Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
…
  continue reading
Alias Cybersecurity Podcasts
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
  continue reading

1
CAPTCHA Con: Hackers' Evolving ClickFix Malware Trap
7:50
7:50
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
7:50Got a question or comment? Message us here! “I’m not a robot.” 🤖 Hackers are exploiting fake “I’m not a robot” CAPTCHA pages to deliver malware. Host Andrew Hickman breaks down how this ClickFix attack uses social engineering to steal data and evade detection. Tune in to learn key defense tactics and how to keep your team protected. Support the sho…
…
  continue reading

1
RondoDox Botnet Expansion: The Shotgun Approach to IoT Exploitation
7:19
7:19
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
7:19Got a question or comment? Message us here! This week on the #SOCBrief, Andrew breaks down RondoDox, a rapidly growing botnet campaign taking aim at routers, DVRs, and IoT devices worldwide. With over 50 vulnerabilities across 30+ vendors, this “shotgun” exploitation strategy is fueling massive DDoS and crypto-mining attacks. Support the show Watch…
…
  continue reading

1
Obscura Ransomware: Unmasking a Stealthy New Threat ⚠️
12:25
12:25
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
12:25Got a question or comment? Message us here! In this week’s #SOCBrief, Hickman and Peters break down Obscura ... a new ransomware variant making waves with aggressive evasion tactics, process terminations, and domain controller targeting. We cover what’s known so far, the risks it poses to businesses, and the key defenses every SOC should prioritize…
…
  continue reading

1
🛡️ Pen Test Potential: How Organizations Are Missing Out on Fortifying the SOC 🛡️
20:08
20:08
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
20:08Got a question or comment? Message us here! What’s the real difference between a penetration test and a red team engagement, and how can each benefit your SOC? In this episode, Andrew is joined by Tanner, to unpack how pentests uncover vulnerabilities, how red teams stress-test defenders, and why every organization should be leveraging these exerci…
…
  continue reading
By Alias Cybersecurity
…
  continue reading
In this final episode of The Lockdown, I reflect on the journey of the podcast, and explaining why I’m redirecting my energy to other projects. I discuss the importance of practical privacy measures, measures over an ‘all-or-nothing’ approach, as well as sharing my thoughts on threat modeling, and address several listener questions about privacy to…
…
  continue reading

1
🚨 Ransomware Rising: Variants, Tactics, and Defenses in 2025 🚨
7:29
7:29
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
7:29Got a question or comment? Message us here! Ransomware is evolving faster than ever, from double extortion tactics to lightning-fast attack chains. In this episode, we break down how these threats work, why every organization is a target, and the layered defenses SOCs can use to detect and stop attacks early. Support the show Watch full episodes at…
…
  continue reading

1
💢 FileFix Fiasco 💢 Steganography's Stealthy StealC Drop
5:53
5:53
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
5:53Got a question or comment? Message us here! In this episode of The #SOCBrief, we break down the rising FileFix attack, a new social engineering technique using steganography to deliver info-stealing malware. Learn how attackers disguise malicious PowerShell commands, the risks this poses for browsers, messengers, and crypto wallets, and the proacti…
…
  continue reading

1
Monitoring the Dark Web for Leaked Data in DFIR
6:28
6:28
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
6:28Got a question or comment? Message us here! 🔎 This episode of The #SOCBrief dives into the world of dark web monitoring in digital forensics and incident response. Learn why leaked credentials are a top threat, how to safely detect exposures, and what steps SOC teams can take to stay proactive. Support the show Watch full episodes at youtube.com/@a…
…
  continue reading

1
Mastering Incident Response: Essential for SOC Success
8:41
8:41
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
8:41Got a question or comment? Message us here! 💡 This week on The SOC Brief, we’re breaking down incident response (IR) ... why it’s essential, how to build a strong plan, and what SOC teams can do to turn chaos into control. From preparation and containment to recovery and lessons learned, learn how a solid IR strategy saves time, money, and reputati…
…
  continue reading

