Digital forensics discussion for computer forensics, DFIR and eDiscovery professionals. Visit Forensic Focus at forensicfocus.com for more.
…
continue reading
Pro Digital Forensics Podcasts
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast β your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
Pro Digital Forensic Consulting is a full-service forensic data acquisition, analysis, reporting & expert witness service based in Richmond, Virginia. We service clients all over the globe in areas of litigation, professional investigation & corporate needs related to the retrieval & analysis of data. We pride ourselves on adherence to the forensic methodology & best practices. Please contact us for more information: Web: ProDigital4n6.com Email: [email protected] Phone: 804-588 ...
…
continue reading
1
End-of-Year Wrap: 2025 Threat Trends and Bold Predictions for 2026 π
7:14
7:14
Play later
Play later
Lists
Like
Liked
7:14Got a question or comment? Message us here! In this special end-of-year SOC Brief, Andrew breaks down the biggest threat-actor and ransomware trends that shaped 2025, and what cybersecurity teams should be preparing for in 2026. From AI-powered ransomware and supply-chain attacks to the growing blur between nation-state operations and cybercrime, tβ¦
…
continue reading
1
π Holiday Season Security: Preparing Your SOC for the Festive Chaos
11:02
11:02
Play later
Play later
Lists
Like
Liked
11:02Got a question or comment? Message us here! This weekβs SOC Brief dives into why the holidays are prime time for cyberattacks π from surging phishing attempts to sloppy vendor configs, alert fatigue, staffing gaps, and the seasonal spike in ransomware activity. Andrew and Dylan break down what SOCs should be watching for, how to prep, and how to stβ¦
…
continue reading
Got a question or comment? Message us here! πποΈ EPISODE 100 IS LIVE! Weβre celebrating 100 episodes of the Secure AF Podcast! This special edition features CEO Donovan Farrow and CISO Jonathan Kimmitt as they look back on the history of Alias Cybersecurity, the growth of this show, and the journey that brought us here. And we wouldnβt be here withoβ¦
…
continue reading
Si and Desi close out the year on the Forensic Focus Podcast with a wide-ranging end-of-2025 wrap-up, reflecting on how the year unfolded for the show and the DFIR community. They discuss the mental health series, guest appearances, and how everyday technologies β from streaming services to wearables β are increasingly intersecting with forensic inβ¦
…
continue reading
1
Oxygen Forensics On Smarter, Faster Remote DFIR Collections
1:07:16
1:07:16
Play later
Play later
Lists
Like
Liked
1:07:16Keith Lockhart from Oxygen Forensics joins Si and Desi on the Forensic Focus Podcast to examine how remote digital evidence collection is changing investigative workflows across DFIR, eDiscovery, and corporate investigations. Drawing on recent XiB mobile training and real-world deployments, Keith explains where remote and agent-based acquisition deβ¦
…
continue reading
1
The Reality of Stalking in a Digital Age π΅οΈββοΈβ οΈ
56:03
56:03
Play later
Play later
Lists
Like
Liked
56:03Got a question or comment? Message us here! This episode dives into one of the darkest issues cybersecurity intersects with: stalking. Kimmitt and Peters discuss real cases, modern cyberstalking tactics, privacy failures, the challenges of protective orders, and what victims can do to stay safe. If you've ever wondered how digital footprints turn iβ¦
…
continue reading
1
Special Episode: Inside Weekly Threat-Intel Briefings with a vCISO πΌ
18:06
18:06
Play later
Play later
Lists
Like
Liked
18:06Got a question or comment? Message us here! Get an inside look at how weekly threat-intel briefings really work in a mature security program. πβ‘ In this special episode, vCISO Jonathan Kimmitt breaks down how raw intel turns into real risk decisions, what trends are hitting organizations right now, and how SOC teams can brief leadership in a way thβ¦
