Intelligence Gathering, Public Information, Investigation Methods, Data Mining
What is SOC 2 Compliance? A Complete Guide for Security Leaders
securityscorecard.com·2d
DF/IR Isn’t About Computers. It’s About Hunting Humans.
brettshavers.com·1d
The State of Adversarial Prompts
blog.securitybreak.io·20h
Data Poisoning Attacks
infosecwriteups.com·1d
The spies of the pharaohs and the double agents of the Caesars: How intelligence services operated in antiquity
english.elpais.com·2d
Project: Pi Stats
connortumbleson.com·2h
Best infosec-related long reads for the week of 9/6/25
metacurity.com·1d
Mapping Kamchatka Earthquake Displacement
earthobservatory.nasa.gov·1h
Notes of cyber inspector: three clusters of threat in cyberspace
securelist.com·4d
Security Affairs newsletter Round 541 by Pierluigi Paganini – INTERNATIONAL EDITION
securityaffairs.com·17h
Loading...Loading more...