1
033 - Black Mirror - Is the UK's Surveillance State Coming to America?
38:14
38:14
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
38:14In this episode, I share news from my recent trip to the UK, noticing how it seems to have reached the epic proportions of a Black Mirror episode; from the absurd TV licensing program to the new Digital ID Brit cards that will track your behavior. I also explore how the UK may be serving as a testing ground for new levels of behavioral surveillance…
…
  continue reading
Got a question or comment? Message us here! Fresh off the chaos of DEF CON 33, Tanner, Hickman, and Will break down the four-day hacker conference, from the eye-opening hacker villages and mind-bending talks to Hickman’s clutch CTF victory and Will’s bold dive into the Social Engineering Community’s Vishing Competition. No sleep, all signal. Suppor…
…
  continue reading

1
⚠️ Crypto24 ⚠️ Ransomware: Bypassing EDR and Bolstering Defenses
8:22
8:22
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
8:22Got a question or comment? Message us here! In this episode, we break down the emerging Crypto24 ransomware attacks that use living-off-the-land techniques to bypass EDR. We’ll explore how these attacks unfold and the defensive strategies SOCs and organizations can use, like layered security, enhanced monitoring, and rapid response, to stay ahead o…
…
  continue reading

1
🚨 Gone Vishing: The Recent Surge of Vishing Attacks
10:50
10:50
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
10:50Got a question or comment? Message us here! This week, we’re unpacking the phishing wave hitting SaaS platforms ... from social engineering to OAuth abuse and AI voice spoofing. Learn why people remain the #1 attack vector and how to stay one step ahead. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcas…
…
  continue reading

1
032 - No Salt Required: Listener Questions Before the Break
21:40
21:40
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
21:40In this episode I address listener feedback and questions, from clarifying my stance on the “Tea” controversy to sharing practical tips from the community about Privacy.com workarounds. This episode covers some loose ends before I take a brief hiatus. I also discuss why I won’t be at Black Hat this year, share thoughts on minimalism versus practica…
…
  continue reading
Got a question or comment? Message us here! On this episode of the #SOCBrief, we break down attacks on SonicWall firewalls. A wave of ransomware, possibly exploiting zero-day vulnerabilities, is compromising even fully patched systems. Learn how SOCs can respond fast and stay ahead. Support the show Watch full episodes at youtube.com/@aliascybersec…
…
  continue reading

1
031 - When Privacy Tools Betray You, Safety Apps That Dox and Revoked Anonymous Payments
54:23
54:23
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
54:23In this episode, I discuss the challenges facing privacy-focused payment solutions like Privacy.com, exploring alternatives and the troubling rise of KYC requirements across the industry. I dive deep into the Switzerland privacy crisis that’s forcing Proton to consider relocating their infrastructure, and what this means for encrypted email provide…
…
  continue reading

1
Spilling the Tea: What Happens When Apps Launch Without Locking Down Security ☕
13:23
13:23
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
13:23Got a question or comment? Message us here! This week’s SOC Brief unpacks how a misconfigured cloud bucket exposed 72,000+ user images from the Tea app, complete with geolocation metadata and real IDs. From national security risks to doxxing fallout, we break down what went wrong and what your security team must do to avoid the same mistakes. Suppo…
…
  continue reading
Got a question or comment? Message us here! A critical zero-day (CVE-2025-53770) is actively targeting on-premises SharePoint servers AND it’s already been used to compromise over 100 organizations. In this #SOCBrief, Andrew and Tanner break down how the exploit works and what steps your team should take now. If your SharePoint instance is public-f…
…
  continue reading
Got a question or comment? Message us here! In this week’s #SOCBrief, we break down why offboarding policies are ABSOLUTELY critical for security teams. Overlooked items from abandoned accounts to old VPN access can leave backdoors wide open. Learn how SOCs monitor, contain, and shut down lingering access, and why communication between HR, IT, and …
…
  continue reading

1
Aligned by Design: CISO x Legal in Practice - Episode 92
54:40
54:40
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
54:40Got a question or comment? Message us here! 🎙️ NEW! Aligned by Design: CISO x Legal Introducing! A fresh new series that explores the intersection of cybersecurity and legal strategy. Join Alias CISO Jonathan Kimmitt and privacy attorney Tom Vincent as they unpack what happens when technology, compliance, risk, and law collide. From real-world expe…
…
  continue reading

