Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Defense Forensics Podcasts

show episodes
 
Join Defense Forensic's Rob Walensky in this week's episode of "Digital Forensics, Redefined." As a 20-year veteran of law enforcement, Rob has seen it all, from near-death experiences with alligators to nationwide drug busts. Using digital forensics, he solved thousands of cases and still attends court for hundreds more. The life of a law enforcement agent never stops. Tune in each week as he brings on guests to discuss more of their digital forensic findings while reminiscing on past lives ...
  continue reading
 
Artwork
 
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
  continue reading
 
The AI in Business Podcast is for non-technical business leaders who need to find AI opportunities, align AI capabilities with strategy, and deliver ROI. Each week, Emerj research staff and journalists interview top AI executives from Fortune 2000 firms and unicorn startups - uncovering trends, use-cases, and best practices for practical AI adoption. Visit our advertising page to learn more about reaching our executive audience of Fortune 2000 AI adopters: https://emerj.com/advertise
  continue reading
 
Artwork

1
Bulletproof

Steve Stanulis

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The ultimate celebrity crime podcast where Hollywood scandals meet real detective work. Host Steve Stanulis - former NYPD officer, celebrity bodyguard, and private investigator - exposes celebrity secrets and entertainment industry crime stories you've never heard before. Unlike typical true crime podcasts, Bulletproof delivers active celebrity crime investigations happening right now. Steve's unprecedented access to celebrity inner circles, combined with 20+ years of detective experience, b ...
  continue reading
 
Artwork

4
The Digital Forensics Files Podcast

Tyler Hatch, B.A., LL.B.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Discussions with industry professionals and lawyers who use our services on the latest developments and news in digital forensics, digital evidence, privacy and data security law and cyber security/incident response. Hosted by Tyler Hatch, B.A., LL.B., CCFE CMFE, a former lawyer and the founder of DFI Forensics (https://dfiforensics.com), a Canadian digital forensics and incident response firm.
  continue reading
 
Artwork

251
The Michael W Lanier’s Podcast

michaelwlanierattorney

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Michael W Lanier Attorney retrofitted his entire operation to meet the needs of the North Florida community through loan modifications, foreclosure defense, loan forensics, credit repair, and credit restarts. In 1998, Michael W Lanier attend law school at night while working as a mortgage loan officer for some of the country’s most prestigious banks and lenders. He worked as a mortgage professional for several years, as well as conducting real estate closings and settling title issues.
  continue reading
 
Artwork

901
The Defense Never Rests

Morgan & Akins PLLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
We are on a mission to help Lawyers, Risk Managers and Claims professionals stay on top of the hottest legal trends and issues impacting their day-to-day. The Defense Never Rests brings together guests from varying backgrounds and opposing views to discuss issues unique to the defense side of civil litigation. We aren't citing case law or speaking legalese here. We're having real discussions, sometimes serious and sometimes not, in an entertaining way that is both educational AND fun!
  continue reading
 
Artwork

1
Cyber Coffee Hour

Dr. Joseph J. Burt-Miller Jr. and Alfredzo Nash

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Dr. Joseph and Alfredzo Nash discuss various cybersecurity related topics, trends and the coffee that keeps them going throughout the Cybersecurity industry.
  continue reading
 
Hidden Threads uncovers the untold true crime stories behind private investigators' most chilling and high-stakes cases. Each episode exposes hidden connections, dark secrets, and shocking twists—from unsolved murders and missing persons to betrayals that span decades—while revealing the rare political threads that quietly shape the shadows of justice. Available on ALL Streaming Platforms Spotify • Apple • YouTube • Amazon
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
Artwork
 
Wait Just an Infosec is a weekly hour-long cybersecurity-focused broadcast produced by SANS Institute, streamed live on LinkedIn and YouTube, Tuesdays at 10am ET and available to listen to in podcast format on Wednesdays. Our hosts and invited guests are a rotating lineup of SANS faculty members and experts across all infosec domains – some of the brightest minds in cybersecurity, with decades of experience as practitioners. Each week will offer thought-provoking, rich content for a full ran ...
  continue reading
 
