A podcast by digital forensics examiners for digital forensics examiners. Hear about the latest news in digital forensics and learn from researcher interviews with field memes sprinkled in.
…
continue reading
Digital forensics discussion for computer forensics, DFIR and eDiscovery professionals. Visit Forensic Focus at forensicfocus.com for more.
…
continue reading
My picks of the month for the happenings in the DFIR community
…
continue reading
Get involved in the exciting world of Digital Forensics and Incident Response with: Traffic Light Protocol. The Digital Forensics Podcast. In each episode, we sit down with seasoned DFIR professionals, the blueteamers who work around the clock to investigate cyber intrusions. From data breaches to cyberattacks, they share firsthand accounts of some of the most intense investigations they've ever tackled, how they deal with burnout and the added pressure of cat and mouse while they learn abou ...
…
continue reading
CfU is a podcast designed to bring education and information to the digital intelligence space in a new format. It is designed to deliver content to digital forensics examiners, investigators, lab supervisors, prosecutors, and anyone interested in DFIR. The podcast will include challenges mobile forensics professionals face, case studies, forensic tips and techniques, interviews with industry experts, influencers, researchers, and authors.
…
continue reading
Come join Lee Reiber as he discusses some digital forensic gold. Also the home for the Forensic Happy Hour with guests from the DFIR community.
…
continue reading
The Forensic Lunch! The one hour, mostly, live digital forensics and incident response focused video cast and podcast.
…
continue reading
Where timely and relevant security meets puns and witty banter. Our goal is to keep defenders apprised of pertinent news and trends in under forty-five minutes.
…
continue reading
Interviews and fun with professionals, hackers, and everything in between.
…
continue reading
We take the digital forensics news of today and forecast the future long term impact to our industry, both positive and negative.
…
continue reading
CyberSpeaksLIVE is an InfoSec podcast series hosted by Duncan McAlynn (@infosecwar) and his special guest co-hosts, where YOU get to participate in the discussions with full video and audio. Following the live recording, we add the audio-only stream into our podcast feed for our awesome subscribers. CyberSpeaksLIVE gives YOU, the InfoSec community, a voice that can be heard around the world! Follow us on Twitter for upcoming guests announcements and live recording invites, @cyberspeakslive.
…
continue reading

1
DFIR Foundations: Real-World Lessons in Containment, Eradication, and Recovery
54:45
54:45
Play later
Play later
Lists
Like
Liked
54:45In this powerful continuation of our DFIR series, cybersecurity experts Daniel Schwalbe, DavidBianco, Lesley Carhart, and Sarah Sabotka dissect the heart of effective incident response,containment, eradication, recovery, and lessons learned. Packed with firsthand war stories,sharp tactical advice, and honest debates, this episode is a must-listen f…
…
continue reading

1
The DFIR Investigative Mindset: Brett Shavers On Thinking Like A Detective
55:56
55:56
Play later
Play later
Lists
Like
Liked
55:56Brett Shavers joins the Forensic Focus Podcast to discuss the critical "investigative mindset" needed for effective digital forensics. Drawing from his unique background in undercover law enforcement operations and his transition to digital forensics, Brett shares invaluable insights on why technical skills alone aren't enough in DFIR. Digging into…
…
continue reading

1
DFIRside Chat: Lessons from the Frontlines of Incident Response
42:36
42:36
Play later
Play later
Lists
Like
Liked
42:36In Part 1 of this special two-part panel, the Breaking Badness podcast gathers leadingcybersecurity experts to explore the foundations of DFIR - Digital Forensics and IncidentResponse. Featuring Daniel Schwalbe (DomainTools), Lesley Carhart (Dragos), David Bianco(Splunk), and Sarah Sabotka (Proofpoint), the panel dives into what makes an effective …
…
continue reading

1
AI Unpacked: Magnet Forensics' New Series On AI In DFIR
1:02:33
1:02:33
Play later
Play later
Lists
Like
Liked
1:02:33Brandon Epstein joins the Forensic Focus Podcast to discuss the evolving landscape of digital forensics and the growing role of artificial intelligence in evidence analysis. Brandon shares his journey from being a major crimes detective in New Jersey to co-founding Medex Forensics (later acquired by Magnet), and discusses his current roles both at …
…
continue reading

