The OSINT playbook: Find your weak spots before attackers do
welivesecurity.com·2d
🕳️Information Leakage
Flag this post
Silent Signals: Hiding Red Team Operations in AI Noise by Arvind Sundararajan
🎯Threat Hunting
Flag this post
Unlocking the Potential of Raw Data Analysis in OSINT
dutchosintguy.com·5d
🗃️Database Forensics
Flag this post
Russia exploits western polarisation to ‘split us up’, warns top general
ft.com·1h
🇸🇪Swedish Cryptanalysis
Flag this post
Cyber Humanities for Heritage Security
cacm.acm.org·1d
🎭Cultural Informatics
Flag this post
The Machine Learning Roadmap
🎵Audio ML
Flag this post
All warfare is information warfare
🔲Cellular Automata
Flag this post
Best infosec-related long reads for the week of 11/15/25
metacurity.com·15h
🛡Cybersecurity
Flag this post
Bitsight Threat Intelligence Briefing: Key Malware Trends Shaping Cyber Risk in 2025
bitsight.com·2d
🦠Malware Analysis
Flag this post
Info to decipher secret message in Kryptos sculpture at CIA headquarters sells for close to $1M
the-independent.com·1d
🦠Parasitic Archives
Flag this post
From Shannon to Modern AI: A Complete Information Theory Guide for Machine Learning
machinelearningmastery.com·2d
📈Entropy Estimation
Flag this post
Classification of worldwide news articles by perceived quality, 2018-2024
arxiv.org·2d
📰Content Curation
Flag this post
📘 Unsupervised Learning NO. 507
newsletter.danielmiessler.com·3d
🕵️Vector Smuggling
Flag this post
RISK ASSESSMENT: POTENTIAL BLOCKS TO THE RELEASE OF THE EPSTEIN FILES
krypt3ia.wordpress.com·1d
🕳️Information Leakage
Flag this post
AI as Cyberattacker
schneier.com·1d
🔓Hacking
Flag this post
eBPF Rootkit
🛡️eBPF Security
Flag this post
NEWS ROUNDUP – 21st November 2025
digitalforensicsmagazine.com·1d
🚨Incident Response
Flag this post
Inside Iran's Cyber Objectives: What Do They Want?
darkreading.com·2d
🕳️Information Leakage
Flag this post
The Original OTP: Inside the Only Encryption Proven to Be Unbreakable
hackernoon.com·1d
🔐Cryptographic Archaeology
Flag this post
Loading...Loading more...