Osint Intelligence Analysis
opensourceintelligence.biz·1d·
Discuss: Hacker News
🕳️Information Leakage
Flag this post
Nearly 58 billion personal data points have been leaked online since 2004, new study reveals
techradar.com·23h
🔓Hacking
Flag this post
A DRL-Empowered Multi-Level Jamming Approach for Secure Semantic Communication
arxiv.org·1d
🔒Language-based security
Flag this post
Europe's secret weapon against Russian 'disposable agents'
euronews.com·1d
🔍Polish Cryptanalysis
Flag this post
10 Security Operations Center Best Practices Every Security Leader Should Know
vmray.com·3d
🎯Threat Hunting
Flag this post
When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems
unit42.paloaltonetworks.com·1d
🕵️Vector Smuggling
Flag this post
Advancing cybersecurity a comprehensive review of AI-driven detection techniques
journalofbigdata.springeropen.com·3d·
Discuss: Hacker News
🎯Threat Hunting
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.com·1d
🔐Hash Functions
Flag this post
Registry Analysis
windowsir.blogspot.com·1d·
🔍NTLM Archaeology
Flag this post
Getting Started with Text Mining in R and Python: Origins, Applications, and Real-World Case Studies
dev.to·1d·
Discuss: DEV
📄Text Mining
Flag this post
Beyond Brute Force: 4 Secrets to Smaller, Smarter, and Dramatically Cheaper AI
hackernoon.com·4h
🕵️Vector Smuggling
Flag this post
REVEAL: A large-scale comprehensive image dataset for steganalysis
sciencedirect.com·2d
🕵️Steganographic Archives
Flag this post
ESTIMED_hackathon1_SSSUP
hackster.io·2d
🔒WASM Capabilities
Flag this post
Notes from RIPE 91
blog.apnic.net·1d
🌐DNS over QUIC
Flag this post
The Great Firewall Part 1: The Dump
dti.domaintools.com·1d·
Discuss: Hacker News
📡DNS Archaeology
Flag this post
Know Your Assets, Know Your Normal: A Practical Guide to OT Baselining
emberot.com·11h·
Discuss: Hacker News
🎯Threat Hunting
Flag this post
Tracking an evolving Discord-based RAT family
reversinglabs.com·3d
🦠Malware Analysis
Flag this post
French minister vows Louvre anti-intrusion devices after post-heist report finds security lapses
the-independent.com·1d
🏷️Memory Tagging
Flag this post
InfoSec News Nuggets 10/30/2025
aboutdfir.com·2d
🔓Hacking
Flag this post