…
continue reading
1
The Idaho Murders: From Behavioural Clues To AI's Role In Digital Forensics
56:34
56:34
Play later
Play later
Lists
Like
Liked
56:34Heather and Jared Barnhart return to the Forensic Focus Podcast for a wide-ranging conversation covering Cellebrite's growing Case-to-Closure Summit, behind-the-scenes insights from building one of the industry's toughest CTFs, and their digital forensic work on one of the most high-profile US murder cases in recent years. They share why the C2C Suβ¦
…
continue reading
1
β οΈ React2Shell Zero-Day β οΈ: Chinese Hackers Strike Within Hours
6:36
6:36
Play later
Play later
Lists
Like
Liked
6:36Got a question or comment? Message us here! A new zero-day is already under active exploitation. This weekβs SOC Brief breaks down the React2Shell vulnerability (CVE-2025-55182), how attackers moved within hours of disclosure, and what SOC teams need to do now to reduce exposure and stay ahead of fast-moving threats. ππ¨ Support the show Watch full β¦
…
continue reading
1
Tis the Season for Cybercrime: How Hackers Target Holidays π
35:41
35:41
Play later
Play later
Lists
Like
Liked
35:41Got a question or comment? Message us here! In this #SecureAF episode, Tanner and Dylan share real-world IR stories, common attack vectors, SOC fatigue during holiday PTO, and the #1 thing every organization should do before stepping away for the season. If youβve ever wondered why cyber incidents always seem to hit when everyone is off work, this β¦
…
continue reading
1
U.S.-Venezuela Tensions: Cyber Risks for American SOCs
6:32
6:32
Play later
Play later
Lists
Like
Liked
6:32Got a question or comment? Message us here! In this episode of the #SOCBrief, we dig into how world events can trigger cyber fallout that lands directly on the desks of security teams. From ransomware crews capitalizing on instability to hacktivists launching DDoS attacks and opportunistic actors going after vulnerable sectors, we talk through why β¦
…
continue reading
Got a question or comment? Message us here! π± This #SecureAF episode covers the everyday questions and concerns people have when they think something unusual is happening with their devices or accounts. Hickman and Peters talk through typical scenarios, common misunderstandings, and the foundational steps that help people regain control of their acβ¦
…
continue reading
1
FortiWeb Zero-Day: Silent Patch and Firewall Wake-Up Call π₯
6:36
6:36
Play later
Play later
Lists
Like
Liked
6:36Got a question or comment? Message us here! This weekβs #SOCBrief dives into the FortiWeb zero-day thatβs letting attackers create admin accounts with a single unauthenticated HTTP request. With exploitation spiking and Fortinet pushing out a quiet fix, SOC teams are under pressure to lock down configs, audit firewalls, and patch fast. We break dowβ¦
…
continue reading
1
The Halls: 2025 Hacker Gift Guide ππ»
26:17
26:17
Play later
Play later
Lists
Like
Liked
26:17Got a question or comment? Message us here! Weβre back with the Hacker Holiday Gift Guide, and this yearβs lineup is stacked with RF gadgets, Wi-Fi tools, red-team essentials, and quirky cyber gifts Tanner swears by. Whether youβre shopping for a pentester, a tinkerer, or someone who just loves breaking things (legally), these picks wonβt miss. Getβ¦
…
continue reading
1
Inside FTK Imager Pro: Vendor-Neutral Forensics, Smarter AI, And Exterro's Forensic Vision
1:07:38
1:07:38
Play later
Play later
Lists
Like
Liked
1:07:38Justin Tolman from Exterro joins the Forensic Focus Podcast to talk about the future of FTK and the role FTK Imager still plays in everyday casework. He explains why the original free version remains available, and what prompted the introduction of Imager Pro with added capabilities like BitLocker decryption and iOS collections. Justin also reflectβ¦
…
continue reading
1
Patch Tuesday: Zero-Day Alert and Patching Must-Dos β
7:11
7:11
Play later
