Digital forensics discussion for computer forensics, DFIR and eDiscovery professionals. Visit Forensic Focus at forensicfocus.com for more.
…
continue reading
A podcast by digital forensics examiners for digital forensics examiners. Hear about the latest news in digital forensics and learn from researcher interviews with field memes sprinkled in.
…
continue reading
Get involved in the exciting world of Digital Forensics and Incident Response with: Traffic Light Protocol. The Digital Forensics Podcast. In each episode, we sit down with seasoned DFIR professionals, the blueteamers who work around the clock to investigate cyber intrusions. From data breaches to cyberattacks, they share firsthand accounts of some of the most intense investigations they've ever tackled, how they deal with burnout and the added pressure of cat and mouse while they learn abou ...
…
continue reading
My picks of the month for the happenings in the DFIR community
…
continue reading
CfU is a podcast designed to bring education and information to the digital intelligence space in a new format. It is designed to deliver content to digital forensics examiners, investigators, lab supervisors, prosecutors, and anyone interested in DFIR. The podcast will include challenges mobile forensics professionals face, case studies, forensic tips and techniques, interviews with industry experts, influencers, researchers, and authors.
…
continue reading
Come join Lee Reiber as he discusses some digital forensic gold. Also the home for the Forensic Happy Hour with guests from the DFIR community.
…
continue reading
The Forensic Lunch! The one hour, mostly, live digital forensics and incident response focused video cast and podcast.
…
continue reading
Forensic Fix is a podcast from MSAB that covers the latest news and trends in the field of Digital Forensics. The show features guests from the industry who share their insights, experiences, and advice on various topics related to Digital Forensics. The podcast covers a wide range of subjects, including mobile device forensics, welfare, industry news and more. Listeners can expect to hear about the latest tools and techniques used by Digital Forensic professionals, as well as how the field ...
…
continue reading
The Cyber Social Hub is an online community of digital investigators. Join your host, Kevin DeLong as he discusses with a variety of guests on topics in the field of digital investigations and sometimes terrible ”dad” jokes. We talk to investigators, researchers, and vendors to get you the information you need to find the truth about digital incidents! Join us at https://cybersocialhub.com for FREE and be part of the community. If you want to see the video version of this podcast, watch us o ...
…
continue reading
Interviews and fun with professionals, hackers, and everything in between.
…
continue reading
CyberSpeaksLIVE is an InfoSec podcast series hosted by Duncan McAlynn (@infosecwar) and his special guest co-hosts, where YOU get to participate in the discussions with full video and audio. Following the live recording, we add the audio-only stream into our podcast feed for our awesome subscribers. CyberSpeaksLIVE gives YOU, the InfoSec community, a voice that can be heard around the world! Follow us on Twitter for upcoming guests announcements and live recording invites, @cyberspeakslive.
…
continue reading
1
Episode 13-ELK EDR and Sandboxing, Home grown CTF environments, DFIR Automation & Forensics in the cloud, with Jacob Wilson
58:11
58:11
Play later
Play later
Lists
Like
Liked
58:11
Send us a Text Message. Episode 13 is another giant episode with a focus on what its like be in the mud working on real life forensic investigations. Jacob and Clint talk about ELK EDR, using Sysmon. Sandbox Environments: Jacob discusses the creation of a sandbox environment using an ELK stack combined with Sysmon, enabling in-depth malware analysi…
…
continue reading
1
Our Mid Year 2024 DFIR Predictions Check-in (AI and Digital Investigations)
1:04:45
1:04:45
Play later
Play later
Lists
Like
Liked
1:04:45
In January 2024, Matt and Kevin made a few predictions in the Digital Investigations space. Let's check in and see how they did...By Cyber Social Hub
…
continue reading
1
Is There A Mental Health Crisis In Digital Forensics?
