Digital forensics discussion for computer forensics, DFIR and eDiscovery professionals. Visit Forensic Focus at forensicfocus.com for more.
…
continue reading
Pro Digital Forensic Podcasts
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
Pro Digital Forensic Consulting is a full-service forensic data acquisition, analysis, reporting & expert witness service based in Richmond, Virginia. We service clients all over the globe in areas of litigation, professional investigation & corporate needs related to the retrieval & analysis of data. We pride ourselves on adherence to the forensic methodology & best practices. Please contact us for more information: Web: ProDigital4n6.com Email: [email protected] Phone: 804-588 ...
…
continue reading
1
Inside FTK Imager Pro: Vendor-Neutral Forensics, Smarter AI, And Exterro's Forensic Vision
1:07:38
1:07:38
Play later
Play later
Lists
Like
Liked
1:07:38Justin Tolman from Exterro joins the Forensic Focus Podcast to talk about the future of FTK and the role FTK Imager still plays in everyday casework. He explains why the original free version remains available, and what prompted the introduction of Imager Pro with added capabilities like BitLocker decryption and iOS collections. Justin also reflect…
…
continue reading
1
Patch Tuesday: Zero-Day Alert and Patching Must-Dos ✅
7:11
7:11
Play later
Play later
Lists
Like
Liked
7:11Got a question or comment? Message us here! A new zero-day. 63 flaws. Endless patching chaos. This week’s #SOCBrief breaks down Microsoft’s November Patch Tuesday and what it means for your SOC. We’ll cover the top critical CVEs, patching priorities, and how to keep your systems resilient before attackers strike. Support the show Watch full episode…
…
continue reading
1
⚠️ Insider Threats ⚠️: Ransomware Negotiators Gone Rogue
6:12
6:12
Play later
Play later
Lists
Like
Liked
6:12Got a question or comment? Message us here! This week, we’re digging into a case where ransomware negotiators allegedly became the attackers themselves, leveraging insider access to hit organizations they were supposed to help. This one raises real questions about trust, vendor oversight, and the human element in incident response. We break down wh…
…
continue reading
Got a question or comment? Message us here! In this episode, we break down the real mechanics of social engineering, from phishing emails and text scams to vishing calls and full-on physical pen tests. We share stories from the field, including how attackers build trust, why confidence is often more effective than technical skill, and what happens …
…
continue reading
1
Atroposia RAT: The Malware That Scans for Its Own Exploits
6:11
6:11
Play later
Play later
Lists
Like
Liked
6:11Got a question or comment? Message us here! 🎙️ A new threat is making waves ... Atroposia RAT, a remote access trojan that doesn’t just infiltrate systems but scans them for vulnerabilities to exploit further. In this episode, we break down how this modular malware operates, how it hides, and why its built-in scanner is a game-changer for attackers…
…
continue reading
1
CAPTCHA Con: Hackers' Evolving ClickFix Malware Trap
7:50
7:50
Play later
Play later
Lists
Like
Liked
7:50Got a question or comment? Message us here! “I’m not a robot.” 🤖 Hackers are exploiting fake “I’m not a robot” CAPTCHA pages to deliver malware. Host Andrew Hickman breaks down how this ClickFix attack uses social engineering to steal data and evade detection. Tune in to learn key defense tactics and how to keep your team protected. Support the sho…
…
continue reading
1
RondoDox Botnet Expansion: The Shotgun Approach to IoT Exploitation
7:19
7:19
Play later
Play later
Lists
Like
Liked
7:19Got a question or comment? Message us here! This week on the #SOCBrief, Andrew breaks down RondoDox, a rapidly growing botnet campaign taking aim at routers, DVRs, and IoT devices worldwide. With over 50 vulnerabilities across 30+ vendors, this “shotgun” exploitation strategy is fueling massive DDoS and crypto-mining attacks. Support the show Watch…
…
continue reading
1
Inside F3: Building Community And Sharing Knowledge In Digital Forensics
1:00:33
1:00:33
Play later
Play later
Lists
Like
Liked
1:00:33Gareth Davies, Chairman of F3 (First Forensic Forum), joins the Forensic Focus Podcast to explore how a grassroots, vendor-neutral community has helped shape digital forensics in the UK for three decades. He traces F3's origins in the 1990s, when affordable training and tool-agnostic knowledge-sharing were scarce, and explains why the forum still f…
…
continue reading
1
Obscura Ransomware: Unmasking a Stealthy New Threat ⚠️
12:25
12:25
Play later
Play later
Lists
Like
Liked