1
The "Bear" Essentials of Digital Forensics 🐻
1:13:55
1:13:55
Play later
Play later
Lists
Like
Liked
1:13:55Send us a text The digital forensics world isn’t slowing down — and neither are we. In this episode, we celebrate Heather’s well-deserved recognition as Cellebrite’s Mentor of the Year 2025. Naturally, there were a few speech mishaps and, somehow, a bear raiding Heather’s bird feeder (yes, actual wildlife). But between the chaos, we get serious abo…
…
continue reading

1
How Russian Disinformation Campaigns Exploit Domain Registrars and AI
38:57
38:57
Play later
Play later
Lists
Like
Liked
38:57In this episode of Breaking Badness, host Kali Fencl is joined by DomainTools' Daniel Schwabeand disinformation expert Scot Terban to uncover how modern Russian disinformationcampaigns are using domain registrars, homoglyph attacks, and generative AI to mimiclegitimate news outlets and manipulate public perception. From the eerie sophistication ofD…
…
continue reading

1
DNS Masterclass: Attacks, Defenses, and the Day the Internet Was Saved
41:17
41:17
Play later
Play later
Lists
Like
Liked
41:17In this special DNS Masterclass episode of Breaking Badness, hosts Kali Fencl, Tim Helming, and Taylor Wilkes-Pierce take a deep dive into the Domain Name System often dubbed the backbone and battleground of the internet. From its humble beginnings with host files to its critical role in modern security, the episode unpacks DNS’s evolution, vulnera…
…
continue reading

1
Jason Costain - Fraud Defense with Javloc
1:21:27
1:21:27
Play later
Play later
Lists
Like
Liked
1:21:27Jason Costain, founder of Javloc, joins us to discuss his 30 years of experience in fraud prevention and bank defense systems. Jason shares insights into the evolution of fraud, from early check scams to modern-day threats like voice deepfakes and machine learning-driven credit card fraud. He also highlights the UK's regulatory responses, the impor…
…
continue reading

1
From ValleyRAT to Silver Fox: How Graph-Based Threat Intel is Changing the Game
57:53
57:53
Play later
Play later
Lists
Like
Liked
57:53In this episode of Breaking Badness, host Kali Fencl welcomes Wes Young of CSIRT Gadgets and Daniel Schwalbe, CISO and head of investigations at DomainTools, dive into a recent DomainTools Investigations (DTI) analysis involving ValleyRAT and Silver Fox, and how new tools are enabling faster, more accessible analysis for junior and seasoned analyst…
…
continue reading

1
APT 41’s VPN Exploits & The Great Firewall’s Leaky Secrets
31:17
31:17
Play later
Play later
Lists
Like
Liked
31:17In this episode of Breaking Badness, we dive into two major cybersecurity stories: the exploitation of a VPN vulnerability by Chinese APT 41 and the newly discovered “Wall Bleed” flaw in the Great Firewall of China.APT 41 has been using a critical VPN vulnerability to infiltrate operational technology (OT) organizations, targeting industries like a…
…
continue reading

1
Rob Fried's Award-Winning Approach To Digital Forensics
1:01:39
1:01:39
Play later
Play later
Lists
Like
Liked
1:01:39Hosts Si and Desi welcome back Robert Fried, winner of the Top Professional Investigator award. Rob discusses his new book, ‘Forensic Data Collection 2.0,’ and shares insights on the evolving landscape of digital forensics. The conversation explores the importance of documentation in forensic investigations, balancing technical skills with human in…
…
continue reading

1
Hacked Chats & Telecom Takedowns: Black Basta & Salt Typhoon
43:23
43:23
Play later
Play later
Lists
Like
Liked
43:23Episode 202 of Breaking Badness takes a deep dive into two of the biggest cybersecurity stories of the year (so far):● Black Basta’s Leaked Chats – A major data leak has exposed internal conversations from this notorious ransomware gang, revealing their internal struggles, ransom negotiations, and even workplace drama.● Salt Typhoon’s Cyber Espiona…
…
continue reading

1
The Iceberg of Digital Evidence: What AI Can't See
1:06:51
1:06:51
Play later
Play later
Lists
Like
Liked
1:06:51Send us a text The boundary between tool-dependent analysis and true forensic expertise grows increasingly blurred as AI enters the digital forensics landscape. Alexis Brignoni and Heather Charpentier reunite after a month-long hiatus to sound the alarm on a concerning trend: the integration of generative AI into forensic tools without adequate saf…
…
continue reading