Artwork

1
Legal Rights Radio (LRR)

David Zwanetz & The Law Firm of Shapiro Zwanetz & Lake (SZL). Marylan

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Legal Rights Radio is a Podcast focusing on all things cops and robbers and Criminal law. From, "when the police search me?" to "I was not read my rights," LRR is a weekly show, by David Zwanetz, discussing the ins and outs of the morbidly curious area of Criminal Law in Maryland with, of course, a Defense oriented spin.
  continue reading
 
Artwork

1
True Crime Tonight

iHeartPodcasts

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
If you eat, sleep, and breathe true crime, TRUE CRIME TONIGHT is serving up your nightly fix. Five nights a week, KT STUDIOS & iHEART RADIO invite listeners to pull up a seat for an unfiltered look at the biggest cases making headlines, celebrity scandals, and the trials everyone is watching. With a mix of expert analysis, hot takes, and listener call-ins, TRUE CRIME TONIGHT goes beyond the headlines to uncover the twists, turns, and unanswered questions that keep us all obsessed—because, at ...
  continue reading
 
Welcome to The Geiser Files, the true crime podcast of Rachael Geiser, a 26-year veteran criminal defense investigator, where she walks you through her most unforgettable, and challenging investigations. Each week, Rachael pulls back the curtain on the painstaking work of a defense investigation—tracking down overlooked witnesses, re-examining evidence, and uncovering the hidden facts that never make the news. From life-or-death murder trials to wrongful convictions, you'll hear the unfilter ...
  continue reading
 
Cyber resilience is the ultimate IT goal for every business. Twice per month, join Assurance IT as they discuss various cyber security topics with IT leaders to help you get closer to your cyber security goals. Each episode includes best practices that can be applied to your enterprise. Cyber resilience is a collaborative effort; let's work toward it together!
  continue reading
 
The Suitcase Murder: The Trial of Sarah Boone takes you inside the courtroom for one of the most gripping murder trials of our time. Sarah Boone, accused of the shocking and tragic death of her boyfriend, who was found suffocated inside a suitcase, faces a high-stakes battle for justice. Each episode brings you live trial coverage, expert analysis, and in-depth discussions with legal experts, psychologists, and true crime aficionados. Whether you’re following the trial day by day or diving i ...
  continue reading
 
Loading …
show series
 
How to Collect Memory-Only Filesystems on Linux Systems Getting forensically sound copies of memory-only file systems on Linux can be tricky, as tools like dd do not work. https://isc.sans.edu/diary/How%20to%20collect%20memory-only%20filesystems%20on%20Linux%20systems/32432 Microsoft Azure Front Door Outage Today, Microsoft s Azure Front Door servi…
  continue reading
 
SANS Stormcast Thursday, October 30th, 2025: Memory Only Filesystems Forensics; Azure Outage; docker-compose patch How to Collect Memory-Only Filesystems on Linux Systems Getting forensically sound copies of memory-only file systems on Linux can be tricky, as tools like "dd" do not work. https://isc.sans.edu/diary/How%20to%20collect%20memory-only%2…
  continue reading
 
Got a question or comment? Message us here! “I’m not a robot.” 🤖 Hackers are exploiting fake “I’m not a robot” CAPTCHA pages to deliver malware. Host Andrew Hickman breaks down how this ClickFix attack uses social engineering to steal data and evade detection. Tune in to learn key defense tactics and how to keep your team protected. Support the sho…
  continue reading
 
MK True Crime contributors Mark Geragos, Matt Murphy, and Phil Holloway join the show to discuss the judge in the Tyler Robinson case ruling that the alleged Charlie Kirk shooter will be allowed to wear civilian clothing during all of his upcoming court hearings, whether this is a win for the defense or the state, Abby Zwerner, a teacher shot by a …
  continue reading
 