12:25Got a question or comment? Message us here! In this week’s #SOCBrief, Hickman and Peters break down Obscura ... a new ransomware variant making waves with aggressive evasion tactics, process terminations, and domain controller targeting. We cover what’s known so far, the risks it poses to businesses, and the key defenses every SOC should prioritize…
…
continue reading
1
🛡️ Pen Test Potential: How Organizations Are Missing Out on Fortifying the SOC 🛡️
20:08
20:08
Play later
Play later
Lists
Like
Liked
20:08Got a question or comment? Message us here! What’s the real difference between a penetration test and a red team engagement, and how can each benefit your SOC? In this episode, Andrew is joined by Tanner, to unpack how pentests uncover vulnerabilities, how red teams stress-test defenders, and why every organization should be leveraging these exerci…
…
continue reading
By Alias Cybersecurity
…
continue reading
1
🚨 Ransomware Rising: Variants, Tactics, and Defenses in 2025 🚨
7:29
7:29
Play later
Play later
Lists
Like
Liked
7:29Got a question or comment? Message us here! Ransomware is evolving faster than ever, from double extortion tactics to lightning-fast attack chains. In this episode, we break down how these threats work, why every organization is a target, and the layered defenses SOCs can use to detect and stop attacks early. Support the show Watch full episodes at…
…
continue reading
1
Inside The Fight Against Child Exploitation – Leadership And Wellness Lessons From Debbie Garner
42:30
42:30
Play later
Play later
Lists
Like
Liked
42:30Debbie Garner, retired Special Agent in Charge at the Georgia Bureau of Investigation, joins the Forensic Focus Podcast to share insights from her 30-year career. From undercover narcotics work in her early 20s to leading Georgia's Internet Crimes Against Children (ICAC) Task Force, Debbie brings a unique perspective on collaboration, child protect…
…
continue reading
1
💢 FileFix Fiasco 💢 Steganography's Stealthy StealC Drop
5:53
5:53
Play later
Play later
Lists
Like
Liked
5:53Got a question or comment? Message us here! In this episode of The #SOCBrief, we break down the rising FileFix attack, a new social engineering technique using steganography to deliver info-stealing malware. Learn how attackers disguise malicious PowerShell commands, the risks this poses for browsers, messengers, and crypto wallets, and the proacti…
…
continue reading
1
Monitoring the Dark Web for Leaked Data in DFIR
6:28
6:28
Play later
Play later
Lists
Like
Liked
6:28Got a question or comment? Message us here! 🔎 This episode of The #SOCBrief dives into the world of dark web monitoring in digital forensics and incident response. Learn why leaked credentials are a top threat, how to safely detect exposures, and what steps SOC teams can take to stay proactive. Support the show Watch full episodes at youtube.com/@a…
…
continue reading
1
Mastering Incident Response: Essential for SOC Success
8:41
8:41
Play later
Play later
Lists
Like
Liked
8:41Got a question or comment? Message us here! 💡 This week on The SOC Brief, we’re breaking down incident response (IR) ... why it’s essential, how to build a strong plan, and what SOC teams can do to turn chaos into control. From preparation and containment to recovery and lessons learned, learn how a solid IR strategy saves time, money, and reputati…
…
continue reading
Got a question or comment? Message us here! Fresh off the chaos of DEF CON 33, Tanner, Hickman, and Will break down the four-day hacker conference, from the eye-opening hacker villages and mind-bending talks to Hickman’s clutch CTF victory and Will’s bold dive into the Social Engineering Community’s Vishing Competition. No sleep, all signal. Suppor…
…
continue reading
1
⚠️ Crypto24 ⚠️ Ransomware: Bypassing EDR and Bolstering Defenses
8:22
8:22
Play later
Play later
Lists
Like
Liked
8:22Got a question or comment? Message us here! In this episode, we break down the emerging Crypto24 ransomware attacks that use living-off-the-land techniques to bypass EDR. We’ll explore how these attacks unfold and the defensive strategies SOCs and organizations can use, like layered security, enhanced monitoring, and rapid response, to stay ahead o…
…
continue reading
1
🚨 Gone Vishing: The Recent Surge of Vishing Attacks
10:50
10:50
Play later
Play later
Lists
Like
Liked
10:50Got a question or comment? Message us here! This week, we’re unpacking the phishing wave hitting SaaS platforms ... from social engineering to OAuth abuse and AI voice spoofing. Learn why people remain the #1 attack vector and how to stay one step ahead. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcas…
…
continue reading
1
Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey
48:03
48:03
Play later
Play later