1
Building a Hacker Conference from Scratch: The Wild Origins of ShmooCon
44:32
44:32
Play later
Play later
Lists
Like
Liked
44:32In this episode of Breaking Badness, we sit down with Bruce and Heidi Potter, two of the masterminds behind ShmooCon, the legendary cybersecurity conference that ran for 20 years. They take us behind the scenes, from its hilarious bar-napkin origins to how they built a tight-knit hacker community that thrived for two decades.…
…
continue reading

1
Audiobook - Mastering Sysmon. Deploying, Configuring, and Tuning in 10 easy steps
43:16
43:16
Play later
Play later
Lists
Like
Liked
43:16Send us a text This episode features the complete narration of my ebook: Mastering Sysmon – Deploying, Configuring, and Tuning in 10 Easy Steps, providing a step-by-step guide to getting Sysmon up and running for better threat detection and incident response. If you’re in security operations, digital forensics, or incident response, this episode wi…
…
continue reading
Send us a text So You Want to Build Your Own DFIR CTF? Ever wanted to build your own Digital Forensics and Incident Response (DFIR) Capture the Flag (CTF) challenge but weren’t sure where to start? In this episode of Traffic Light Protocol, we share the how-to of CTF builders, making it easy for anyone—no pentesting skills required! Today's episode…
…
continue reading

1
Episode 16 - Mastering the Basics: Key Strategies for Cyber Investigations
30:43
30:43
Play later
Play later
Lists
Like
Liked
30:43Send us a text Kicking off 2025, we're getting back to basics with something every cyber investigator needs to master—starting an investigation the right way. Too often, investigations get derailed because the right questions weren’t asked at the outset, evidence wasn’t properly handled, or reporting lacked clarity. In this episode, we cover how to…
…
continue reading

1
Protecting Investigators: Dr. Michael Bourke On Building A Healthier DFIR Community
48:59
48:59
Play later
Play later
Lists
Like
Liked
48:59Dr Michael Bourke joins the Forensic Focus Podcast to discuss the psychological impact of investigating internet crimes against children and how organizations can better support digital forensic investigators' mental health. As a distinguished clinical psychologist and researcher, Dr Bourke shares powerful insights from his extensive work in this f…
…
continue reading

1
Takeovers, DeepSeek Deceptions & the Cloud’s Dirty Laundry
40:14
40:14
Play later
Play later
Lists
Like
Liked
40:14In this episode of Breaking Badness, we dive into two major cybersecurity concerns: the risks of abandoned S3 buckets and a wave of phishing attacks impersonating DeepSeek. Watchtowr Labs uncovers how forgotten AWS storage can be hijacked for malicious purposes, potentially compromising military, government, and enterprise systems. Meanwhile, attac…
…
continue reading

1
Cybersecurity’s Evolution, 200 Puns Later!
44:36
44:36
Play later
Play later
Lists
Like
Liked
44:36Welcome to the 200th episode of Breaking Badness! 🎉 In this special milestone edition, we take a nostalgic stroll down memory lane, discuss the evolution of cybersecurity, and explore how the podcast—and the security landscape—has changed since 2019.In this special milestone episode, hosts Kali Fencl, Tim Helming, and Taylor Wilkes-Pierce are joine…
…
continue reading

1
DFIR In 2025 – AI, Smart Devices And Investigator Well-Being
1:01:16
1:01:16
Play later
Play later
Lists
Like
Liked
1:01:16Si and Desi kick off 2025 with a deep dive into critical trends shaping digital forensics. They tackle pressing challenges such as AI-driven threats, including deepfakes and AI-generated images, and examine the security risks associated with connected devices. The discussion also explores the ongoing impact of the pandemic on mental health, remote …
…
continue reading

1
Zero Trust, Secure Coding & Developer Incentives: Tanya Janca on AppSec’s Biggest Challenges
36:49
36:49
Play later
Play later
Lists
Like
Liked
36:49In this episode of Breaking Badness, we welcome back Tanya Janca, aka SheHacksPurple, to discuss her latest book, Alice and Bob Learn Secure Coding. Tanya dives deep into the fundamental principles of secure software development, the psychology behind developer incentives, and the often-overlooked importance of zero trust security.…
…
continue reading

1
DNS Errors and Malware Builders Turning on Attackers
35:10
35:10
Play later
Play later
Lists
Like
Liked
35:10In this episode of Breaking Badness, we analyze two fascinating cybersecurity incidents that expose both corporate misconfigurations and hacker missteps. Security researcher Philippe Caturegli discovered a typo in MasterCard’s DNS records, which left the company open to traffic hijacking and data exposure. This long-overlooked flaw, dating back yea…
…
continue reading

