iOS 18’s Inactivity Reboots Explained: AFU to BFU Transitions with Chris Vance from Magnet Forensics

iOS 18’s Inactivity Reboots Explained: AFU to...

Up next

From Wins to Wishlists: Digital Forensics Year in Review

Send us a textA blue jay, a busted feeder, and a brand-new camera set the tone, but only briefly. We kick off the new year with updates from the Florida ICAC conference, including firsthand courtroom experience watching frame rate and frame count testimony in action. The episode ...  Show more

Brett Shavers Blogging Extravaganza!

Send us a textThis episode digs into the habits that actually hold up: learning from CTF wins and post-event reviews, exploring scholarships and Reno trainings that build technical muscle, and walking through expert-witness prep that turns courtroom stress into structured, confid ...  Show more

Recommended Episodes

Watching the watchers. IoT vulnerabilities exposed by AI. [Research Saturday]
CyberWire Daily

This week, we are joined by Andrew Morris, Founder and CTO of GreyNoise, to discuss their work on "GreyNoise Intelligence Discovers Zero-Day Vulnerabilities in Live Streaming Cameras with the Help of AI." GreyNoise discovered two critical zero-day vulnerabilities in IoT-connected ...  Show more

Navigating AI Safety and Security Challenges with Yonatan Zunger [The BlueHat Podcast]
CyberWire Daily

While we are on our winter publishing break, please enjoy an episode of our N2K CyberWire network show, The BlueHat Podcast by Microsoft and MSRC. See you in 2025! Yonatan Zunger, CVP of AI Safety & Security at Microsoft joins Nic Fillingham and Wendy Zenone on this week's episo ...  Show more

Only as good as the data
Practical AI

You might have heard that “AI is only as good as the data.” What does that mean and what data are we talking about? Chris and Daniel dig into that topic in the episode exploring the categories of data that you might encounter working in AI (for training, testing, fine-tuning, ben ...  Show more

Threat modeling LLM apps
Practical AI

If you have questions at the intersection of Cybersecurity and AI, you need to know Donato at WithSecure! Donato has been threat modeling AI applications and seriously applying those models in his day-to-day work. He joins us in this episode to discuss his LLM application securit ...  Show more