Osint Intelligence Analysis
opensourceintelligence.bizยท8hยท
Discuss: Hacker News
๐Ÿ•ณ๏ธInformation Leakage
Flag this post
A DRL-Empowered Multi-Level Jamming Approach for Secure Semantic Communication
arxiv.orgยท16h
๐Ÿ”’Language-based security
Flag this post
Proton's new observatory reveals over 100 billion records breached - here's what you need to know
techradar.comยท1h
๐Ÿ”Archive Cryptanalysis
Flag this post
Europe's secret weapon against Russian 'disposable agents'
euronews.comยท20h
๐Ÿ”Polish Cryptanalysis
Flag this post
10 Security Operations Center Best Practices Every Security Leader Should Know
vmray.comยท2d
๐ŸŽฏThreat Hunting
Flag this post
When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems
unit42.paloaltonetworks.comยท10h
๐Ÿ•ต๏ธVector Smuggling
Flag this post
Advancing cybersecurity a comprehensive review of AI-driven detection techniques
journalofbigdata.springeropen.comยท2dยท
Discuss: Hacker News
๐ŸŽฏThreat Hunting
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.comยท13h
๐Ÿ”Hash Functions
Flag this post
Registry Analysis
windowsir.blogspot.comยท6hยท
๐Ÿ”NTLM Archaeology
Flag this post
Getting Started with Text Mining in R and Python: Origins, Applications, and Real-World Case Studies
dev.toยท9hยท
Discuss: DEV
๐Ÿ“„Text Mining
Flag this post
Tracking an evolving Discord-based RAT family
reversinglabs.comยท2d
๐Ÿฆ Malware Analysis
Flag this post
ESTIMED_hackathon1_SSSUP
hackster.ioยท1d
๐Ÿ”’WASM Capabilities
Flag this post
Notes from RIPE 91
blog.apnic.netยท21h
๐ŸŒDNS over QUIC
Flag this post
The Great Firewall Part 1: The Dump
dti.domaintools.comยท22hยท
Discuss: Hacker News
๐Ÿ“กDNS Archaeology
Flag this post
REVEAL: A large-scale comprehensive image dataset for steganalysis
sciencedirect.comยท1d
๐Ÿ•ต๏ธSteganographic Archives
Flag this post
French minister vows Louvre anti-intrusion devices after post-heist report finds security lapses
the-independent.comยท5h
๐Ÿท๏ธMemory Tagging
Flag this post
InfoSec News Nuggets 10/30/2025
aboutdfir.comยท1d
๐Ÿ”“Hacking
Flag this post
How to collect memory-only filesystems on Linux systems, (Wed, Oct 29th)
isc.sans.eduยท2d
๐Ÿ“ŸTerminal Forensics
Flag this post
A Brief History of the Cypherpunk Movement
seykhel.orgยท1dยท
Discuss: Hacker News
๐Ÿ”Cryptographic Archaeology
Flag this post