacking
AI-Facilitated Delusional Ideation: Rethinking "AI Psychosis"
michellepellon.comยท17hยท
Discuss: Hacker News
๐Ÿง Intelligence Compression
Biggest Data Breaches of All Time [Updated 2025]
upguard.comยท4dยท
Discuss: Hacker News
๐Ÿ”“Hacking
Best Business Analysis Platforms: 5 Platforms to Understand, Analyze and Diagnose Organizations
dev.toยท1dยท
Discuss: DEV
๐ŸŒŠStream Processing
GitOps Principles: The Future of Declarative Infrastructure and Deployment
blog.devops.devยท4h
๐ŸงฑImmutable Infrastructure
The evolving CISO role: bridging the gap between security and strategy
techradar.comยท8h
๐Ÿ›กCybersecurity
Almost 800 shoplifting offences a day go unsolved, study shows
the-independent.comยท17h
๐Ÿ’ฟDAT Forensics
When a Bug Bounty Turned Into a Real Attack
infosecwriteups.comยท10h
๐Ÿ”“Hacking
Advancing rail safety: An onboard measurement system of rolling stock wheel flange wear based on dynamic machine learning algorithms
arxiv.orgยท12h
โš™๏ธTape Engineering
Harnessing MCP Servers with LangChain and LangGraph: A Comprehensive Guide
dev.toยท6hยท
Discuss: DEV
๐Ÿ”—Constraint Handling
A XAI-based Framework for Frequency Subband Characterization of Cough Spectrograms in Chronic Respiratory Disease
arxiv.orgยท12h
๐Ÿ“ŠSpectrograms
Android.Backdoor.916.origin malware targets Russian business executives
securityaffairs.comยท9h
๐Ÿ”“Hacking
Australian university used Wi-Fi location data to identify student protestors
theregister.comยท12h
๐Ÿ”ฌHardware Forensics
A Systematic Mapping Study on Smart Cities Modeling Approaches
arxiv.orgยท12h
๐Ÿ”ถVoronoi Diagrams
AI App Dev Log: The Story of Our App Begins
news.ycombinator.comยท1dยท
Discuss: Hacker News
๐Ÿ”ŒInterface Evolution
Loading...Loading more...
AboutBlogChangelogRoadmap