1:03:08
1:03:08
Play later
Play later
Lists
Like
Liked
1:03:08
Content warning - this episode discusses suicidal feelings. Prof. Sarah Morris joins the Forensic Focus Podcast to discuss the critical topic of mental health within the digital forensics field. The conversation covers the impact of traumatic content on analysts, the gaps in mental health support services, and the challenges faced by the industry d…
…
continue reading
1
Episode 12 - You're forced to decide: Cyber Generalist or Cyber Specialist?
17:47
17:47
Play later
Play later
Lists
Like
Liked
17:47
Send us a Text Message. Quotes: “In the fast-paced world of DFIR, you are a mission critical system. Your job isn’t just to uncover what happened during an incident, but to do so in a way that gets results fast.” “Specialists bring expertise that pushes the entire industry forward, while generalists offer versatility and adaptability in the ever-ch…
…
continue reading
1
Bird Cameras and Forensic Insights from New Zealand
1:13:37
1:13:37
Play later
Play later
Lists
Like
Liked
1:13:37
Send us a Text Message. (THIS IS WHAT AN AI GENERATED DESCRIPTION WITH NO HUMAN CORRECTIONS WILL PROVIDE FOR YOU! SO NATURALLY WE HAD TO KEEP IT HAHA!) What happens when a digital forensics expert sets up a podcast studio in a cupboard under the stairs and a co-host becomes a modern-day Snow White with her Bird Buddy camera? You get a lively and en…
…
continue reading
1
Episode 11 - Velociraptor, Containerisation and Infrastructure Deployed as Code with Myles Agnew
56:02
56:02
Play later
Play later
Lists
Like
Liked
56:02
Send us a Text Message. In this episode of Traffic Light Protocol, we sit down with Myles, a cybersecurity veteran with over 15 years of Cyber experience and background as a Combat Engineer in the Army. Myles brings his unique perspective on integrating automation and cloud technologies into cybersecurity infrastructure deployment (Used specificall…
…
continue reading
1
Combating The Rise Of AI-Generated Child Exploitation Material With Heather Barnhart
51:41
51:41
Play later
Play later
Lists
Like
Liked
51:41
Heather Barnhart from Cellebrite joins the Forensic Focus Podcast to discuss combating the rise of AI-generated child exploitation material. Heather shares her extensive experience and insights on the impact of AI and deepfakes on investigations, the challenges faced by law enforcement worldwide, and the importance of education in combating digital…
…
continue reading
1
Are You Using a CSAM Global Database in Your Investigation?
1:04:39
1:04:39
Play later
Play later
Lists
Like
Liked
1:04:39
Join Kevin, Liam, and Tom, as they discuss the importance of utilizing a CSAM database in your online investigations.By Cyber Social Hub
…
continue reading
1
Episode 10 - Detecting and Preventing Phishing Attacks
19:04
19:04
Play later
Play later
Lists
Like
Liked
19:04
Send us a Text Message. Quotes: "Phishing targets the human element, the 'wetware,' often the weakest link in any security chain." - Clint Marsden "Phishing isn't just about poorly spelled emails anymore; it's about sophisticated campaigns that even cyber-aware individuals can fall victim to." - Clint Marsden "Effective defense against phishing inv…
…
continue reading
1
Unlocking The Power Of Digital Forensics Training And Certification With Magnet Forensics
1:02:56
1:02:56
Play later
Play later
Lists
Like
Liked
1:02:56
Chuck Cobb from Magnet Forensics joins the Forensic Focus Podcast to discuss training and certification. Chuck delves into his extensive background, including his tenure in law enforcement and over a decade of experience in forensic training at both Guidance Software and Magnet. He emphasizes the evolution of forensic training, particularly highlig…
…
continue reading
1
Detecting and dealing with deepfakes and synthetic media in your investigation
59:12
59:12
Play later
Play later
Lists
Like
Liked
59:12
Join Kevin as he speaks with Brandon Epstein of Medex Forensics about how to determine the trustworthiness of digital evidence and to know when a video has been edited or modified, and to recognize original camera video from synthetically produced media. https://medexforensics.com/ https://www.swgde.org/…
…
continue reading
1
Due Diligence, Password Cracking & New Tool Features
1:23:26
1:23:26
Play later
Play later
Lists
Like
Liked
1:23:26
Send us a Text Message. Welcome back to another episode of the Digital Forensics Now podcast! In this episode, we explore the critical need for continuous learning in the field, discuss fascinating forensic tools, showcase UFADE with its new chat capture feature, and engage in a spirited debate on the value of certifications. Get ready to expand yo…
…
continue reading
1
Episode 9 -Unmasking APT40 (Leviathan): Tactics, Challenges, and Defense Strategies
21:48
21:48
Play later
Play later
Lists
Like
Liked
21:48
Send us a Text Message. Episode Title: "Unmasking APT40: Tactics, Challenges, and Defense Strategies" Key Takeaways: APT40 is a sophisticated Chinese state-sponsored cyber espionage group active since 2009. They target various sectors including academia, aerospace, defense, healthcare, and maritime industries. APT40 uses advanced tactics such as sp…
…
continue reading
1
Episode 8 - Hidden digital forensic logging for Cybersecurity on Any Budget: Practical Strategies for Enhanced Detection and Prevention Using Sysmon, Blocking Data Exfil with group policy and printer forensics ...