It’s Talkback Tuesday, and we’re responding to your messages on everything from the controversial 2011 death of Ellen Greenberg, to internet crimes and keeping children safe, to the disturbing case of the “Toy Box Killer.” Baudi traumatizes Courtney and Taha by explaining what “phroggers” are. Tune in for all the details. See omnystudio.com/listene…
  continue reading
 
Phishing with Invisible Characters in the Subject Line Phishing emails use invisible UTF-8 encoded characters to break up keywords used to detect phishing (or spam). This is aided by mail clients not rendering some characters that should be rendered. https://isc.sans.edu/diary/A%20phishing%20with%20invisible%20characters%20in%20the%20subject%20line…
  continue reading
 
SANS Stormcast Wednesday, October 29th, 2025: Invisible Subject Character Phishing; Tomcat PUT Vuln; BIND9 Spoofing Vuln PoC Phishing with Invisible Characters in the Subject Line Phishing emails use invisible UTF-8 encoded characters to break up keywords used to detect phishing (or spam). This is aided by mail clients not rendering some characters…
  continue reading
 
NBA stars Chauncey Billups and Terry Rozier are among 34 people charged in a multi-state Mafia betting ring. DNA evidence leads to arrests in the case of the missing Louvre crown jewels, and ex-deputy Sean Grayson testifies in his trial for the murder of Sonya Massey. Plus, a deep dive into Sean “Diddy” Combs’s prison release, the case against the …
  continue reading
 
Today's guest is Scott Bradley, VP of AI and Innovation at Novartis. As the eighth largest pharmaceutical company in the world by revenue, Novartis' medicines reach millions of people worldwide. Their focus on the discovery and development of novel, breakthrough treatments sees them reimagining not just the delivery of said treatments, but the prac…
  continue reading
 
Send us a text In this gripping episode of Hidden Threads, hosts Macky Outlaw and Jus dive into the chilling case of Damien McDaniel, the 23-year-old Fairfield man accused of being Birmingham, Alabama's deadliest hitman, tied to 18 murders, including two mass shootings and the tragic deaths of firefighter Jordan Melton and a pregnant woman with her…
  continue reading
 
Bytes over DNS Didiear investigated which bytes may be transmitted as part of a hostname in DNS packets, depending on the client resolver and recursive resolver constraints https://isc.sans.edu/diary/Bytes%20over%20DNS/32420 Unifi Access Vulnerability Unifi fixed a critical vulnerability in it s Access product https://community.ui.com/releases/Secu…
  continue reading
 
SANS Stormcast Tuesday, October 28th, 2025: Bytes over DNS; Unifi Access Vuln; OpenAI Atlas Prompt Injection Bytes over DNS Didiear investigated which bytes may be transmitted as part of a hostname in DNS packets, depending on the client resolver and recursive resolver constraints https://isc.sans.edu/diary/Bytes%20over%20DNS/32420 Unifi Access Vul…
  continue reading
 
It’s Scientific Sunday, and we're joined by forensic death investigator and host of the podcast Body Bags, Joseph Scott Morgan, to discuss Bryan Kohberger’s unsealed witness list, “experimental” wounds, Ellen Greenberg’s alleged suicide, the Delphi murders, and more. Joseph walks through how forensic investigators determine time of death at a crime…
  continue reading
 
Bilingual Phishing for Cloud Credentials Guy observed identical phishing messages in French and English attempting to phish cloud credentials https://isc.sans.edu/diary/Phishing%20Cloud%20Account%20for%20Information/32416 Kaitai Struct WebIDE The binary file analysis tool Kaitai Struct is now available in a web only version https://isc.sans.edu/dia…
  continue reading
 
