Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Computer Forensics Podcasts

Series
Series
Episodes
Language:
English
All languages
English
Afrikaans
Cymraeg
Dansk
Deutsch
Eesti
Español
Esperanto
Français
Gaeilge
Gàidhlig
Hrvatski
Indonesia
Khmer
Latviešu
Lietuvių
Malay
Nederlands
Norsk
Oʻzbekcha
Pyccĸий
Shqip
Slovenčina
Slovenščina
Suomi
Svenska
Tatar
Tiếng Việt
Türkçe
català
italiano
magyar
polski
português
română
rumantsch
Íslenska
Čeština
Ελληνικά
Български
Српски
Українська
беларуская
Қазақша
Հայերեն
עברית
اردو
العربية
فارسی
हिन्दी
বাংলা
ไทย
ქართული
中文
日本語
한국어
show episodes
 
Welcome to F for Forensics — the ultimate digital forensic podcast for cybersecurity professionals, investigators, and tech sleuths! Hosted by Ben and Alex, each episode explores the tools, techniques, and real-world cases behind computer forensics, file system analysis, data recovery, incident response, and more. Whether you're into NTFS carving, malware artifacts, or forensic imaging, this is your byte-sized boost of expert insight and geeky banter. Subscribe now for deep dives into digita ...
  continue reading
 
Welcome to Digital Detectives. We'll discuss computer forensics, electronic discovery and information security issues and what's really happening in the trenches. It's not theory, but practical information that you can use in your law practice on the Legal Talk Network.
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
Join Defense Forensic's Rob Walensky in this week's episode of "Digital Forensics, Redefined." As a 20-year veteran of law enforcement, Rob has seen it all, from near-death experiences with alligators to nationwide drug busts. Using digital forensics, he solved thousands of cases and still attends court for hundreds more. The life of a law enforcement agent never stops. Tune in each week as he brings on guests to discuss more of their digital forensic findings while reminiscing on past lives ...
  continue reading
 
Your exploration inside Lawrence Livermore National Laboratory. Hear untold stories, meet boundary-pushing pioneers and get unparalleled access to groundbreaking science and technology. From national security challenges to computing revolutions, discover the innovations that are shaping tomorrow, today.
  continue reading
 
Welcome to 'Community Connect,' this is the space where we dive into the benefits of seamlessly integrating security products using open source software and standards, all with the goal of fostering a more interoperable security ecosystem. In each episode, we'll embark on a journey into the heart of the OCA community, engaging in insightful conversations with the individuals who are actively shaping the open source security landscape. Expect to stay up-to-date with the very latest developmen ...
  continue reading
 
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
  continue reading
 
Do you want to take your repair shop to the next level? Our owners helped grow some of the largest repair shops in the southeast including The Computer Warriors, Mr. Phix, Mobile Zone, and Smart Touch Repair Center. The Lead Tech Podcast aims to help you expand your offerings to data recovery, forensics, networking, board-level repair, and to deliver an unbelievable customer service experience. Become the largest repair shop in town and gain the competitive advantage.
  continue reading
 
D
Data Discourse
Data Discourse podcast artwork

1
Data Discourse

Peter L. Mansmann, Esq.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Data Discourse, a podcast brought to you by the team at Precise Discovery. In this podcast, we take a look at practical strategies and insights regarding digital and mobile forensics, as well as eDiscovery. We break down the important aspects of this constantly evolving aspect of law, with each episode designed to elevate your knowledge and showcase why, since 2007, the experts at Precise Discovery have been the trusted partner to hundreds of law firms on thousands of matters. Be ...
  continue reading
 
Step into the world of digital forensics, mobile forensics, OSINT, and cybersecurity with The Cyber Sleuth Show! Hosted by Kevin DeLong, this podcast dives deep into the ever-evolving landscape of digital investigations, featuring expert guests, cutting-edge tools, real-world case insights, and, of course, the occasional terrible dad joke. From law enforcement investigators and forensic analysts to OSINT specialists and cybersecurity pros, we uncover the latest trends, techniques, and challe ...
  continue reading
 
R
Research Matters
Research Matters podcast artwork

1
Research Matters

Kennesaw State University

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
From addressing societal challenges to advancing our understanding of the world around us, research matters to all of us. Listen to Research Matters, a production of the Office of Research at Kennesaw State University, to hear how our innovative researchers are working to solve these issues.
  continue reading
 
"The Edge AIsle" brings you to the forefront of artificial intelligence and edge computing, powered by Hailo.ai. In this podcast, we explore how edge AI is reshaping industries from smart cities and intelligent video analytics to autonomous vehicles and retail innovation. Join industry experts and thought leaders as they share insights into how Hailo’s AI processors are transforming the way industries function, enabling real-time deep learning and AI-driven applications directly on edge devi ...
  continue reading
 
