๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”Ž OSINT Techniques

Intelligence Gathering, Public Information, Investigation Methods, Data Mining

๏ธโ€โ™‚๏ธ Mastering OSINT: How to Find Information on Anyone
infosecwriteups.comยท1d
๐Ÿ•ณ๏ธInformation Leakage
The Cybersecurity Challenges Behind Your Feed
cyberthreatalliance.orgยท1d
๐Ÿ›กCybersecurity
Porting a Cross-Disciplinary Text Mining Course Online Using Innovative Engagement Techniques
hackernoon.comยท12h
๐Ÿค–Grammar Induction
Google Wifi Pro: Glitching from Root to EL3: Part 1 - Characterization
raelize.comยท3hยท
Discuss: Lobsters, Hacker News
๐Ÿ›ก๏ธeBPF Security
Ransomware Threat Landscape Analysis - May through July for 2025
cstromblad.comยท1d
๐Ÿฆ Malware Analysis
AERONET: Ensuring quality satellite data for mineral exploration
phys.orgยท11h
๐ŸŒˆSpectroscopy
Two Types of Data Privacy Controls
cacm.acm.orgยท1d
๐Ÿ•ณ๏ธInformation Leakage
Android Malware Konfety evolves with ZIP manipulation and dynamic loading
securityaffairs.comยท10h
๐ŸบZIP Archaeology
Secure and Efficient UAV-Based Face Detection via Homomorphic Encryption and Edge Computing
arxiv.orgยท23h
๐Ÿ”Homomorphic Encryption
Wireless Airspace Defense for Modern Data Centers
bastille.netยท12h
๐Ÿ“กNetwork Monitoring
Children arrested in investigation of Russian and Iranian plots against UK, say police
theguardian.comยท9h
๐Ÿ”“Hacking
Unmoved Centre - NixOS Secrets Management
unmovedcentre.comยท9h
โ„Nix
Smarter AI for Critical Operations: Why Data Matters
thenewstack.ioยท10h
๐ŸŒŠStream Processing
How does your phone know so many private details? How thousands of apps are exploiting mysterious indoor location tracking
english.elpais.comยท17h
๐Ÿ“กBluetooth Archaeology
Week 28 โ€“ 2025
thisweekin4n6.comยท2d
๐ŸบKerberos Archaeology
Ex-US soldier who Googled 'can hacking be treason' pleads guilty to extortion
theregister.comยท5h
๐Ÿ•ต๏ธVector Smuggling
What to Know About the Fallout Around the Epstein Files and the Trump Administration
nytimes.comยท14h
๐ŸŒWARC Forensics
Courts Favor Targeted eDiscovery Collections, but It Is Up to In-House Teams to Enable Such Cost Saving Proportional Efforts
blog.x1discovery.comยท8h
โš–๏ธLegal Compliance
Russia shifts cyberwar focus from US to UK following Trump's election
techradar.comยท12h
๐Ÿ›กCybersecurity
SophosAI at Black Hat USA โ€™25: Anomaly detection betrayed us, so we gave it a new job
news.sophos.comยท1d
๐ŸŽฏThreat Hunting
Loading...Loading more...
AboutBlogChangelogRoadmap