19:57
19:57
Play later
Play later
Lists
Like
Liked
19:57
Send us a Text Message. In this episode, Clint Marsden goes straight into 4 practical strategies that enable better forensics and stop data exfiltration, no matter the size of your budget. Clint covers deploying Sysmon for enhanced monitoring, and using Group Policy to tighten print and USB security. Event log cleared: Event ID 1102 ACSC Sysmon: ht…
…
continue reading
1
Setting The Standard For Image And Video Forensics In The US With Amped Software
44:10
44:10
Play later
Play later
Lists
Like
Liked
44:10
Blake Sawyer from Amped Software joins the Forensic Focus Podcast to discuss video and image forensics in the US. He shares insights on the challenges of working with low-quality CCTV footage and how Amped Software has grown and been adopted in the US market. The conversation delves into the role of the Scientific Working Group on Digital Evidence …
…
continue reading
1
Stop Pushing The Button... Without Validating your Mobile Forensic Tools
58:15
58:15
Play later
Play later
Lists
Like
Liked
58:15
Let’s Talk with Adam Firman of MSAB about why it is important to validate your mobile forensic tools. Too many examiners think a single validation does the trick…. don’t find out the hard way… in court, as you are getting important evidence tossed out. Join the conversation! See Adam's Webinars - https://www.bigmarker.com/communities... https://www…
…
continue reading
1
Episode 7 - Defending Against Scattered Spider: Understanding Their Tactics, Techniques, and Procedures
17:07
17:07
Play later
Play later
Lists
Like
Liked
17:07
Send us a Text Message. In todays episode of TLP - Traffic Light Protocol, Clint Marsden talks about Defending Against Scattered Spider: Understanding Their Tactics, Techniques, and Procedures. Key Takeaways Understanding Scattered Spider: Scattered Spider, also known as Roasted Octopus or Octo Tempest, utilizes various legitimate tools for malicio…
…
continue reading
1
Episode 6 - Responding to ransomware - is your VPN a target? Plus ransomware risk mitigation with Phil Ngo
29:27
29:27
Play later
Play later
Lists
Like
Liked
29:27
Send us a Text Message. In this episode, we speak with Phil Ngo, a Primary Investigator in Accenture's global cyber response team. As a primary investigator, he is responsible for helping clients recover from major incidents as well as delivering proactive cyber services, such as threat hunting and tabletop exercises. Philip started his career as a…
…
continue reading
1
Trending Challenges in CSAM Investigations...and the Solution
1:00:46
1:00:46
Play later
Play later
Lists
Like
Liked
1:00:46
Join Kevin DeLong as he speaks with Liam Owens and Tom Oldroyd of Semantics 21 about the challenges Investigators face in a CSAM investigation and how they can solve them. https://www.semantics21.com/By Cyber Social Hub
…
continue reading
1
Microsoft recall of Recall & all of the latest Digital Forensic News!
