🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕵️ Network Forensics

Packet Analysis, Traffic Archaeology, Protocol Investigation, Digital Evidence

Digital Forensics Jobs Round-Up, August 04 2025
forensicfocus.com·22h
🚨Incident Response
Transportation Cyber Incident Awareness through Generative AI-Based Incident Analysis and Retrieval-Augmented Question-Answering Systems
arxiv.org·8h
🚨Incident Response
Nation-state group CL-STA-0969 targeted Southeast Asian telecoms in 2024
securityaffairs.com·1d
🛣️BGP Hijacking
Tackling the Mobile Data Deluge: Lessons from Masters Conference NYC 2025
cloudnine.com·1d
🚨Incident Response
Black Hat 2025: Why We Built a Museum Instead of a Booth
lab.wallarm.com·1d
🔐Cryptographic Archaeology
Mobile app analytics library led to the PII exposure
cossacklabs.com·20h·
Discuss: Hacker News
🚨Incident Response
Windows Authentication Monitoring
infosecwriteups.com·1d
🔍NTLM Archaeology
A Video Introduction to Broadband Surveillance with RTL_POWER
rtl-sdr.com·6h
📻Homebrew Protocols
From the Depths of the Shadows: IRGC and Hacker Collectives Of The 12-Day War
securityscorecard.com·1h
🎯Threat Hunting
4th August – Threat Intelligence Report
research.checkpoint.com·1d
🔓Hacking
PQCSA: A Gentle Introduction to Code Based PKE
esat.kuleuven.be·1d
⚗️Algebraic Coding
Detection Engineering: Practicing Detection-as-Code – Validation – Part 3
blog.nviso.eu·5h
✅Archive Validation
How to detect and block malicious web crawlers in 2025
fingerprint.com·19h
🦠Malware Analysis
A ton of IPv6 innovations in AWS
blog.james.rcpt.to·10h
🌐IPFS
Bouncing on trampolines to run eBPF programs
bootlin.com·5h
🔍eBPF
Organized scientific fraud is growing at an alarming rate, study uncovers
phys.org·17h
💧Manuscript Watermarks
Those Titles the AI Bot Thought I Had Written
bsdly.blogspot.com·5h·
Discuss: bsdly.blogspot.com
🧪Archive Fuzzing
OMG! Summary of the 3rd Open Measurement Gathering (OMG) Ask Me Anything (AMA) event
ooni.org·1d
📰RSS Archaeology
Using Data Analytics to Tackle Fraud and Error
digitalforensicsmagazine.com·1d
🗃️Database Forensics
Computer Networking a Top-Down Approach, 9th Edition
gaia.cs.umass.edu·4d·
Discuss: Hacker News
📡Network Protocol Design
Loading...Loading more...
AboutBlogChangelogRoadmap