Feeds to Scour
SubscribedAll
Scoured 13797 posts in 735.5 ms
OSINT Under the Hood: Learning from the Bestβ€Šβ€”β€ŠTop Resources to Follow
meetcyber.net
Β·3h
πŸ”“Hacking
Preview
Report Post
My OSINT Journey: From Beginner to Investigator with Cybrary
medium.comΒ·2d
πŸ“ŸTerminal Forensics
Preview
Report Post
Social Engineering Attacks: A Systemisation of Knowledge on People Against Humans
arxiv.orgΒ·1d
🎯Threat Hunting
Preview
Report Post
The Next Five Years of OSINT: Trends Innovations and Challenges Transforming Investigative Landscapes
dutchosintguy.comΒ·3d
🌐WARC Forensics
Preview
Report Post
New information extracted from Snowden PDFs through metadata version analysis
libroot.orgΒ·8hΒ·
Discuss: Hacker News
🏺Kerberos Archaeology
Preview
Report Post
Next-generation Constitutional Classifiers: More efficient protection against universal jailbreaks
anthropic.comΒ·11hΒ·
Discuss: Hacker News
πŸ§ͺProtocol Fuzzing
Preview
Report Post
Tackling conspiracy theories requires tactics as varied as the theories themselves
phys.orgΒ·3d
πŸ•΅Intelligence
Preview
Report Post
NEWS ROUNDUP
digitalforensicsmagazine.comΒ·1d
πŸ›‘Cybersecurity
Preview
Report Post
Privacy-Preserving Active Learning for satellite anomaly response operations for low-power autonomous deployments
dev.toΒ·1dΒ·
Discuss: DEV
🧠Machine Learning
Preview
Report Post
AI noiseΒ andΒ the effectΒ it'sΒ havingΒ on vulnerability disclosure programs
pentestpartners.comΒ·1d
🎯Threat Hunting
Preview
Report Post
Resistance honeypots
heatherburns.techΒ·11hΒ·
Discuss: Hacker News
πŸ§…Tor Networks
Preview
Report Post
InfoSec News Nuggets 01/09/2026 - AboutDFIR - The Definitive Compendium Project
aboutdfir.comΒ·1d
🌐DNS Security
Preview
Report Post
The Epstein Files: When Redaction and Authenticity Break Down
lmgsecurity.comΒ·1d
πŸ”“Hacking
Preview
Report Post
Balancing AI Innovation with Data Privacy: A Strategic Approach
info.aiim.orgΒ·2d
πŸ”’Privacy Preserving
Preview
Report Post
New Rapid AI Driven Cyber Threats in 2026
dev.toΒ·16hΒ·
Discuss: DEV
🎯Threat Hunting
Preview
Report Post
From Hypothesis to Action: Proactive Threat Hunting with Elastic Security
elastic.coΒ·2d
🎯Threat Hunting
Preview
Report Post
The Intelligence crisis in Iraq: political fragmentation and the challenge of reform
tandfonline.comΒ·3d
πŸ•΅Intelligence
Preview
Report Post
Multivariate information decomposition
danmackinlay.nameΒ·4d
πŸ“Information Geometry
Preview
Report Post
Beyond K-Means: Modern Hierarchical Clustering in R
dev.toΒ·2dΒ·
Discuss: DEV
πŸ“šDocument Clustering
Preview
Report Post
Comparison of Maximum Likelihood Classification Before and After Applying Weierstrass Transform
arxiv.orgΒ·1d
🧠Machine Learning
Preview
Report Post

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help