1:07:30
1:07:30
Play later
Play later
Lists
Like
Liked
1:07:30
Send us a Text Message. Join us as we recount our recent travels to Argentina and the Techno Security & Digital Forensics conference. We'll share the highlights of our trips before diving into the core content. What could possibly go wrong with a feature designed for user convenience? We'll scrutinize Microsoft's controversial "Recall" feature, exp…
…
continue reading
1
Episode 5 - NIST SP 800-61 Computer Security Incident Handling Guide (Post-Incident Activity)
36:22
36:22
Play later
Play later
Lists
Like
Liked
36:22
Send us a Text Message. This is the biggest episode from a content perspective so far. I'm excited to share it with you. Episode Highlights: How to run post-incident debriefs and post-mortems. Involving external teams Using lessons learned to form actionable insights. Key questions to address in incident analysis. Effective report writing strategie…
…
continue reading
1
Episode 4 - NIST SP 800-61 Computer Security Incident Handling Guide (Containment,Eradication and Recovery)
22:10
22:10
Play later
Play later
Lists
Like
Liked
22:10
Send us a Text Message. Show Notes: Episode on Containment, Eradication, and Recovery In this episode of Traffic Light Protocol, Clint Marsden explores the containment, eradication, and recovery phases of the NIST SP 800-61 framework for computer security incident handling. Key Topics Covered: Containment Strategies: Choosing appropriate containmen…
…
continue reading
1
Episode 3 - (Part 2) NIST SP 800-61 Computer Security Incident Handling Guide (Detection)
11:41
11:41
Play later
Play later
Lists
Like
Liked
11:41
Send us a Text Message. In this conclusion of the Detection phase, Clint wraps up Incident Prioritisation. This includes Functional impacts of the incident, information impact of the incident and the recoverability of the incident. Not all of these are needed, or relevant when tracking your incident and Clint explains when to categorise incidents u…
…
continue reading
Takeaways The well-being and welfare of officers and staff dealing with child sexual abuse cases is the greatest challenge in law enforcement. Technology companies need to prioritize child protection and invest in preventing abuse rather than just identifying and reporting it. The internet has transformed child abuse in a negative way, but it also …
…
continue reading
1
Episode 3 - NIST SP 800-61 Computer Security Incident Handling Guide (Detection)
50:07
50:07
Play later
Play later
Lists
Like
Liked
50:07
Send us a Text Message. In this 45 minute episode Clint covers a lot of ground based on the Detection phase of NIST 800-61. Attack vectors for digital security incidents, including insider threats and weaponized USBs. Cybersecurity incident response and detection, including NIST guidelines and Sysmon logging augmentation The importance of following…
…
continue reading
1
Digital Investigation Trends You Don’t Know About... revealed!
1:06:11
1:06:11
Play later
Play later
Lists
Like
Liked
1:06:11
Let’s do a reveal in Digital Forensic Investigations! Join Kevin DeLong and Dave Ryberg and brace yourself to upgrade your Digital Investigation game for FREE! Truxton has released a 100% Free version of their popular forensic tool. It's called Trxuton Community Edition. If you want a copy, early sign-up can be done at this link http://csh.social/T…
…
continue reading
1
Acquisition, Assessment, Triage, and Forensic Timelines... Oh My!
55:59
55:59
Play later
Play later
Lists
Like
Liked
55:59
Join Kevin DeLong and Bob O’Leary as they discuss why you should include an Incident Response approach in your digital forensic investigations.By Cyber Social Hub
…
continue reading
1
Episode 2 - NIST SP 800-61 Computer Security Incident Handling Guide (Preparation)
30:33
30:33
Play later
Play later
Lists
Like
Liked
30:33
Send us a Text Message. In this Episode Clint Marsden talks about the first phase of Computer Security Incident Handling according to NIST. Listen to real world examples of how to get prepared before a Cyber Security Incident arrives. Show notes: Link to NIST SP 800-61 PDF https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf B…
…
continue reading
1
Android Security, Market Acquisitions, Research, Tools & More Tools!