Play later
Lists
Like
Liked
7:11Got a question or comment? Message us here! A new zero-day. 63 flaws. Endless patching chaos. This weekβs #SOCBrief breaks down Microsoftβs November Patch Tuesday and what it means for your SOC. Weβll cover the top critical CVEs, patching priorities, and how to keep your systems resilient before attackers strike. Support the show Watch full episodeβ¦
…
continue reading
1
β οΈ Insider Threats β οΈ: Ransomware Negotiators Gone Rogue
6:12
6:12
Play later
Play later
Lists
Like
Liked
6:12Got a question or comment? Message us here! This week, weβre digging into a case where ransomware negotiators allegedly became the attackers themselves, leveraging insider access to hit organizations they were supposed to help. This one raises real questions about trust, vendor oversight, and the human element in incident response. We break down whβ¦
…
continue reading
Got a question or comment? Message us here! In this episode, we break down the real mechanics of social engineering, from phishing emails and text scams to vishing calls and full-on physical pen tests. We share stories from the field, including how attackers build trust, why confidence is often more effective than technical skill, and what happens β¦
…
continue reading
1
Atroposia RAT: The Malware That Scans for Its Own Exploits
6:11
6:11
Play later
Play later
Lists
Like
Liked
6:11Got a question or comment? Message us here! ποΈ A new threat is making waves ... Atroposia RAT, a remote access trojan that doesnβt just infiltrate systems but scans them for vulnerabilities to exploit further. In this episode, we break down how this modular malware operates, how it hides, and why its built-in scanner is a game-changer for attackersβ¦
…
continue reading
1
CAPTCHA Con: Hackers' Evolving ClickFix Malware Trap
7:50
7:50
Play later
Play later
Lists
Like
Liked
7:50Got a question or comment? Message us here! βIβm not a robot.β π€ Hackers are exploiting fake βIβm not a robotβ CAPTCHA pages to deliver malware. Host Andrew Hickman breaks down how this ClickFix attack uses social engineering to steal data and evade detection. Tune in to learn key defense tactics and how to keep your team protected. Support the shoβ¦
…
continue reading
1
RondoDox Botnet Expansion: The Shotgun Approach to IoT Exploitation
7:19
7:19
Play later
Play later
Lists
Like
Liked
7:19Got a question or comment? Message us here! This week on the #SOCBrief, Andrew breaks down RondoDox, a rapidly growing botnet campaign taking aim at routers, DVRs, and IoT devices worldwide. With over 50 vulnerabilities across 30+ vendors, this βshotgunβ exploitation strategy is fueling massive DDoS and crypto-mining attacks. Support the show Watchβ¦
…
continue reading
1
Inside F3: Building Community And Sharing Knowledge In Digital Forensics
1:00:33
1:00:33
Play later
Play later
Lists
Like
Liked
1:00:33Gareth Davies, Chairman of F3 (First Forensic Forum), joins the Forensic Focus Podcast to explore how a grassroots, vendor-neutral community has helped shape digital forensics in the UK for three decades. He traces F3's origins in the 1990s, when affordable training and tool-agnostic knowledge-sharing were scarce, and explains why the forum still fβ¦
…
continue reading
1
Obscura Ransomware: Unmasking a Stealthy New Threat β οΈ
12:25
12:25
Play later
Play later
Lists
Like
Liked
12:25Got a question or comment? Message us here! In this weekβs #SOCBrief, Hickman and Peters break down Obscura ... a new ransomware variant making waves with aggressive evasion tactics, process terminations, and domain controller targeting. We cover whatβs known so far, the risks it poses to businesses, and the key defenses every SOC should prioritizeβ¦
…
continue reading
1
π‘οΈ Pen Test Potential: How Organizations Are Missing Out on Fortifying the SOC π‘οΈ
20:08
20:08
Play later
Play later
Lists
Like
Liked
