Automated Anomaly Detection & Root Cause Analysis in Optical Data Center Security Logs via Graph Neural Networks
🎯Threat Hunting
Flag this post
Paratyphoid fever and relapsing fever in 1812 Napoleon's devastated army
🧬Copy Number Variants
Flag this post
Retrieval-Augmented Generation for Web Archives: A Comparative Study of WARC-GPT and a Custom Pipeline
journal.code4lib.org·4d
🌐WARC Mining
Flag this post
Dissecting YouTube’s Malware Distribution Network
research.checkpoint.com·2d
🔓Hacking
Flag this post
Weekly Update 475
troyhunt.com·1h
🏺Kerberos Archaeology
Flag this post
Digital Forensics Round-Up, October 22 2025
forensicfocus.com·3d
🔬Archive Forensics
Flag this post
New to homelab - Just got Pi Hole running as my first project, and would like to dig a bit deeper into my outbound data
📡Network Monitoring
Flag this post
Ken Thompson's "Trusting Trust" compiler backdoor - Now with the actual source code (2023)
💻Programming languages
Flag this post
Even the easiest data requests can require some effort
statmodeling.stat.columbia.edu·9h
🎓Academic Torrents
Flag this post
The Oldest (Known) Song Ever
languagelog.ldc.upenn.edu·10h
🎵Music Universality
Flag this post
Reddit Files Lawsuit Accusing ‘Data Scraper’ Companies of Stealing Its Information
nytimes.com·2d
🔍BitFunnel
Flag this post
TOLLBOOTH: What's yours, IIS mine
elastic.co·3d
🛡️eBPF Security
Flag this post
Lists as Creative Artefacts and Lists as Libraries
zylstra.org·12h
🌱Personal Wikis
Flag this post
Eight (or so) Questions to Ask about the ChatGPT Warrant
cyberlaw.stanford.edu·22h
🏺Kerberos Archaeology
Flag this post
AI Dataset for Detecting Nudity Contained Child Sexual Abuse Images
404media.co·1d
🧠Machine Learning
Flag this post
An Overview of Digital Tools and Resources for Central and South Asian Studies Reviewed by The DO Members
digitalorientalist.com·1d
📜Digital Philology
Flag this post
Amazon Explains How Its AWS Outage Took Down the Web
wired.com·12h
👁️Observatory Systems
Flag this post
Triaging MalDocs with Spectra Analyze
reversinglabs.com·2d
🦠Malware Analysis
Flag this post
Loading...Loading more...