1:23:13
1:23:13
Play later
Play later
Lists
Like
Liked
1:23:13
Send us a Text Message. Join us for an engaging session where we'll recap recent events and activities before diving into the latest research, cutting-edge tools, and exciting updates! Tune in as we explore groundbreaking research conducted by emerging stars in the DFIR community. We'll delve into the testing of data stored in iOS Unified Logs, foc…
…
continue reading
1
Episode 1 - Digital forensics trends and preparations, learning from real life case studies & DFIR training for getting started
23:27
23:27
Play later
Play later
Lists
Like
Liked
23:27
Send us a Text Message. In this first episode we kick off with Clint Marsden, the host of Traffic Light Protocol (TLP) where he talks about what its like to work in DFIR, how to get started with Cyber training, what to expect in future episodes, and of course a light touch on AI Forensics! Join us for the first episode. The next episodes coming up …
…
continue reading
1
Advantages to Virtualizing The Suspect Machine During an Investigation
1:04:41
1:04:41
Play later
Play later
Lists
Like
Liked
1:04:41
Let’s talk about the advantages of looking at the suspect's computer in a virtual investigation with Tom Cross of Virtual Forensic Computing. https://vfc.uk.com/ Tom's Linkedin - https://www.linkedin.com/in/tc14/ https://cybersocialhub.comBy Cyber Social Hub
…
continue reading
1
Live from IACIS with the Phone Wizard, Bill Aycock!
57:55
57:55
Play later
Play later
Lists
Like
Liked
57:55
Send us a Text Message. Live from the International Association of Computer Investigative Specialists (IACIS) with special guest Bill "the phone wizard" Aycock!! Notes: Three New SANS Posters https://www.sans.org/posters/ios-third-party-apps-forensics-reference-guide-poster/ https://www.sans.org/posters/android-third-party-apps-forensics/https://ww…
…
continue reading
1
AI-Powered License Plate Reading With Amped DeepPlate
38:17
38:17
Play later
Play later
Lists
Like
Liked
38:17
Marco Fontani joins the Forensic Focus podcast to discuss Amped Software’s latest AI-powered tool, DeepPlate. DeepPlate is a deep learning system designed to read license plates affected by common issues introduced by surveillance systems, making it a valuable asset for forensic video analysts. Marco provides an in-depth overview of DeepPlate, expl…
…
continue reading
1
Live from IACIS 2024 in Orlando with Bill Oettinger
44:22
44:22
Play later
Play later
Lists
Like
Liked
44:22
How do you transition from Las Vegas Metro conducting digital forensic investigations to e-Services at IACIS… Let’s find out.By Cyber Social Hub
…
continue reading
1
Live from IACIS 2024 in Orlando Florida with Gene Shantz!
51:52
51:52
Play later
Play later
Lists
Like
Liked
51:52
Let's talk about some of the best Digital Investigation training in the industry that is available. IACIS hold their annual training event in Orlando Florida and we were lucky enough to be invited down to talk about the event!By Cyber Social Hub
…
continue reading
1
Live in Orlando, FL at the 2024 IACIS Annual Training Event with Alan Thomas
37:32
37:32
Play later
Play later
Lists
Like
Liked
37:32
We are live at IACIS in Orlando, Florida, talking to Alan Thomas about how mobile technologies are shaping the world of computer forensics.By Cyber Social Hub
…
continue reading
1
Brandon Epstein with Medex Forensics live at IACIS 2024
22:48
22:48
Play later
Play later
Lists
Like
Liked
22:48
Let’s talk about the latest in deepfakes and synthetic media.By Cyber Social Hub
…
continue reading
Celebrating Success: The Annual Gala of Child Rescue Coalition Recognizing Excellence: Awards for Instructors and Investigators Child Rescue Coalition (CRC) is a nonprofit organization that rescues children from sexual abuse by providing technology to law enforcement agencies free of charge. CRC's technology helps identify, arrest, and prosecute ch…
…
continue reading
1
From Disaster to Attainment: Crafting Digital Forensic Reports
1:24:41
1:24:41
Play later
Play later
Lists
Like
Liked
1:24:41