Join hosts Debbie Dujanovic, Sheryl Worsley and Becky Bruce in a virtual citizens' academy with the FBI in Salt Lake City, Utah. Learn about how agents respond to crimes and threats ranging from human sex trafficking to counterterrorism and intelligence to mass shootings and even the mafia. Take a virtual tour of the technology used by the evidence response teams that help process crime scenes and work your way through the firearms training simulator as agents explain how and why to use dead ...
  continue reading
 
Loading …
Episodes
Series
Episodes
Sort:
Newest
Newest
Oldest
Longest
Shortest
Language:
English
All languages
English
Afrikaans
Cymraeg
Dansk
Deutsch
Eesti
Español
Esperanto
Français
Gaeilge
Gàidhlig
Hrvatski
Indonesia
Khmer
Latviešu
Lietuvių
Malay
Nederlands
Norsk
Oʻzbekcha
Pyccĸий
Shqip
Slovenčina
Slovenščina
Suomi
Svenska
Tatar
Tiếng Việt
Türkçe
català
italiano
magyar
polski
português
română
rumantsch
Íslenska
Čeština
Ελληνικά
Български
Српски
Українська
беларуская
Қазақша
Հայերեն
עברית
اردو
العربية
فارسی
हिन्दी
বাংলা
ไทย
ქართული
中文
日本語
한국어
show series
 
SANS Stormcast Friday, July 25th, 2025: ficheck.py; Mital and SonicWall Patches New File Integrity Tool: ficheck.py Jim created a new tool, ficheck.py, that can be used to verify file integrity. It is a drop-in replacement for an older tool, fcheck, which was written in Perl and no longer functions well on modern Linux distributions. https://isc.sa…
  continue reading
 
Dr Zoe Billings and Mark Pannone from Adapt & Evolve join Paul to discuss their unique approach to mental health and well-being in digital forensics. Dr Billings is a biologist and former senior investigator, while Mark is a former Assistant Chief Constable. Together they've developed a model that focuses on recognising the early biological signs o…
  continue reading
 
SANS Stormcast Thursday, July 24th, 2025: Reversing SharePoint Exploit; NPM “is” Compromise; Reversing SharePoint “Toolshell” Exploits CVE-2025-53770 and CVE-2025-53771 A quick walk-through showing how to decode the payload of recent SharePoint exploits https://isc.sans.edu/diary/Analyzing%20Sharepoint%20Exploits%20%28CVE-2025-53770%2C%20CVE-2025-5…
  continue reading
 
SANS Stormcast Wednesday, July 23rd, 2025: Sharepoint 2016 Patch; MotW Privacy and WinZip; Interlock Ransomware; Sophos Patches Microsoft Updates SharePoint Vulnerability Guidance CVE-2025-53770 and CVE-2025-53771 Microsoft released its update for SharePoint 2016, completing the updates across all currently supported versions. https://msrc.microsof…
  continue reading
 
SANS Stormcast Tuesday, July 22nd, 2025: SharePoint Emergency Patches; How Long Does Patching Take; HPE Wifi Vuln; Zoho WorkDrive Abused Microsoft Released Patches for SharePoint Vulnerability CVE-2025-53770 CVE-2025-53771 Microsoft released a patch for the currently exploited SharePoint vulnerability. It also added a second CVE number identifying …
  continue reading
 
SANS Stormcast Monday July 21st, 2025: Sharepoint Exploited; Veeam Fake Voicemail Phish; Passkey Phishing Attack SharePoint Servers Exploited via 0-day CVE-2025-53770 Late last week, CodeWhite found a new remote code execution exploit against SharePoint. This vulnerability is now actively exploited. https://isc.sans.edu/diary/Critical+Sharepoint+0D…
  continue reading
 
SANS Stormcast Friday, July 18th, 2025: Extended File Attributes; Critical Cisco ISE Patch; VMWare Patches; Quarterly Oracle Patches Hiding Payloads in Linux Extended File Attributes Xavier today looked at ways to hide payloads on Linux, similar to how alternate data streams are used on Windows. Turns out that extended file attributes do the trick,…
  continue reading
 
SANS Stormcast Thursday, July 17th, 2025: catbox.moe abuse; Sonicwall Attacks; Rendering Issues More Free File Sharing Services Abuse The free file-sharing service catbox.moe is abused by malware. While it officially claims not to allow hosting of executables, it only checks extensions and is easily abused https://isc.sans.edu/diary/More%20Free%20F…
  continue reading
 
SANS Stormcast Wednesday, July 16th, 2025: ADS Keystroke Logger; Fake Homebrew; Broadcom Altiris RCE; Malicious Cursor AI Extensions Keylogger Data Stored in an ADS Xavier came across a keystroke logger that stores data in alternate data streams. The data includes keystroke logs as well as clipboard data https://isc.sans.edu/diary/Keylogger%20Data%…
  continue reading
 