1
Leveling Up Mental Health: Tackling Gaming Toxicity and Cybersecurity Burnout
35:46
35:46
Play later
Play later
Lists
Like
Liked
35:46In this episode of Breaking Badness, Tricia Howard of Akamai joins Kali Fencl and Ian Campbell to dive deep into the intersection of gaming culture, mental health, and cybersecurity. Tricia shares her journey from theater arts to cybersecurity research, her love for gaming, and her experiences tackling emotional toxicity in digital spaces. The epis…
…
continue reading

1
Dr. Ethan Heilman - Enhancing Security with Bastion Zero and Exploring AI Ethics
46:17
46:17
Play later
Play later
Lists
Like
Liked
46:17Dr. Ethan Heilman, CTO of Bastion Zero, joins us to discuss the latest advancements in secure access technology and the ethical implications of AI systems. Dr. Heilman explains how Bastion Zero provides secure, passwordless access to servers, databases, and Kubernetes clusters without the need for VPNs or SSH keys. Key features include session reco…
…
continue reading

1
Mind Matters: Navigating DFIR with Balance
1:03:25
1:03:25
Play later
Play later
Lists
Like
Liked
1:03:25Send us a text Get ready for a hands-on look at digital forensics and the challenges professionals tackle every day. We share a story about forensic guessing that highlights the importance of testing assumptions and following the evidence to avoid errors. The discussion emphasizes how staying grounded in facts can prevent investigations from going …
…
continue reading

1
Inside The Minds Of CSAM Investigators With Prof. Patrick Brady
1:14:02
1:14:02
Play later
Play later
Lists
Like
Liked
1:14:02Professor Patrick Brady, a criminal justice and criminology professor at the University of Colorado Colorado Springs, joins the Forensic Focus Podcast to share his research on the mental health challenges faced by digital forensic investigators, particularly those handling child sexual abuse material (CSAM) cases. Drawing from personal experiences …
…
continue reading

1
Spring Cleaning Your Digital Life: APT Threats, Third-Party Breaches, and Chat Risks
31:06
31:06
Play later
Play later
Lists
Like
Liked
31:06In this episode of Breaking Badness, we dive into the cybersecurity headlines making waves in 2025. We discuss the U.S. Treasury breach, allegedly orchestrated by Chinese hackers using third-party access. Learn about how lingering chat histories can expose sensitive data and the importance of digital spring cleaning.…
…
continue reading

1
Tanya Janca on Secure Coding, AppSec, and Breaking Barriers in Cybersecurity
47:28
47:28
Play later
Play later
Lists
Like
Liked
47:28In this episode of Breaking Badness, we sit down with Tanya Janca, aka SheHacksPurple, a cybersecurity educator, and author of the best-selling book Alice and Bob Learn Application Security. Tanya shares her journey from software developer to AppSec expert, dives into the unique challenges of teaching secure coding, and discusses the impact of cybe…
…
continue reading

1
Cybersecurity Tales: Espionage, Ransomware, and the Stories Behind the Threats
34:03
34:03
Play later
Play later
Lists
Like
Liked
34:03Welcome to this special episode of the Breaking Badness Cybersecurity Podcast! We’re turning the spotlight on the books that have shaped the world of cybersecurity and inspired professionals in the field. As part of our ongoing book club series, this episode is a journey into storytelling, research, and the unique perspectives that make cybersecuri…
…
continue reading

1
New Year, New Discoveries: Diving into Digital Forensics!
1:16:29
1:16:29
Play later
Play later
Lists
Like
Liked
1:16:29Send us a text Kick off your new year with some forensic fun as we recount our holiday escapades and dive into the latest in digital forensics! Ever wondered how RAM dumps from Android devices can reveal crucial data? We spotlight MSAB's innovative RAMalyzer tool and their new blog series covering RAM from mobile devices. Discover how the digital f…
…
continue reading