20:08Got a question or comment? Message us here! Whatβs the real difference between a penetration test and a red team engagement, and how can each benefit your SOC? In this episode, Andrew is joined by Tanner, to unpack how pentests uncover vulnerabilities, how red teams stress-test defenders, and why every organization should be leveraging these exerciβ¦
…
continue reading
By Alias Cybersecurity
…
continue reading
1
π¨ Ransomware Rising: Variants, Tactics, and Defenses in 2025 π¨
7:29
7:29
Play later
Play later
Lists
Like
Liked
7:29Got a question or comment? Message us here! Ransomware is evolving faster than ever, from double extortion tactics to lightning-fast attack chains. In this episode, we break down how these threats work, why every organization is a target, and the layered defenses SOCs can use to detect and stop attacks early. Support the show Watch full episodes atβ¦
…
continue reading
1
Inside The Fight Against Child Exploitation β Leadership And Wellness Lessons From Debbie Garner
42:30
42:30
Play later
Play later
Lists
Like
Liked
42:30Debbie Garner, retired Special Agent in Charge at the Georgia Bureau of Investigation, joins the Forensic Focus Podcast to share insights from her 30-year career. From undercover narcotics work in her early 20s to leading Georgia's Internet Crimes Against Children (ICAC) Task Force, Debbie brings a unique perspective on collaboration, child protectβ¦
…
continue reading
1
π’ FileFix Fiasco π’ Steganography's Stealthy StealC Drop
5:53
5:53
Play later
Play later
Lists
Like
Liked
5:53Got a question or comment? Message us here! In this episode of The #SOCBrief, we break down the rising FileFix attack, a new social engineering technique using steganography to deliver info-stealing malware. Learn how attackers disguise malicious PowerShell commands, the risks this poses for browsers, messengers, and crypto wallets, and the proactiβ¦
…
continue reading
1
Monitoring the Dark Web for Leaked Data in DFIR
6:28
6:28
Play later
Play later
Lists
Like
Liked
6:28Got a question or comment? Message us here! π This episode of The #SOCBrief dives into the world of dark web monitoring in digital forensics and incident response. Learn why leaked credentials are a top threat, how to safely detect exposures, and what steps SOC teams can take to stay proactive. Support the show Watch full episodes at youtube.com/@aβ¦
…
continue reading
1
Mastering Incident Response: Essential for SOC Success
8:41
8:41
Play later
Play later
Lists
Like
Liked
8:41Got a question or comment? Message us here! π‘ This week on The SOC Brief, weβre breaking down incident response (IR) ... why itβs essential, how to build a strong plan, and what SOC teams can do to turn chaos into control. From preparation and containment to recovery and lessons learned, learn how a solid IR strategy saves time, money, and reputatiβ¦
…
continue reading
Got a question or comment? Message us here! Fresh off the chaos of DEF CON 33, Tanner, Hickman, and Will break down the four-day hacker conference, from the eye-opening hacker villages and mind-bending talks to Hickmanβs clutch CTF victory and Willβs bold dive into the Social Engineering Communityβs Vishing Competition. No sleep, all signal. Supporβ¦
…
continue reading
1
β οΈ Crypto24 β οΈ Ransomware: Bypassing EDR and Bolstering Defenses
8:22
8:22
Play later
Play later
Lists
Like
Liked
8:22Got a question or comment? Message us here! In this episode, we break down the emerging Crypto24 ransomware attacks that use living-off-the-land techniques to bypass EDR. Weβll explore how these attacks unfold and the defensive strategies SOCs and organizations can use, like layered security, enhanced monitoring, and rapid response, to stay ahead oβ¦
…
continue reading
1
π¨ Gone Vishing: The Recent Surge of Vishing Attacks
10:50
10:50
Play later
Play later
Lists
Like
Liked
10:50Got a question or comment? Message us here! This week, weβre unpacking the phishing wave hitting SaaS platforms ... from social engineering to OAuth abuse and AI voice spoofing. Learn why people remain the #1 attack vector and how to stay one step ahead. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasβ¦