Lists
Like
Liked
48:03Hannah Bailey, founder of Blue Light Wellbeing, joins the Forensic Focus Podcast to share her powerful journey from frontline policing to becoming a psychotherapist, trauma therapist, and well-being coach. Drawing on 15 years in the police — including CID and major crime — Hannah brings unique cultural credibility to her work supporting digital for…
…
continue reading
Got a question or comment? Message us here! On this episode of the #SOCBrief, we break down attacks on SonicWall firewalls. A wave of ransomware, possibly exploiting zero-day vulnerabilities, is compromising even fully patched systems. Learn how SOCs can respond fast and stay ahead. Support the show Watch full episodes at youtube.com/@aliascybersec…
…
continue reading
1
Spilling the Tea: What Happens When Apps Launch Without Locking Down Security ☕
13:23
13:23
Play later
Play later
Lists
Like
Liked
13:23Got a question or comment? Message us here! This week’s SOC Brief unpacks how a misconfigured cloud bucket exposed 72,000+ user images from the Tea app, complete with geolocation metadata and real IDs. From national security risks to doxxing fallout, we break down what went wrong and what your security team must do to avoid the same mistakes. Suppo…
…
continue reading
Got a question or comment? Message us here! A critical zero-day (CVE-2025-53770) is actively targeting on-premises SharePoint servers AND it’s already been used to compromise over 100 organizations. In this #SOCBrief, Andrew and Tanner break down how the exploit works and what steps your team should take now. If your SharePoint instance is public-f…
…
continue reading
1
Digital Forensics And Stress: Understanding Your Body's Signals
41:45
41:45
Play later
Play later
Lists
Like
Liked
41:45Dr Zoe Billings and Mark Pannone from Adapt & Evolve join Paul to discuss their unique approach to mental health and well-being in digital forensics. Dr Billings is a biologist and former senior investigator, while Mark is a former Assistant Chief Constable. Together they've developed a model that focuses on recognising the early biological signs o…
…
continue reading
Got a question or comment? Message us here! In this week’s #SOCBrief, we break down why offboarding policies are ABSOLUTELY critical for security teams. Overlooked items from abandoned accounts to old VPN access can leave backdoors wide open. Learn how SOCs monitor, contain, and shut down lingering access, and why communication between HR, IT, and …
…
continue reading
1
Aligned by Design: CISO x Legal in Practice - Episode 92
54:40
54:40
Play later
Play later
Lists
Like
Liked
54:40Got a question or comment? Message us here! 🎙️ NEW! Aligned by Design: CISO x Legal Introducing! A fresh new series that explores the intersection of cybersecurity and legal strategy. Join Alias CISO Jonathan Kimmitt and privacy attorney Tom Vincent as they unpack what happens when technology, compliance, risk, and law collide. From real-world expe…
…
continue reading
Got a question or comment? Message us here! Hackers just unleashed the largest DDoS attack in history, peaking at 7.3 Tbps and 4.8 billion packets per second. In just 45 seconds, it pummeled its target with the data equivalent of over 9,000 HD movies, a powerful reminder of how far attack capabilities have evolved. 🎧 Tune in to today’s SOC Brief fo…
…
continue reading
1
Secure AF SOC Brief #5 - Chrome CVE-2025-6554
9:04
9:04
Play later
Play later
Lists
Like
Liked
9:04Got a question or comment? Message us here! In this episode of The SOC Brief, the team unpacks a critical zero-day vulnerability in Google Chrome (CVE-2025-6554) that’s being actively exploited. Learn how attackers use type confusion bugs to hijack browser memory, what makes this exploit so dangerous, and why it’s targeting high-value organizations…
…
continue reading
1
Ep 91: The Engineers React to Breach News
45:27
45:27
Play later
Play later
Lists
Like
Liked
45:27Got a question or comment? Message us here! In this episode, our security engineers break down the latest cybersecurity headlines, from the real scoop behind the “16 billion password” leak to the rise of hacker groups like Scattered Spider. 🕷️ We discuss how attackers bypass MFA, why exploited data keeps resurfacing, and what organizations can do t…
…
continue reading
Got a question or comment? Message us here! In this episode of The SOC Brief, Andrew and Dax dive into the world of false positives – those misleading alerts that flood security teams with noise. They discuss how misconfigurations, lack of context, and overly sensitive rules can lead to alert fatigue. With practical tips on investigation, tuning to…
…
continue reading
1
Well-Being Interventions For Forensic Practitioners – Have Your Say