1
Top Cyber Moments of 2024: Hoodies, Goodies, and Hilarious Puns
39:13
39:13
Play later
Play later
Lists
Like
Liked
39:13In this special episode of Breaking Badness, we wrap up 2024 with a countdown of the top episodes, puns, and cybersecurity moments that defined the year. From the hoodiest hacks to the goodiest wins, Kali, Tim, and Taylor reflect on critical insights, industry-changing events, and listener favorites. Tune in for discussions about evolving OT securi…
…
continue reading
Nick Furneaux, a renowned figure in digital forensics and cryptocurrency investigations, joins the Forensic Focus podcast. He shares his journey into the world of digital forensics, his work on covert data extraction tools, and his development of expertise in memory and cryptocurrency forensics. The conversation explores Nick's new book, 'There's N…
…
continue reading

1
Detecting AI Fakes: Forensic Image Analysis With Cellebrite
55:30
55:30
Play later
Play later
Lists
Like
Liked
55:30Heather and Jared Barnhart from Cellebrite join the Forensic Focus Podcast to explore the intersection of artificial intelligence and digital forensics. This insightful episode dives into detecting AI-generated imagery, combating misinformation, and addressing challenges posed by deepfakes. They discuss advancements in tools like Cellebrite's Media…
…
continue reading

1
2025 Cybersecurity Predictions: AI, Ransomware, and Quantum Threats
59:41
59:41
Play later
Play later
Lists
Like
Liked
59:41In this special 2025 Predictions episode of Breaking Badness, host Kali Fencl joins cybersecurity experts Sean McNee, Tim Helming, and Daniel Schwalbe to discuss the future of cyber threats and defense. From ransomware evolution and AI-powered attacks to quantum computing and “synthetic identity fraud,” the group compares their insights with predic…
…
continue reading

1
The Gift of Expertise: Why Forensics Matter in the Courtroom
1:19:31
1:19:31
Play later
Play later
Lists
Like
Liked
1:19:31Send us a text Join us for a holiday-themed episode of Digital Forensics Now, where we blend expert insights with personal stories from the field of digital forensics. This episode delves into cutting-edge tools and techniques for digital forensics. Explore insights from Arsenal on advanced methods for analyzing swap space and memory files. We also…
…
continue reading

1
S4: E5 Ediscovery Day—Career Advice from DFIR and ED Veterans
53:33
53:33
Play later
Play later
Lists
Like
Liked
53:33Join us for the “Heroes Unite: Exploring the Future of Legal Technology Careers” panel at the 3rd Annual ACEDS eDiscovery Day in Austin, Texas. This dynamic session brings together industry leaders to discuss the rapidly evolving legal technology landscape. Gain insights into how emerging technologies are reshaping career paths, the growing importa…
…
continue reading

1
DNS Gone Rogue & DARPA’s Cyber Puzzle: Lessons in Security Innovation
32:26
32:26
Play later
Play later
Lists
Like
Liked
32:26In this episode of Breaking Badness, we dive into two fascinating stories shaping the cybersecurity landscape. First, we unpack the case of Gabriel Koo and his surprising acquisition of the domain us-east-1.com, a domain closely tied to AWS’s naming conventions. What insights can this seemingly simple purchase reveal about DNS misconfigurations and…
…
continue reading

1
How To Solve Digital Forensics' Biggest Challenges With Oxygen Forensics
1:00:54
1:00:54
Play later
Play later
Lists
Like
Liked
1:00:54Matt Finnegan from Oxygen Forensics joins the Forensic Focus Podcast to share his journey into digital forensics, starting with his military background. He talks about what it’s like working with mobile devices, the challenges of keeping up with ever-changing smartphone security, and his role as a Solutions Architect. Matt also provides insights on…
…
continue reading

1
The Rise of Holiday Scams and State-Sponsored Cyber Threats
44:20
44:20
Play later
Play later
Lists
Like
Liked
44:20In this episode of Breaking Badness, we delve into the cybersecurity trends shaping the holiday season. We unpack the 60% surge in scam domain registrations targeting holiday shoppers, discuss the tactics of TAG-112, a Chinese state-sponsored threat group, and analyze their use of compromised websites to deliver Cobalt Strike malware. Plus, we shar…
…
continue reading

1
Breaking Down SBOMs: The Secret Weapon in Healthcare Security
31:22
31:22
Play later
Play later
Lists
Like
Liked
31:22In this episode of Breaking Badness, we dive into the critical challenges and innovations in healthcare cybersecurity with Ken Zalevsky, CEO of Vigilant Ops. From the vulnerabilities in medical devices to the revolutionary role of Software Bill of Materials (SBOMs), Ken shares his two decades of expertise in safeguarding patient safety and hospital…
…
continue reading

