๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”Ž OSINT Techniques

Intelligence Gathering, Public Information, Investigation Methods, Data Mining

The AI-Powered OSINT Investigator: Practical Applications and Ethical Frontiers
dev.toยท3dยท
Discuss: DEV
๐ŸšจIncident Response
What Are Best Practices for Data Security for Sensitive Data?
securityscorecard.comยท17h
๐Ÿ”—Data Provenance
The cryptoterrestrial hypothesis: a covert earthly explanation for UAP
researchgate.netยท51mยท
Discuss: Hacker News
๐ŸบKerberos Archaeology
Disrupting the operations of cryptocurrency mining botnets
securityaffairs.comยท4h
๐ŸŽซKerberos Attacks
Iranian Threat Actor Profile
cstromblad.comยท19h
๐Ÿ”’WASM Capabilities
Mastering Malware Analysis: A SOC Analystโ€™s Guide to Dynamic Analysis with AnyRun
infosecwriteups.comยท5h
๐Ÿฆ Malware Analysis
Killing machines: how Russia and Ukraineโ€™s race to perfect deadly pilotless drones could harm us all
theguardian.comยท5h
๐Ÿ‡ท๐Ÿ‡บSoviet Computing
Unsupervised Learning NO. 486
newsletter.danielmiessler.comยท1d
๐Ÿ•ต๏ธVector Smuggling
Granular-Ball-Induced Multiple Kernel K-Means
arxiv.orgยท1d
๐ŸŒ€Differential Geometry
How the US Military Is Redefining Zero Trust
darkreading.comยท1d
๐ŸŒNetwork Security
In the Blink of an LED, Secrets Slip Away: The Rise of Optical Data Theft
hackernoon.comยท20h
๐Ÿ’ฟOptical Forensics
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.comยท2h
๐Ÿฆ Malware Analysis
The 16 Billion Passwords Panic: What Really Happened and Why It Matters (Or Doesnโ€™t)
blog.elcomsoft.comยท1d
๐Ÿ”“Password Cracking
Cybercriminals Abuse Open-Source Tools To Target Africaโ€™s Financial Sector
unit42.paloaltonetworks.comยท16h
๐ŸŽซKerberos Exploitation
CVE-2025-32977 - Quest KACE Unauthenticated Backup Upload
seclists.orgยท1d
๐Ÿ›กCybersecurity
Week 25 โ€“ 2025
thisweekin4n6.comยท3d
๐ŸŒWARC Forensics
How cybercriminals have become smarter and more dangerous than ever before
techradar.comยท1d
๐ŸŽฏThreat Hunting
InfoSec News Nuggets 6/24/2025
aboutdfir.comยท21h
๐Ÿ›กCybersecurity
ICSA Colloquium Talk - 10/07/2025
informatics.ed.ac.ukยท3h
๐ŸงฒRISC-V Archaeology
How to (Almost) solve cybersecurity once and for all
adaptive.liveยท17hยท
Discuss: Hacker News
๐Ÿ”Systems Hardening
Loading...Loading more...
AboutBlogChangelogRoadmap