39:04
39:04
Play later
Play later
Lists
Like
Liked
39:04Dr Jo Morrissey joins Paul to discuss her research into wellbeing challenges faced by forensic practitioners worldwide. As Workforce Strategy Lead at the Forensic Capability Network, Dr Morrissey is conducting a comprehensive study examining mental health impacts across all forensic disciplines - from digital forensics to crime scene investigation,…
…
continue reading
Got a question or comment? Message us here! 🔐 New SOC Brief Episode: Tracing the Breadcrumbs Cybercriminals always leave a trail, if you know where to look. In this episode, we break down Indicators of Compromise (IOCs) and how they help security teams detect and respond to threats faster. 🎯 What we cover: • Real-world incident reports & proof of c…
…
continue reading
1
Episode 90: Global Wars - Cyber Strikes Back
50:11
50:11
Play later
Play later
Lists
Like
Liked
50:11Got a question or comment? Message us here! 🎙️ New Secure AF Episode: Global Wars: Cyber Strikes Back 🌐⚔️ How does global news shape cybersecurity operations? In this episode, we dig into how real-world events influence the threats we track, the way we respond, and the tools we use for social engineering/pentesting. 🔍 We talk threat intel, evolving…
…
continue reading
1
Tom Oldroyd From Semantics 21 On Protecting Investigators And Reducing CSAM Exposure
55:01
55:01
Play later
Play later
Lists
Like
Liked
55:01Host Paul Gullon-Scott sits down with Tom Oldroyd, Director of Strategy and Sales at Semantics 21, to discuss S21's digital forensics platform that prioritizes investigator mental health alongside cutting-edge technology. Drawing on his 17 years in policing and experience running a digital forensic unit, Tom highlights the psychological toll on inv…
…
continue reading
Got a question or comment? Message us here! 🎙️ This Week on the SOC Brief: Join Andrew and Dax as they dive into the emergence of a new threat actor known as SafePay 🕵️♂️💻. They break down the latest tactics, techniques, and procedures observed from this group, offering insights into how organizations can stay vigilant. From detection strategies 🔍…
…
continue reading
1
Episode 89: Meet the Alias SOC - on the Battlefront of Cybersecurity
29:57
29:57
Play later
Play later
Lists
Like
Liked
29:57Got a question or comment? Message us here! 🔐 Inside the SOC 🔐 Go behind the scenes with the Alias Security Operations Center (SOC) team to learn how they operate, collaborate, and tackle today’s top cyber threats ⚔️. Find out why a SOC matters, and how organizations can still leverage SOC insights and support, even without one in-house 💼. 🎧 Tap in…
…
continue reading
Got a question or comment? Message us here! Welcome to 🎙️The SOC Brief 🎙️our byte-sized mini series bringing you weekly updates straight from the Security Operations Center. In this episode, Andrew, Dax, and Dylan break down what life in the SOC looks like, the rise of malvertising, and the emerging threat known as Recipe Lister, discussing how it’…
…
continue reading
1
Hexordia's Jessica Hyde: Navigating The Future Of Digital Forensics
58:26
58:26
Play later
Play later
Lists
Like
Liked
58:26Jessica Hyde from Hexordia joins the Forensic Focus Podcast to discuss her unique journey from Marine Corps avionics technician to digital forensics expert. Jessica shares how her military background provided transferable skills for forensic investigations, emphasizing the importance of documentation, troubleshooting, and diverse perspectives in fi…
…
continue reading
1
Episode 88: Two-Time CISO Showdown Champion (and Chad)
46:05
46:05
Play later
Play later
Lists
Like
Liked
46:05Got a question or comment? Message us here! Alias Cybersecurity Jonathan Kimmitt is joined by Chad Kliewer to discuss the exciting CISO Showdown competition between Chief Information Security Officers (CISOs) at BSidesOK. They delve into the history of the showdown, how it works, and highlight significance of the championship belt. Tune in as they …
…
continue reading
1
Cellebrite's 2025 DFIR Industry Trends Survey - Key Insights
52:37
52:37
Play later
Play later
Lists
Like
Liked
52:37Heather Barnhart and Paul Lorenz join the Forensic Focus Podcast to discuss key insights from Cellebrite's 2025 DFIR Industry Trends Survey. They dive into the challenges facing digital forensics today - from locked devices and encrypted applications to overwhelming case backlogs. The survey, which gathered responses from over 2,100 professionals a…
…
continue reading
1
The DFIR Investigative Mindset: Brett Shavers On Thinking Like A Detective
55:56
55:56
Play later
Play later
Lists
Like
Liked