SANS Stormcast Monday, October 27th, 2025: Bilingual Phishing; Kaitai Struct WebIDE Bilingual Phishing for Cloud Credentials Guy observed identical phishing messages in French and English attempting to phish cloud credentials https://isc.sans.edu/diary/Phishing%20Cloud%20Account%20for%20Information/32416 Kaitai Struct WebIDE The binary file analysi…
  continue reading
 
MK True Crime contributors Ashleigh Merchant, Jonna Spilbor, and Dave Aronberg join the show to discuss Bryan Kohberger and his attorney’s refusing to pay additional restitution to his victims’ families, Jake Haro, father of missing baby Emmanuel Haro, pleads guilty to second-degree murder, Kristina Chambers unorthodox defense of blaming a deadly c…
  continue reading
 
Covering the arrest of a suspect in the murder of 23-year-old Kada Scott, whose remains were found near an abandoned school; Florida’s Attorney General targets Roblox, calling the platform a hotspot for child predators; and a USC Ph.D. student faces charges for drugging and sexually assaulting multiple women. Plus, Alan Wieder joins to discuss his …
  continue reading
 
Infostealer Targeting Android Devices This infostealer, written in Python, specifically targets Android phones. It takes advantage of Termux to gain access to data and exfiltrates it via Telegram. https://isc.sans.edu/diary/Infostealer%20Targeting%20Android%20Devices/32414 Attackers exploit recently patched Adobe Commerce Vulnerability CVE-2025-542…
  continue reading
 
SANS Stormcast Friday, October 24th, 2025: Android Infostealer; SessionReaper Exploited; BIND/unbound DNS Spoofing fix; WSUS Exploit Infostealer Targeting Android Devices This infostealer, written in Python, specifically targets Android phones. It takes advantage of Termux to gain access to data and exfiltrates it via Telegram. https://isc.sans.edu…
  continue reading
 
Dr. Jeree Spicer stops through the Cyber Coffee Hour, who masterfully blends cyberpsychology with cybersecurity strategy. From developing robust governance frameworks to her current role as a product manager, Dr. Spicer shows us how to bake security in from the start. Plus, hear about her mission with ReeTheCyberBoss to democratize digital safety e…
  continue reading
 
Send us a text In this fiery episode of Hidden Threads, Jus and I tackle the heavy labels thrown at conservatives: fascist, Nazi, white supremacist. Why do these terms get weaponized against us for simply holding traditional views? We dive into the history and true meanings of fascism, Nazism, and white supremacy, exposing how they're misused to si…
  continue reading
 
Breaking down Kohberger’s legal team surprise argument and what it could mean for the case. The Louvre reopens after a shocking jewel heist, the murder trial of former Sangamon County deputy Sean Grayson is underway — he stands accused of the fatal shooting of Sonya Massey — and a beloved Texas teacher is found dead under bizarre circumstances. In …
  continue reading
 
Send us a text In this eye-opening episode of Hidden Threads, hosts Macky Outlaw and Jus peel back the layers on Thomas Crooks—the 20-year-old loner who nearly assassinated President Trump at a Butler, Pennsylvania rally on July 13, 2024, grazing his ear, killing bystander Corey Comperatore, and wounding two others before being gunned down by Secre…
  continue reading
 
Although a lot of medieval history is murky, the whys and wherefores – not to mention the timeline – of the Hundred Years’ War are firmly nailed down. Or are they? This week, Danièle speaks with Michael Livingston about why the Hundred Years’ War should actually be called the Two Hundred Years’ War, what actually touched off the conflict, and why w…
  continue reading
 
webctrl.cgi/Blue Angel Software Suite Exploit Attempts. Maybe CVE-2025-34033 Variant? Our honeypots detected attacks that appear to exploit CVE-2025-34033 or a similar vulnerability in the Blue Angle Software Suite. https://isc.sans.edu/diary/webctrlcgiBlue+Angel+Software+Suite+Exploit+Attempts+Maybe+CVE202534033+Variant/32410 Oracle Critical Patch…
  continue reading
 
