Fitting It All in Your Head
systemsapproach.org·9h
📡BGP Archaeology
How we trained an ML model to detect DLL hijacking
securelist.com·9h
🔗Binary Similarity
They're in…now what? How to stop lateral movement when the phish bites
runzero.com·1h
🎫Kerberos Attacks
nfc-laboratory: NFC signal and protocol analyzer using SDR receiver
github.com·2h·
Compression Hardware
NEWS ROUNDUP – 6th October 2025
digitalforensicsmagazine.com·6h
🚨Incident Response
Automated Anomaly Detection in Industrial Control Systems via Dynamic Graph Neural Network Pruning
dev.to·1d·
Discuss: DEV
🎯Threat Hunting
Evading the Watchful Eye: A Red Teamer’s Guide to EDR Bypass Techniques
medium.com·5h
🔐Cryptographic Archaeology
The Making of Digital Identity – The Birth of Digital Authentication
syntheticauth.ai·1d·
🔐PKI Archaeology
Chat Control is "like a malware on your device" – Signal slams the EU proposal to scan your private chats
techradar.com·8h
🕳️Information Leakage
Addressing the CL0P Extortion Campaign Targeting Oracle E-Business Suite (EBS) Users
cybereason.com·1d
🧬PostgreSQL Forensics
Achieving 1.2 TB/s Aggregate Bandwidth by Optimizing Distributed Cache Network
juicefs.com·1d·
Discuss: Hacker News
📡Network Stack
Applied Networking Research Prize 2026 Nominations Now Open
ietf.org·4h
📡Network Protocol Design
A Mile-Deep Detector Hints at the Universe’s Darkest Secret
scitechdaily.com·2h
⚛️Quantum Tape
6th October – Threat Intelligence Report
research.checkpoint.com·7h
🛡Cybersecurity
Chinese Gov't Fronts Trick the West to Obtain Cyber Tech
darkreading.com·3h
🕳️Information Leakage
Secret information about the iPhone 16e published in US database
heise.de·6h
🛡Cybersecurity
A Global Mining Dataset
tech.marksblogg.com·6h·
Discuss: Hacker News
📦METS Containers
Thieves steal IDs and payment info after data leaks from Discord support vendor
theregister.com·4h
🎫Kerberos Attacks
Why do we need MAC addresses?
immibis.com·2h·
Discuss: Hacker News
📼Cassette Networking
AI in Digital Forensics: a Tool, not an Oracle
blog.elcomsoft.com·3d
👂Audio Evidence