1
030 - Info Stealers, GrapheneOS Drama, and Why Video Games and Anti-Virus Are Spyware
52:42
52:42
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
52:42In this episode, I address listener feedback and corrections regarding use of public Wi-Fi, MAC addresses, and aliases. I dive deep into the nuances of MAC address randomization on GrapheneOS versus Apple’s private Wi-Fi addresses, explaining why GrapheneOS offers superior privacy protection. I discuss the real threats of public Wi-Fi in 2025 (hint…
…
  continue reading
Got a question or comment? Message us here! Hackers just unleashed the largest DDoS attack in history, peaking at 7.3 Tbps and 4.8 billion packets per second. In just 45 seconds, it pummeled its target with the data equivalent of over 9,000 HD movies, a powerful reminder of how far attack capabilities have evolved. 🎧 Tune in to today’s SOC Brief fo…
…
  continue reading

1
Secure AF SOC Brief #5 - Chrome CVE-2025-6554
9:04
9:04
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
9:04Got a question or comment? Message us here! In this episode of The SOC Brief, the team unpacks a critical zero-day vulnerability in Google Chrome (CVE-2025-6554) that’s being actively exploited. Learn how attackers use type confusion bugs to hijack browser memory, what makes this exploit so dangerous, and why it’s targeting high-value organizations…
…
  continue reading

1
Ep 91: The Engineers React to Breach News
45:27
45:27
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
45:27Got a question or comment? Message us here! In this episode, our security engineers break down the latest cybersecurity headlines, from the real scoop behind the “16 billion password” leak to the rise of hacker groups like Scattered Spider. 🕷️ We discuss how attackers bypass MFA, why exploited data keeps resurfacing, and what organizations can do t…
…
  continue reading

1
029 - Minimize not Militarize and Avoiding Surveillance with GrapheneOS
54:26
54:26
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
54:26In this episode, I explore the difference between the military mindset and the more stealth approach of minimization in cybersecurity. I share the results from the Ghost in the Source Capture the Flag (CTF) challenge, revealing how the winners cracked the AES encryption using dictionary attacks, keyword harvesting and the cipher tool hidden in robo…
…
  continue reading
Got a question or comment? Message us here! In this episode of The SOC Brief, Andrew and Dax dive into the world of false positives – those misleading alerts that flood security teams with noise. They discuss how misconfigurations, lack of context, and overly sensitive rules can lead to alert fatigue. With practical tips on investigation, tuning to…
…
  continue reading
Got a question or comment? Message us here! 🔐 New SOC Brief Episode: Tracing the Breadcrumbs Cybercriminals always leave a trail, if you know where to look. In this episode, we break down Indicators of Compromise (IOCs) and how they help security teams detect and respond to threats faster. 🎯 What we cover: • Real-world incident reports & proof of c…
…
  continue reading

1
Episode 90: Global Wars - Cyber Strikes Back
50:11
50:11
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
50:11Got a question or comment? Message us here! 🎙️ New Secure AF Episode: Global Wars: Cyber Strikes Back 🌐⚔️ How does global news shape cybersecurity operations? In this episode, we dig into how real-world events influence the threats we track, the way we respond, and the tools we use for social engineering/pentesting. 🔍 We talk threat intel, evolving…
…
  continue reading

1
028 - Silence & Stealth - Mailbox, Email & Anti-KYC Phone Strategies
45:28
45:28
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
45:28In this episode, I discuss three key strategies for maintaining privacy and security across your physical mailbox, email, and phone. I discuss the growing Matrix community, explore alternative mailing solutions using co-working spaces, detail a four-tier email strategy, and examine the concerning spread of Flock ALPR cameras. I also share insights …
…
  continue reading
Got a question or comment? Message us here! 🎙️ This Week on the SOC Brief: Join Andrew and Dax as they dive into the emergence of a new threat actor known as SafePay 🕵️♂️💻. They break down the latest tactics, techniques, and procedures observed from this group, offering insights into how organizations can stay vigilant. From detection strategies 🔍…
…
  continue reading