SANS Stormcast Thursday, October 23rd, 2025: Blue Angle Software Exploit; Oracle CPU; Rust tar library vulnerability. webctrl.cgi/Blue Angel Software Suite Exploit Attempts. Maybe CVE-2025-34033 Variant? Our honeypots detected attacks that appear to exploit CVE-2025-34033 or a similar vulnerability in the Blue Angle Software Suite. https://isc.sans…
  continue reading
 
Got a question or comment? Message us here! This week on the #SOCBrief, Andrew breaks down RondoDox, a rapidly growing botnet campaign taking aim at routers, DVRs, and IoT devices worldwide. With over 50 vulnerabilities across 30+ vendors, this “shotgun” exploitation strategy is fueling massive DDoS and crypto-mining attacks. Support the show Watch…
  continue reading
 
MK True Crime contributors Matt Murphy, Dave Aronberg, and Mark Geragos join the show to discuss the appeal filed by Diddy and his lawyers, rumors of a presidential commutation for the rapper that could happen as soon as this week, the remains of missing Philadelphia beauty queen Kada Scott have been found and the maddening reasons behind why the s…
  continue reading
 
It’s Talkback Tuesday, and we're replying to your messages on everything from Jeffrey Epstein to Mark Sanchez—and taking your case and documentary suggestions. Plus, a caller brings up an interesting theory about our very own Courtney Armstrong. Tune in for all the details. See omnystudio.com/listener for privacy information.…
  continue reading
 
What time is it? Accuracy of pool.ntp.org. How accurate and reliable is pool.ntp.org? Turns out it is very good! https://isc.sans.edu/diary/What%20time%20is%20it%3F%20Accuracy%20of%20pool.ntp.org./32390 Xubuntu Compromise The Xubuntu website was compromised last weekend and served malware https://floss.social/@bluesabre/115401767635718361 Squid Pro…
  continue reading
 
SANS Stormcast Wednesday, October 22nd, 2025: NTP Pool; Xubuntu Compromise; Squid Vulnerability; Lanscope Vuln; What time is it? Accuracy of pool.ntp.org. How accurate and reliable is pool.ntp.org? Turns out it is very good! https://isc.sans.edu/diary/What%20time%20is%20it%3F%20Accuracy%20of%20pool.ntp.org./32390 Xubuntu Compromise The Xubuntu webs…
  continue reading
 
The Louvre remains shuttered after a four-minute, chainsaw-led jewel heist—breaking down what was taken and who may be behind it. The private investigator linked to the D4vd Tesla case drops major revelations; human remains have been discovered in the search for missing Philadelphia beauty queen Kada Scott; and a mother has been convicted of murder…
  continue reading
 
Today's guest is Xiong Liu, Director of Data Science and AI at Novartis. Novartis is among the world's leading pharmaceutical companies, pioneering data and advanced analytics in the pursuit of new medicines and patient outcomes. Xiong joins Emerj Editorial Director Matthew DeMello to examine how generative AI and foundation models are transforming…
  continue reading
 
Using Syscall() for Obfuscation/Fileless Activity Fileless malware written in Python can uses syscall() to create file descriptors in memory, evading signatures. https://isc.sans.edu/diary/Using%20Syscall%28%29%20for%20Obfuscation%20Fileless%20Activity/32384 AWS Outages AWS has had issues most of the day on Monday, affecting numerous services. http…
  continue reading
 
SANS Stormcast Tuesday, October 21st, 2025: Syscall() Obfuscation; AWS down; Beijing Time Attack Using Syscall() for Obfuscation/Fileless Activity Fileless malware written in Python can uses syscall() to create file descriptors in memory, evading signatures. https://isc.sans.edu/diary/Using%20Syscall%28%29%20for%20Obfuscation%20Fileless%20Activity/…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play