The modern world is an onslaught of threats – from biological and radioactive to nuclear and chemical. At the Forensic Science Center at the Lawrence Livermore National Lab, chemists are working night and day to prevent the next catastrophe. In this episode, we’ll dive deeper into the world of Forensics and how its study can impact not only the qua…
  continue reading
 
SANS Stormcast Monday, July 14th, 2025: Web Honeypot Log Volume; Browser Extension Malware; RDP Forensics DShield Honeypot Log Volume Increase Within the last few months, there has been a dramatic increase in honeypot log volumes and how often these high volumes are seen. This has not just been from Jesse’s residential honeypot, which has historica…
  continue reading
 
Send us a text Aksa Taylor shares her journey from electrical engineering to cybersecurity, highlighting how curiosity and focused passion can open unexpected career doors in the security industry. • Finding specific interests within cybersecurity rather than trying to "get into security" broadly • Building a personal brand through knowledge sharin…
  continue reading
 
SANS Stormcast Monday, July 14th, 2025: Suspect Domain Feed; Wing FTP Exploited; FortiWeb Exploited; NVIDIA GPU Rowhammer Experimental Suspicious Domain Feed Our new experimental suspicious domain feed uses various criteria to identify domains that may be used for phishing or other malicious purposes. https://isc.sans.edu/diary/Experimental%20Suspi…
  continue reading
 
SANS Stormcast Friday, July 11th, 2025: SSH Tunnel; FortiWeb SQL Injection; Ruckus Unpatched Vuln; Missing Motherboard Patches; SSH Tunneling in Action: direct-tcp requests Attackers are compromising ssh servers to abuse them as relays. The attacker will configure port forwarding direct-tcp connections to forward traffic to a victim. In this partic…
  continue reading
 
SANS Stormcast Thursday, July 10th, 2025: Internal CA with ACME; TapJacking on Android; Adobe Patches; Setting up Your Own Certificate Authority for Development: Why and How. Some tips on setting up your own internal certificate authority using the smallstep CA. https://isc.sans.edu/diary/Setting%20up%20Your%20Own%20Certificate%20Authority%20for%20…
  continue reading
 
SANS Stormcast Wednesday, July 9th, 2025: Microsoft Patches; Opposum Attack; Microsoft Patch Tuesday, July 2025 Today, Microsoft released patches for 130 Microsoft vulnerabilities and 9 additional vulnerabilities not part of Microsoft's portfolio but distributed by Microsoft. 14 of these are rated critical. Only one of the vulnerabilities was discl…
  continue reading
 
SANS Stormcast Tuesday, July 8th, 2025: Detecting Filename (Windows); Atomic Stealer now with Backdoor; SEO Scams What’s My File Name Malware may use the GetModuleFileName API to detect if it was renamed to a name typical for analysis, like sample.exe or malware.exe https://isc.sans.edu/diary/What%27s%20My%20%28File%29Name%3F/32084 Atomic macOS inf…
  continue reading
 
Send us a text Ric Prado shares his remarkable journey from Cuban refugee to CIA Senior Operations Officer, revealing how being separated from his parents at age 8 during Castro's revolution eventually led him to America where he found purpose in military service and intelligence work. • Escaped Cuba at age 8 through Operation Peter Pan, sent alone…
  continue reading
 
SANS Stormcast Monday, July 7th, 2025: interesting usernames; More sudo issues; CitrixBleed2 PoC; Short Lived Certs Interesting ssh/telnet usernames Some interesting usernames observed in our honeypots https://isc.sans.edu/diary/A%20few%20interesting%20and%20notable%20ssh%20telnet%20usernames/32080 More sudo trouble The host option in Sudo can be e…
  continue reading
 
SANS Stormcast Thursday July 3rd, 2025: sudo problems; polymorphic zip files; cisco vulnerablity Sudo chroot Elevation of Privilege The sudo chroot option can be leveraged by any local user to elevate privileges to root, even if no sudo rules are defined for that user. https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot Polym…
  continue reading
 
In this episode, we uncover how digital footprints—from browser history and shell commands to registry hives and DNS logs—reveal a user’s activity even when they think it’s been erased. Real cases, practical tools, and expert tips for tracing every click, command, and mistake. #FforForensics #DigitalFootprints #UserActivity #DigitalForensics #DFIR …
  continue reading
 
A mysterious package. A silent explosion. And a phone call that would change the course of forensic science forever. In this gripping first part of our series, we trace the origins of the Forensic Science Center at Lawrence Livermore National Lab through a decades-spanning investigation that began with the Unabomber and grew into a global hub for s…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play