1
BFU Data, Forensic Tools, and the Future of Digital Investigations
1:17:52
1:17:52
Play later
Play later
Lists
Like
Liked
1:17:52Send us a text The latest episode of Digital Forensics Now kicks off with lighthearted banter about Heather's newfound fame in commercials, bringing a fun and relatable start to a tech-heavy discussion. Following the laughs, the conversation shifts to an invigorating recap of Alexis' recent experience at SANS DFIRCON, featuring interactions with di…
…
continue reading

1
195. From Wingdings to Warfare: Inside the Wildest Cybersecurity Stories
38:58
38:58
Play later
Play later
Lists
Like
Liked
38:58In this episode of Breaking Badness, we explore two fascinating cybersecurity stories. First, we delve into the unusual case of an ex-Disney employee who hacked menu systems, creating chaos in the happiest place on Earth. Next, we discuss Sophos' five-year-long battle with a determined group of attackers targeting their firewalls. Tune in as we bre…
…
continue reading

1
iOS 18’s Inactivity Reboots Explained: AFU to BFU Transitions with Chris Vance from Magnet Forensics
1:02:32
1:02:32
Play later
Play later
Lists
Like
Liked
1:02:32Send us a text Join us on the Digital Forensics Now podcast as we explore the details of the iOS 18 inactivity reboot issue with mobile forensics expert Christopher Vance from Magnet Forensics. Chris traces the origins of this challenge back to iOS 17 and explains how unified logs play a key role in diagnosing these system memory resets. This episo…
…
continue reading

1
Jason Haddix on Red Team Tactics, CISO Challenges, and the Battle for Gaming Security
44:21
44:21
Play later
Play later
Lists
Like
Liked
44:21In this episode of the Breaking Badness Cybersecurity Podcast, Jason Haddix dives into his unique journey from red teaming and pentesting to leading security teams as a CISO in high-profile organizations, including a top gaming company. Jason unpacks the distinct challenges of securing a gaming company, where risks come not only from state actors b…
…
continue reading

1
194. Locate X Unleashed & APT29’s Latest Gambit: The Battle for Digital Privacy
32:54
32:54
Play later
Play later
Lists
Like
Liked
32:54In this week’s episode of Breaking Badness, we dive deep into two major cybersecurity stories that are shaping today’s landscape. First, we explore the alarming capabilities of Locate X, a powerful smartphone tracking tool used by U.S. law enforcement without a warrant. How does it work, what are the privacy implications, and what can individuals d…
…
continue reading

1
Inside the Mind of ‘The Gibson’: Ethics, Activism, and the Evolution of Hacking
41:30
41:30
Play later
Play later
Lists
Like
Liked
41:30Join Kali Fencl as she dives deep into a conversation with cybersecurity veteran The Gibson. With 25+ years in InfoSec, The Gibson shares his journey from coding as a child to shaping threat intelligence and privacy-first technology today. In this episode, they discuss hacker ethics, the influential hacker groups Loft and Cult of the Dead Cow, the …
…
continue reading

1
193. Rogue Hackers and the Internet Archive Breach: 31 Million Accounts Exposed!
44:48
44:48
Play later
Play later
Lists
Like
Liked
44:48In this episode of Breaking Badness, Kali, Tim, and Taylor discuss two major stories shaking up the cybersecurity world. First, a researcher has discovered how attackers are exploiting Whois data to grant themselves unprecedented superpowers in the digital space. Second, the Internet Archive suffers a breach possibly exposing 31 million accounts, r…
…
continue reading

1
AI in Court: Testimony or Tech-tastrophe?
1:14:36
1:14:36
Play later
Play later
Lists
Like
Liked
1:14:36Send us a text Could AI in forensic analysis be more of a liability than an asset? Join us as we explore this pressing concern. We kick off this episode with an important update for those dealing with Android extractions. Recent changes to the Android OS and Google Play Store might be causing the Keystore (secrets.json) file to either miss data or …
…
continue reading

1
The Future of Endpoint Security: AI, EDR, and SOC Evolution
37:03
37:03
Play later
Play later
Lists
Like
Liked
37:03In this episode of Breaking Badness, we dive deep into the evolving world of Endpoint Detection and Response (EDR) and its critical role in modern cybersecurity. With threats advancing and the sheer volume of endpoint data skyrocketing, AI and deep learning are becoming gamechangers in threat detection and prevention. Join us as Carl Froggett, CIO …
…
continue reading