Secure AF - A Cybersecurity Podcast
Think like a hacker. Defend like a pro.
Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape.
Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insights, expert interviews, and unfiltered discussions with Alias team members and top-tier guests from across the cybersecurity spectrum.
Stay sharp. Stay informed. Stay Secure AF.
Episodes
156 episodes
Qilin Ransomware’s EDR Killer DLL – How Attackers Are Subverting Defenses
Qilin ransomware is deploying a malicious DLL to disable EDR tools before encryption begins. In this #SOCBrief, we break down how the attack works, what to look for, and how defenders can respond.
AI’s Inflection Point: From Productivity Tool to Existential Risk
Artificial intelligence is evolving faster than most organizations, and regulators, are prepared for. In this episode of the #SecureAFPodcast, we sit down with Chris Hood, a veteran technologist and financial industry leader, to...
Axios NPM Supply Chain Compromise – Lessons for SOCs on Third-Party Risks
A malicious Axios NPM package highlights how quickly supply chain compromises can spread through trusted dependencies. In this #SOCBrief, we break down what happened, the risks to downstream applications, an...
Black Shrantac Ransomware – LOTL Tactics and Double Extortion on the Rise
A new ransomware group is blending in with legitimate tools. This #SOCBrief breaks down Black Shrantac and how to detect it early.
Think Fast or Get Pwned: How Esports Is Forging Elite Cyber Defenders
Cybersecurity success increasingly hinges on cognitive readiness, the ability to spot patterns fast, make the right calls under pressure, and perform amid chaos. On this episode of the SECURE AF PODCAST, Will Arnett...
Iranian APTs Targeting U.S. PLCs: OT Wake-Up Call for SOCs
Iranian-affiliated APT actors are actively targeting U.S. critical infrastructure, specifically PLCs powering essential operations across water, energy, and manufacturing.This #SOCBrief breaks down the latest CISA alert, ...
Google Chrome Zero-Days Under Active Attack – What SOCs Need to Do Now
Chrome just became the attack surface of the week.We’re breaking down the latest zero-day exploits, what attackers are doing with them, and how SOC teams can respond before it turns into something bigger.
Beyond the Network: The Rise of Medical Device Security
Healthcare security isn’t just about networks anymore. In this episode, we dive into the complex world of connected medical devices, the challenges of securing them, and why organizations need a more holistic approach to cy...
Interlock Ransomware Hits Cisco FMC Zero-Day: Lessons for SOCs on Edge Device Security
Your firewall could be the entry point. A critical Cisco FMC zero-day is being used in real-world ransomware attacks, turning security tools into launchpads. In this episode, we cover what’s happening, how attackers ...
Chinese Hackers Breach FBI Surveillance Network: Supply-Chain Lessons for SOCs
Suspected Chinese state-linked hackers breached an FBI surveillance network ... not by breaking through the front door, but through a third-party provider.In this episode of the #SOCBrief, we break down how the attack happened, wh...
Ransomware as a Business: Inside Qilin’s Rise
Qilin is quickly becoming one of the most dominant ransomware groups in the world, and it’s not because of groundbreaking tactics. It’s because of their business model.In this episode, we break down how Qilin ...
MuddyWater's New BugSleep Malware – Iran's Cyber Retaliation Ramps Up
In this episode of the #SOCBrief, we break down BugSleep, a new backdoor malware tied to the Iranian threat group MuddyWater, and how it’s being used in targeted spear-phishing campaigns against organizations. Learn ho...
🚨 The Telus Hack – ShinyHunters Strikes a Telecom Giant 🚨
A massive breach has shaken the telecom world. In this episode of the #SOCBrief, we break down the alleged TELUS hack claimed by the ShinyHunters threat group, what data may have been stolen, and why the pot...
A.I. as a Multiplier: Introducing Vector Pulse A.I.
A.I. conversations are everywhere ... but how can businesses realistically use it today? In this episode of Secure AF, we introduce Vector Pulse A.I. and discuss how A.I. can help organizations automate workflows, improve operational eff...
Heightened Cyber Threats Amid U.S.-Iran Conflict Escalation
Geopolitical tensions are rising ... and cyber threats aren’t far behind. In this episode of the #SOCBrief, we break down the escalating U.S.-Iran conflict, the potential cyber retaliation from Iranian threat actors, and the steps SOC te...
OSINT Essentials – Unlocking Not So Hidden Insights for Your SOC
Open-source intelligence (OSINT) isn’t just for threat actors ... it’s a powerful advantage for SOC teams too. In this episode, we break down how publicly available data can help you uncover exposed assets, detect vulnerabilitie...
Talking SOC Shop: How SOCs Show Value to Leadership 📈
This episode of the #SOCBrief goes beyond day-to-day cybersecurity news and dives into what SOC success actually looks like from the leadership side. Andrew and CISO Jonathan Kimmitt discuss how SOC teams can communicate ...
Keeping AI Human-Centered in Digital Forensics 🧑💻⚖️
AI can categorize images, analyze logs, and surface patterns faster than any human ever could, but it doesn’t understand context, legality, or nuance. In this episode, we discuss how AI is transforming criminal forensics and SOC investigations ...
SmarterMail RCE Flaw – Ransomware's New Favorite Door
No phishing. No user interaction. Just exposed services and a missing authentication check. In this episode of the #SOCBrief, we dive into the SmarterMail RCE flaw already being exploited in the wild and why mail servers continue to be prime ra...
MSI Mayhem – RATs Hiding in Phishing Installers to Evade Detection 🧠
Attackers are hiding remote access trojans (RATs) inside malicious MSI installers disguised as legit software, and it’s surging in early 2026. We break down how these phishing attacks bypass EDR, what to look for, and how SOC team...
Love as an Attack Vector 💌
Romance scams spike around Valentine’s Day ... and they’re more dangerous than you think. In this episode, we break down how scammers build emotional trust, isolate victims, and turn relationships into financial and emotional traps. Learn the w...
Double Trouble: Microsoft Office and Fortinet FortiCloud Flaws Under Attack 💥
This week’s #SOCBrief covers a dangerous double-hit: a Microsoft Office security bypass and a Fortinet FortiCloud authentication flaw, both exploited in the wild. Andrew walks through what the CVEs mean, how attackers are abusing trusted...
Top Ransomware Threats Dominating Early 2026
Ransomware is kicking off 2026 at full speed. We break down the top active groups right now, how they’re getting in, what infrastructure they’re targeting, and the key indicators your SOC should be watching to stay ahead. 🔐⚠️
📂 Inside the Breaches: Real Insider Threat Case Files
Insider threats don’t start with malware ... they start with access. From disgruntled employees to overlooked contractors, this episode breaks down real-world cases, common patterns, and how organizations can better protect what matters most. 🎧...
CISA Retires 10 Emergency Directives – Progress for Feds, Wake-Up for the Rest of Us
CISA has officially retired 10 emergency directives ... marking real progress for federal cybersecurity 🚀 But for the private sector, these “old” vulnerabilities are still very much in play ⚠️ In this #SOCBrief, we break down what was re...