…
continue reading
1
Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey
48:03
48:03
Play later
Play later
Lists
Like
Liked
48:03Hannah Bailey, founder of Blue Light Wellbeing, joins the Forensic Focus Podcast to share her powerful journey from frontline policing to becoming a psychotherapist, trauma therapist, and well-being coach. Drawing on 15 years in the police β including CID and major crime β Hannah brings unique cultural credibility to her work supporting digital forβ¦
…
continue reading
1
π¨ SonicWall Firewall Ransomware Breakdown
9:19
9:19
Play later
Play later
Lists
Like
Liked
9:19Got a question or comment? Message us here! On this episode of the #SOCBrief, we break down attacks on SonicWall firewalls. A wave of ransomware, possibly exploiting zero-day vulnerabilities, is compromising even fully patched systems. Learn how SOCs can respond fast and stay ahead. Support the show Watch full episodes at youtube.com/@aliascybersecβ¦
…
continue reading
1
Spilling the Tea: What Happens When Apps Launch Without Locking Down Security β
13:23
13:23
Play later
Play later
Lists
Like
Liked
13:23Got a question or comment? Message us here! This weekβs SOC Brief unpacks how a misconfigured cloud bucket exposed 72,000+ user images from the Tea app, complete with geolocation metadata and real IDs. From national security risks to doxxing fallout, we break down what went wrong and what your security team must do to avoid the same mistakes. Suppoβ¦
…
continue reading
1
π¨β οΈ A Critical ZERO-DAY (CVE-2025-53770)
17:54
17:54
Play later
Play later
Lists
Like
Liked
17:54Got a question or comment? Message us here! A critical zero-day (CVE-2025-53770) is actively targeting on-premises SharePoint servers AND itβs already been used to compromise over 100 organizations. In this #SOCBrief, Andrew and Tanner break down how the exploit works and what steps your team should take now. If your SharePoint instance is public-fβ¦
…
continue reading
1
Digital Forensics And Stress: Understanding Your Body's Signals
41:45
41:45
Play later
Play later
Lists
Like
Liked
41:45Dr Zoe Billings and Mark Pannone from Adapt & Evolve join Paul to discuss their unique approach to mental health and well-being in digital forensics. Dr Billings is a biologist and former senior investigator, while Mark is a former Assistant Chief Constable. Together they've developed a model that focuses on recognising the early biological signs oβ¦
…
continue reading
Got a question or comment? Message us here! In this weekβs #SOCBrief, we break down why offboarding policies are ABSOLUTELY critical for security teams. Overlooked items from abandoned accounts to old VPN access can leave backdoors wide open. Learn how SOCs monitor, contain, and shut down lingering access, and why communication between HR, IT, and β¦
…
continue reading
1
Aligned by Design: CISO x Legal in Practice - Episode 92
54:40
54:40
Play later
Play later
Lists
Like
Liked
54:40Got a question or comment? Message us here! ποΈ NEW! Aligned by Design: CISO x Legal Introducing! A fresh new series that explores the intersection of cybersecurity and legal strategy. Join Alias CISO Jonathan Kimmitt and privacy attorney Tom Vincent as they unpack what happens when technology, compliance, risk, and law collide. From real-world expeβ¦
…
continue reading
1
π¨ Record-Shattering DDoS Attack Alert π¨
11:41
11:41
Play later
Play later
Lists
Like
Liked
11:41Got a question or comment? Message us here! Hackers just unleashed the largest DDoS attack in history, peaking at 7.3 Tbps and 4.8 billion packets per second. In just 45 seconds, it pummeled its target with the data equivalent of over 9,000 HD movies, a powerful reminder of how far attack capabilities have evolved. π§ Tune in to todayβs SOC Brief foβ¦
…
continue reading
1
Secure AF SOC Brief #5 - Chrome CVE-2025-6554
9:04
9:04
Play later
Play later
Lists
Like
