Digital Forensics Round-Up, October 29 2025
forensicfocus.comยท13h
๐Audio Forensics
Flag this post
Preparing DNSSEC for the Post-Quantum Era
circleid.comยท1d
๐DNS Security
Flag this post
Tap-and-Steal: The Rise of NFC Relay Malware on Mobile Devices
zimperium.comยท13h
๐ซKerberos Attacks
Flag this post
Whatโs the best way to test and secure a blockchain solution before launch?
๐Hash Chains
Flag this post
Keeping the Internet fast and secure: introducing Merkle Tree Certificates
๐ณArchive Merkle Trees
Flag this post
AWS account hygiene
me.micahrl.comยท16h
๐ฅ๏ธSelf-hosted Infrastructure
Flag this post
SaaSS-quatch
jxself.orgยท6h
๐Academic Torrents
Flag this post
A Smarter ACME Challenge for a Multi-CDN World
fastly.comยท1d
๐DNS Security
Flag this post
Tracking an evolving Discord-based RAT family
reversinglabs.comยท13h
๐ฆ Malware Analysis
Flag this post
Making MLS More Decentralized
๐ณArchive Merkle Trees
Flag this post
SEC Consult SA-20251029-0 :: Unprotected NFC card manipulation leading to free top-up in GiroWeb Cashless Catering Solutions (only legacy customer infrastructur...
seclists.orgยท3h
๐คEBCDIC Privacy
Flag this post
The Epistemic Suite: A Post-Foundational Diagnostic Methodology for Assessing AI Knowledge Claims
arxiv.orgยท21m
๐บ๏ธCompetency Maps
Flag this post
A solution to the concerns about the current RPKI Trust Anchor configuration
blog.apnic.netยท3h
๐NetworkProtocols
Flag this post
10 Security Operations Center Best Practices Every Security Leader Should Know
vmray.comยท12h
๐ฏThreat Hunting
Flag this post
For DNSSEC And Why DANE Is Needed
blog.technitium.comยท1d
๐DNS Security
Flag this post
The 10 best VPN detection tools for fraud prevention in 2025
fingerprint.comยท5h
๐ต๏ธNetwork Forensics
Flag this post
Cybersecurity: the unseen engine of the UKโs digital future
techradar.comยท1d
๐กCybersecurity
Flag this post
Loading...Loading more...