Unsupervised Learning: Clustering
dev.to·9h·
Discuss: DEV
📚Document Clustering
Searching Places Unknown: Law Enforcement Jurisdiction on the Dark Web (2017)
scholarship.law.bu.edu·10h·
Discuss: Hacker News
🌐WARC Forensics
What is SOC 2 Compliance? A Complete Guide for Security Leaders
securityscorecard.com·2d
🎯Threat Hunting
DF/IR Isn’t About Computers. It’s About Hunting Humans.
brettshavers.com·1d
🔗Data Provenance
The State of Adversarial Prompts
blog.securitybreak.io·20h
🎯Threat Hunting
Physics-informed sensor coverage through structure preserving machine learning
arxiv.org·1h
🧠Machine Learning
Data Poisoning Attacks
infosecwriteups.com·1d
🔍Vector Forensics
The spies of the pharaohs and the double agents of the Caesars: How intelligence services operated in antiquity
english.elpais.com·2d
🗝️Paleocryptography
Project: Pi Stats
connortumbleson.com·2h
🕵️Domain Enumeration
Best infosec-related long reads for the week of 9/6/25
metacurity.com·1d
🛡Cybersecurity
Cognitive and Gestalt psychology in your code: SMVP pattern
github.com·5h·
Discuss: Hacker News
Format Verification
Concerns mount over EU plans to scan private pics for child sexual abuse content
france24.com·14h
🔤EBCDIC Privacy
15 ransomware gangs ‘go dark’ to enjoy 'golden parachutes'
theregister.com·5h
🎫Kerberos Exploitation
Mapping Kamchatka Earthquake Displacement
earthobservatory.nasa.gov·1h
🧲Magnetic Resonance
Notes of cyber inspector: three clusters of threat in cyberspace
securelist.com·4d
🕵️Penetration Testing
Why (special agent) Johnny (still) Can't Encrypt (2011)
mattblaze.org·2d·
Discuss: Lobsters
🌊Stream Ciphers
Enhanced Spectral Anomaly Detection via Multi-Resolution Bayesian Fusion
dev.to·12h·
Discuss: DEV
📊Spectrograms
OpenAI Model Spec
model-spec.openai.com·3h·
Discuss: Hacker News
🔒WASM Capabilities
Security Affairs newsletter Round 541 by Pierluigi Paganini – INTERNATIONAL EDITION
securityaffairs.com·17h
🔓Hacking
“Threat Intelligence Unveiled: Breaking Down the Types and It’s Importance”
infosecwriteups.com·3d
🎯Threat Hunting