1
027 - Stop Playing the Game, Join The New Matrix Privacy Community
44:16
44:16
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
44:16In this episode, I discuss breaking free from the Apple ecosystem, the dangers of social media oversharing, and introduce our new Matrix community. I also cover the upcoming capture the flag challenge, share thoughts on the OSINT Defense & Security Framework progress, and rant about security theater at airports and online services that block VPNs. …
…
  continue reading

1
Episode 89: Meet the Alias SOC - on the Battlefront of Cybersecurity
29:57
29:57
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
29:57Got a question or comment? Message us here! 🔐 Inside the SOC 🔐 Go behind the scenes with the Alias Security Operations Center (SOC) team to learn how they operate, collaborate, and tackle today’s top cyber threats ⚔️. Find out why a SOC matters, and how organizations can still leverage SOC insights and support, even without one in-house 💼. 🎧 Tap in…
…
  continue reading
Got a question or comment? Message us here! Welcome to 🎙️The SOC Brief 🎙️our byte-sized mini series bringing you weekly updates straight from the Security Operations Center. In this episode, Andrew, Dax, and Dylan break down what life in the SOC looks like, the rise of malvertising, and the emerging threat known as Recipe Lister, discussing how it’…
…
  continue reading
In this brief episode between travels, I announce the “Ghost in the Source” capture the flag challenge, a cryptographic hunt on my website starting June 21st, 2025. At the end of June I will pick 3 lucky winners which will receive a 6-month TryHackMe subscription voucher. I also provide an update on our new Matrix community. In this week’s episode:…
…
  continue reading

1
025 - AI Privacy Concerns with ChatGPT and Claude
38:36
38:36
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
38:36In this episode, I explore the privacy implications of using AI apps like ChatGPT and Claude on mobile devices. I discuss why ChatGPT’s requirement for Google Play Store login and audio recording storage led me to Claude on my GrapheneOS device. I also cover my daily app setup, Windows telemetry blocking with SimpleWall, macOS privacy with Little S…
…
  continue reading

1
024 - Minimize What Can Be Known with the OSINT Defense & Security Framework (OSDF)
42:20
42:20
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
42:20In this episode, I discuss what has been keeping me away from the mic, the Open Source Intelligence Defense and Security Framework (ODSF), and share updates on privacy topics including browser security, autonomous taxis, airport security cameras, and managing cryptocurrency. I also address listener questions about anonymous SIM cards and creating s…
…
  continue reading

1
Episode 88: Two-Time CISO Showdown Champion (and Chad)
46:05
46:05
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
46:05Got a question or comment? Message us here! Alias Cybersecurity Jonathan Kimmitt is joined by Chad Kliewer to discuss the exciting CISO Showdown competition between Chief Information Security Officers (CISOs) at BSidesOK. They delve into the history of the showdown, how it works, and highlight significance of the championship belt. Tune in as they …
…
  continue reading

1
Episode 87: Securing Patient Data with HIPAA's New Security Rules
53:31
53:31
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
53:31Got a question or comment? Message us here! Alias Cybersecurity CISO Jonathon Kimmitt is joined by Derrac Page to discuss the new changes to the HIPAA security rules being set in place this year. Listen as they go over many of the biggest points raised from the 660+ page guidelines and discuss ways that HIPAA Privacy Officers and HIPAA Security Off…
…
  continue reading

1
Episode 86: How to make your pen test training not suck
33:05
33:05
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
33:05Got a question or comment? Message us here! Following BSides Oklahoma where Tanner gave an 8 hour training on the basics of penetration testing, Tanner and Keelan give advice on how to present red team/pen test training... specifically how to make the trainings not suck. Sponsored by AFCyberAcademy.com. Support the show Watch full episodes at youtu…
…
  continue reading