Liked
9:04Got a question or comment? Message us here! In this episode of The SOC Brief, the team unpacks a critical zero-day vulnerability in Google Chrome (CVE-2025-6554) thatβs being actively exploited. Learn how attackers use type confusion bugs to hijack browser memory, what makes this exploit so dangerous, and why itβs targeting high-value organizationsβ¦
…
continue reading
1
Ep 91: The Engineers React to Breach News
45:27
45:27
Play later
Play later
Lists
Like
Liked
45:27Got a question or comment? Message us here! In this episode, our security engineers break down the latest cybersecurity headlines, from the real scoop behind the β16 billion passwordβ leak to the rise of hacker groups like Scattered Spider. π·οΈ We discuss how attackers bypass MFA, why exploited data keeps resurfacing, and what organizations can do tβ¦
…
continue reading
Got a question or comment? Message us here! In this episode of The SOC Brief, Andrew and Dax dive into the world of false positives β those misleading alerts that flood security teams with noise. They discuss how misconfigurations, lack of context, and overly sensitive rules can lead to alert fatigue. With practical tips on investigation, tuning toβ¦
…
continue reading
1
Well-Being Interventions For Forensic Practitioners β Have Your Say
39:04
39:04
Play later
Play later
Lists
Like
Liked
39:04Dr Jo Morrissey joins Paul to discuss her research into wellbeing challenges faced by forensic practitioners worldwide. As Workforce Strategy Lead at the Forensic Capability Network, Dr Morrissey is conducting a comprehensive study examining mental health impacts across all forensic disciplines - from digital forensics to crime scene investigation,β¦
…
continue reading
Got a question or comment? Message us here! π New SOC Brief Episode: Tracing the Breadcrumbs Cybercriminals always leave a trail, if you know where to look. In this episode, we break down Indicators of Compromise (IOCs) and how they help security teams detect and respond to threats faster. π― What we cover: β’ Real-world incident reports & proof of cβ¦
…
continue reading
1
Episode 90: Global Wars - Cyber Strikes Back
50:11
50:11
Play later
Play later
Lists
Like
Liked
50:11Got a question or comment? Message us here! ποΈ New Secure AF Episode: Global Wars: Cyber Strikes Back πβοΈ How does global news shape cybersecurity operations? In this episode, we dig into how real-world events influence the threats we track, the way we respond, and the tools we use for social engineering/pentesting. π We talk threat intel, evolvingβ¦
…
continue reading
1
Tom Oldroyd From Semantics 21 On Protecting Investigators And Reducing CSAM Exposure
55:01
55:01
Play later
Play later
Lists
Like
Liked
55:01Host Paul Gullon-Scott sits down with Tom Oldroyd, Director of Strategy and Sales at Semantics 21, to discuss S21's digital forensics platform that prioritizes investigator mental health alongside cutting-edge technology. Drawing on his 17 years in policing and experience running a digital forensic unit, Tom highlights the psychological toll on invβ¦
…
continue reading
Got a question or comment? Message us here! ποΈ This Week on the SOC Brief: Join Andrew and Dax as they dive into the emergence of a new threat actor known as SafePay π΅οΈββοΈπ». They break down the latest tactics, techniques, and procedures observed from this group, offering insights into how organizations can stay vigilant. From detection strategies πβ¦
…
continue reading
1
Episode 89: Meet the Alias SOC - on the Battlefront of Cybersecurity
29:57
29:57
Play later
Play later
Lists
Like
Liked
29:57Got a question or comment? Message us here! π Inside the SOC π Go behind the scenes with the Alias Security Operations Center (SOC) team to learn how they operate, collaborate, and tackle todayβs top cyber threats βοΈ. Find out why a SOC matters, and how organizations can still leverage SOC insights and support, even without one in-house πΌ. π§ Tap inβ¦
…
continue reading