Send us a Text Message. Navigating the complexities of digital forensics can be daunting, but this week we've got your back with the exploration of Magnet Forensics' Axiom version 8, and its transformative Mobile View feature. As your hosts we're not just sharing tech updates; we're discussing the impact these tools have on our work and how they sh…
…
continue reading
Why should you give a talk at a conference and why TechnoSecurity in Pasadena is a great place to start?By Cyber Social Hub
…
continue reading
1
Cyber Scandals And When (Not) To Trust Computers
1:00:18
1:00:18
Play later
Play later
Lists
Like
Liked
1:00:18
Join Si and Desi for another episode of the Forensic Focus Podcast. This week, they discuss the lack of transparency and potential misrepresentation in the cybersecurity industry, particularly regarding the use of open-source tools by companies and the questionable interpretation of data and statistics in marketing and advertising. The conversation…
…
continue reading
The eclipse was yesterday... and WOW, it was amazing! Also, Google releases their ability to track devices even if they are powered down using Bluetooth and Find My DeviceBy Cyber Social Hub
…
continue reading
1
Daily Digital Investigator for April 5th 2024
2:49
2:49
Play later
Play later
Lists
Like
Liked
2:49
Did you know that Brett Shavers has a new book out? It is on the Amazon store, and it's called "Placing the Suspect Behind the Keyboard: DFIR Investigative Mindset.By Cyber Social Hub
…
continue reading
Join Kevin DeLong on 'The Daily Digital Investigator' as he explores the cutting-edge of AI-based software. Discover how these advancements are set to revolutionize the work of human investigators, offering new tools and insights for future challenges. Tune in for expert interviews, case studies, and the latest AI tech news. CyberSocialHub.com…
…
continue reading
The latest exploit forensic companies are using to pull data from your Android Pixel devices :)By Cyber Social Hub
…
continue reading
1
Apple Is At It Again, Changing Our Logicals!
1:26:37
1:26:37
Play later
Play later
Lists
Like
Liked
1:26:37
Send us a Text Message. In mobile forensics, with each update brings new challenges and opportunities. Join us as we dissect the latest iOS 17.4 impacts, including the nuances of SQLite databases and the advent of write-ahead logs in Advanced Logical extractions. Our episode is brimming with insights that could change the way you approach data extr…
…
continue reading
1
Kickstarting Your Digital Forensics Cybersecurity Career
58:04
58:04
Play later
Play later
Lists
Like
Liked
58:04
Sophie Powell joins Si and Desi on the Forensic Focus Podcast to discuss various topics including her recent participation in a TryHackMe webinar, the challenges of applying for graduate schemes, and the relevance of the Cyber 9/12 competition to her career in cybersecurity. They also touch on the psychology of conspiracy theories and the implicati…
…
continue reading
In this episode, Adam Firman is joined by Matthew Sorell from Digital Forensic Sciences Australia. Matthew is also a professor at the Talinn university of Estonia and honoree consul for the Republic of Estonia in Australia. The pair discuss what is involved in digital forensics, what is involved in lecturing and some exciting projects that Matthew …
…
continue reading
Send us a Text Message. Unlock the secrets of advanced forensic analysis with us! We reveal essential training classes that every digital sleuth needs to stay ahead in an ever-changing tech landscape. Sign-on to be enlightened by experts in the captivating world of data structures through Hexordia's class and IACIS's comprehensive course. But it's …
…
continue reading
1
Daily Digital Investigator for March 12th, 2024
4:07
4:07
Play later
Play later
Lists
Like
Liked
4:07
New Strategy to Guide Intelligence Community OSINT Collection. You can read the article here >>> https://executivegov.com/2024/03/new-strategy-to-guide-intelligence-community-osint-collection-use/ If you are seeing this on Social Media, head over to the podcast page to see the link.By Cyber Social Hub
…
continue reading