1
Episode 85: Is SANS the overpriced dinosaur of cybersecurity training?
43:24
43:24
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
43:24Got a question or comment? Message us here! On this week's Secure AF podcast, Tanner poses a controversial question: is SANS the overpriced dinosaur of cybersecurity training? The answer is not a simple one. Listen in as Tanner and CISO Jonathan Kimmitt go in depth on the pros and cons of different security certifications such as Offensive Security…
…
  continue reading

1
023 - Apple Removes ADP in the UK, the Privacy Implications and Listener Q&A
30:36
30:36
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
30:36In this episode, we dive into Apple’s latest privacy retreat with the removal of Advanced Data Protection (ADP) for iCloud in the UK. We break down why Apple made this move, how ADP works, and what it means for users who care about encryption and data security. If you’re in the UK and using Apple’s ecosystem, this episode is a must-listen as I cove…
…
  continue reading

1
022 - Deep Dive into Session Private Messenger with Co-Founder Kee Jefferys
1:10:14
1:10:14
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:10:14In this week’s episode, we take a deep dive into Session, a private messaging app, with its co-founder Kee Jefferys. We discuss the philosophy behind Session, its technical architecture, and the broader implications of privacy in a world increasingly hostile to anonymous communication. Kee shares insights on the importance of decentralized networks…
…
  continue reading

1
Episode 84: New Years Cyber Resolutions Part 2
52:37
52:37
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
52:37Got a question or comment? Message us here! As we step into the new year, it's essential to reinforce our defenses against cyber threats. Join Jonathan Kimmitt and Todd Wedel for part 2 of their discussion of cyberresolutions. Their list includes: - **Data Inventory**: Know your data—what, where, and who has access. Regular audits are a must! - **B…
…
  continue reading

1
021 - Digital Minimalism and Why Your Messages Aren't Really Private
41:27
41:27
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
41:27In this week's episode we dive deep into both the psychological and privacy implications of social media apps. I reflect on my observations during recent travels, and explore how social media platforms are distorting human connections while simultaneously collecting vast amounts of personal data. The episode also tackles the technical aspects of em…
…
  continue reading

1
Episode 83: New Years Cyber Resolutions Part 1
37:34
37:34
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
37:34Got a question or comment? Message us here! 🚀 Kickstart 2025 with Cybersecurity Resolutions! 🔐 In our latest podcast episode, Todd and Jonathan discuss crucial strategies for a secure year ahead. Tune in for more insights and make this year your most secure yet! 🎧✨ #Cybersecurity #AI #Secure2025 Support the show Watch full episodes at youtube.com/@…
…
  continue reading
This week on The Lockdown, The Practical Privacy & Security Podcast, we’re kicking off the new year with reflections, updates, and a deep dive into key privacy issues that are shaping 2025. From privacy settings on iOS and GrapheneOS, to AI assistants and their potential privacy pitfalls, this episode covers practical advice, insights, and solution…
…
  continue reading

1
019 - A Conversation with Luke Mulks from Brave Software
1:01:44
1:01:44
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:01:44In this episode I speak with Luke Mulks, who is the VP of Business Operations at Brave Software. We discuss the privacy concerns over traditional web-based ads, and why Brave is offering a privacy-first alternative. Show Links: Brave Software: https://brave.com/podcast/ The Brave Technologist Podcast: https://brave.com/podcast/ "Well who's gonna mo…
…
  continue reading

1
Episode 82: Leaving It All On The Table - The What, How, and Why of Tabletop Exercises
43:37
43:37
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
43:37Got a question or comment? Message us here! Ready for an IR? You may have controls, policies, and procedures, but how do you know they exist? Are robust? Followed and adhered to? Join Jonathan Kimmitt and Alexandria Hendryx as they discuss what a tabletop is, how to conduct one effectively, and why they matter to your organization to prevent and pr…
…
  continue reading

1
018 - Back to the Basics and not Overthinking Privacy
49:12
49:12
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
49:12In this episode, we go back to the basics as I discuss what I would do today if I were starting from scratch. It begins with deleting social media accounts, especially Facebook. Additionally, we have an update from Optery in response to listener feedback. We discuss tools like LibreWolf, Brave, and GrapheneOS, and compare privacy approaches for mob…
…
  continue reading
 
 
 
