Web Archive Analysis, Internet Archaeology, Crawl Reconstruction, URL Timeline Analysis

Digital Doppelgangers: Anatomy of Evolving Impersonation Campaigns Distributing Gh0st RAT
unit42.paloaltonetworks.com·2h·
Discuss: r/SecOpsDaily
🎫Kerberos Attacks
Flag this post
Open-source search tool for 2,895 House Oversight Epstein documents
github.com·9h·
Discuss: Hacker News
🤖Archive Automation
Flag this post
Building an AI-Powered Log Analyser with RAG
dev.to·14h·
Discuss: DEV
🤖Archive Automation
Flag this post
CDT in NLP Distinguished Lecture Series: Dan Roth
informatics.ed.ac.uk·13h
🎭Cultural Informatics
Flag this post
What Is Graph Anomaly Detection
puppygraph.com·1d·
Discuss: Hacker News
🕸️Neo4j
Flag this post
Data Leaks: Cyber Gang cl0p Claims Stolen Data from Carglass, Fluke, NHS
heise.de·3h
🔓Hacking
Flag this post
A comprehensive artifact analysis of Google applications on Android and iOS platforms
sciencedirect.com·2d
⚖️Digital Evidence
Flag this post
When Among Us Meets Academia: An OSINT Challenge That’s Not Sus At All | v1t CTF OSINT Challenge
infosecwriteups.com·1d
📟Terminal Forensics
Flag this post
How does an AI detection tool actually work and is it accurate?
the-independent.com·9h
🤖AI Curation
Flag this post
Messing with bots
herman.bearblog.dev·1d·
🔍BitFunnel
Flag this post
Simulating Misinformation Propagation in Social Networks using Large Language Models
arxiv.org·20h
🧠Intelligence Compression
Flag this post
NEWS ROUNDUP – 14th November 2025
digitalforensicsmagazine.com·12h
🌐BGP Security
Flag this post
Grokipedia cites a Nazi forum and fringe conspiracy websites
indicator.media·3h·
Discuss: Hacker News
📰RSS Archaeology
Flag this post
We opened a fake invoice and fell down a retro XWorm-shaped wormhole
malwarebytes.com·1d
🔓Hacking
Flag this post
devlog: garbage collection is useful
dubroy.com·1d
🌳Incremental Parsing
Flag this post
Digit stealer: a JXA-based infostealer that leaves little footprint
jamf.com·1d
🔓Password Cracking
Flag this post
Understanding the MITRE ATT&CK® Framework: A Modern Lens on Adversary Behavior
bitsight.com·1d
🎯Threat Hunting
Flag this post
InfoSec News Nuggets 11/14/2025
aboutdfir.com·11h
🛡Cybersecurity
Flag this post
Voices Celebrating 1 Trillion Pages: Katherine Maher, President and CEO of NPR
blog.archive.org·13h
🌐Web Archiving
Flag this post
100 Top Observability Tools (+ Server Monitoring and APM solutions)
linuxblog.io·19h
👁️Observatory Systems
Flag this post