55:56Brett Shavers joins the Forensic Focus Podcast to discuss the critical "investigative mindset" needed for effective digital forensics. Drawing from his unique background in undercover law enforcement operations and his transition to digital forensics, Brett shares invaluable insights on why technical skills alone aren't enough in DFIR. Digging into…
…
continue reading
1
Episode 87: Securing Patient Data with HIPAA's New Security Rules
53:31
53:31
Play later
Play later
Lists
Like
Liked
53:31Got a question or comment? Message us here! Alias Cybersecurity CISO Jonathon Kimmitt is joined by Derrac Page to discuss the new changes to the HIPAA security rules being set in place this year. Listen as they go over many of the biggest points raised from the 660+ page guidelines and discuss ways that HIPAA Privacy Officers and HIPAA Security Off…
…
continue reading
1
AI Unpacked: Magnet Forensics' New Series On AI In DFIR
1:02:33
1:02:33
Play later
Play later
Lists
Like
Liked
1:02:33Brandon Epstein joins the Forensic Focus Podcast to discuss the evolving landscape of digital forensics and the growing role of artificial intelligence in evidence analysis. Brandon shares his journey from being a major crimes detective in New Jersey to co-founding Medex Forensics (later acquired by Magnet), and discusses his current roles both at …
…
continue reading
1
Episode 86: How to make your pen test training not suck
33:05
33:05
Play later
Play later
Lists
Like
Liked
33:05Got a question or comment? Message us here! Following BSides Oklahoma where Tanner gave an 8 hour training on the basics of penetration testing, Tanner and Keelan give advice on how to present red team/pen test training... specifically how to make the trainings not suck. Sponsored by AFCyberAcademy.com. Support the show Watch full episodes at youtu…
…
continue reading
1
Rob Fried's Award-Winning Approach To Digital Forensics
1:01:39
1:01:39
Play later
Play later
Lists
Like
Liked
1:01:39Hosts Si and Desi welcome back Robert Fried, winner of the Top Professional Investigator award. Rob discusses his new book, 'Forensic Data Collection 2.0,' and shares insights on the evolving landscape of digital forensics. The conversation explores the importance of documentation in forensic investigations, balancing technical skills with human in…
…
continue reading
1
Episode 85: Is SANS the overpriced dinosaur of cybersecurity training?
43:24
43:24
Play later
Play later
Lists
Like
Liked
43:24Got a question or comment? Message us here! On this week's Secure AF podcast, Tanner poses a controversial question: is SANS the overpriced dinosaur of cybersecurity training? The answer is not a simple one. Listen in as Tanner and CISO Jonathan Kimmitt go in depth on the pros and cons of different security certifications such as Offensive Security…
…
continue reading
1
Protecting Investigators: Dr. Michael Bourke On Building A Healthier DFIR Community
48:59
48:59
Play later
Play later
Lists
Like
Liked
48:59Dr Michael Bourke joins the Forensic Focus Podcast to discuss the psychological impact of investigating internet crimes against children and how organizations can better support digital forensic investigators' mental health. As a distinguished clinical psychologist and researcher, Dr Bourke shares powerful insights from his extensive work in this f…
…
continue reading
1
DFIR In 2025 – AI, Smart Devices And Investigator Well-Being
1:01:16
1:01:16
Play later
Play later
Lists
Like
Liked
1:01:16Si and Desi kick off 2025 with a deep dive into critical trends shaping digital forensics. They tackle pressing challenges such as AI-driven threats, including deepfakes and AI-generated images, and examine the security risks associated with connected devices. The discussion also explores the ongoing impact of the pandemic on mental health, remote …
…
continue reading
1
Episode 84: New Years Cyber Resolutions Part 2
52:37
52:37
Play later
Play later
Lists
Like
Liked
52:37Got a question or comment? Message us here! As we step into the new year, it's essential to reinforce our defenses against cyber threats. Join Jonathan Kimmitt and Todd Wedel for part 2 of their discussion of cyberresolutions. Their list includes: - **Data Inventory**: Know your data—what, where, and who has access. Regular audits are a must! - **B…
…
continue reading
1
Inside The Minds Of CSAM Investigators With Prof. Patrick Brady
1:14:02
1:14:02
Play later
Play later
Lists
Like
Liked
1:14:02Professor Patrick Brady, a criminal justice and criminology professor at the University of Colorado Colorado Springs, joins the Forensic Focus Podcast to share his research on the mental health challenges faced by digital forensic investigators, particularly those handling child sexual abuse material (CSAM) cases. Drawing from personal experiences …
…
continue reading