Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Channel Women In Security: True Crime And Adversary Tactics

CRN by CRN
February 11, 2025
Home News
Share on FacebookShare on Twitter

Jamie Levy, director of adversary tactics at Huntress, is a seasoned expert in digital forensics and cybersecurity. Levy shares insight on personal security practices and the need for organizations to be prepared for potential breaches.

Cass Cooper sat down with Huntress’ Jamie Levy. The two discuss the nuances of latent attacks, the importance of community in the cybersecurity field, and the challenges posed by data breaches. The conversation covers emerging trends in cybersecurity, including the evolving tactics of attackers and the role of AI in these developments.

[Previous CwIS Episode: Practical Insights For Internal Cybersecurity Protections]

The full episode can be watched on YouTube (above), heard on Spotify and Apple Podcasts.

Could you start by telling us about your background and how you ventured into digital forensics?

I started out studying computer science, but I wanted to do something more interesting combining my fascination with true crime and technology. I enrolled in John Jay College’s forensic computing program and dove right into research around memory encryption. That led me to the Volatility Project [an open-source memory forensics framework], where I became a developer. Over the years, I’ve taught forensics classes, consulted on malware analysis and contributed to developing various forensic tools.

You’ve been in digital forensics for more than a decade. Can you share a particularly challenging investigation and what it taught you about adversaries?

Sure. One case involved an adversary using a suspiciously small DLL as a backdoor. Because of its tiny size, it didn’t immediately raise red flags to some analysts. It turned out to be an active backdoor—a lesson in not dismissing files based on ‘expected’ size.

Another case featured an attacker lying dormant for a long period, waiting for a single UDP packet to open a secondary backdoor. That taught me that patient adversaries might appear inactive. By the time they trigger their payload, it’s often too late. You can’t always rely on obvious signs like flashy ransomware alerts. Sometimes it’s the tiniest signals that matter most.

Tell us about your involvement with the Volatility Foundation. What role does the foundation play, and how do you foster new talent there?

Volatility is an open-source memory forensics project. My current focus with the foundation is mentorship—encouraging new contributors to develop plugins, improve documentation and build upon the tool. It’s great to see newcomers add fresh ideas, especially students looking to demonstrate their skills in forensic research.

Since this series highlights women in security, what is your view on gender diversity in digital forensics?

I’ve found the digital forensics community very welcoming to women and people of all backgrounds. Compared to some other security subfields, forensics has been more inclusive. There’s a strong sense of collaboration; if someone has curiosity and willingness to learn, they tend to be embraced here. We continue pushing for broader diversity through mentorship and open-source participation, so everyone can feel at home in this space.

True crime and forensics are extremely popular right now, even in mainstream culture. A lot of us hear about data breaches—like the 23andMe incident. From your perspective, what steps should organizations and individuals take to protect data?

From an individual standpoint:

  1. Use strong passwords and multifactor authentication (MFA).
  2. Avoid reusing passwords across multiple sites.
  3. Limit the personal data you provide. If a platform doesn’t actually require your birthday, consider using a placeholder or different date.

For organizations:

  1. Encrypt stored data so it’s not easily accessible if breached.
  2. Implement data retention limits, so only necessary information is kept.
  3. Conduct regular tabletop exercises to rehearse worst-case breach scenarios.
  4. Deploy security solutions that provide visibility, so if there’s a breach, alarms are triggered quickly.

Phishing remains a huge problem, as we’ve seen with recent high-profile data breaches. What forensic methods help organizations respond after a phishing incident?

Effective forensics involves:

  • Analyzing email headers to see how attackers disguised themselves.
  • Reviewing system logs to determine which accounts or machines are compromised.
  • Isolating affected systems swiftly.
  • Running incident response (IR) playbooks that outline containment and recovery steps.
  • Post-event lessons learned, so the organization can improve training and update processes.

Sadly, smaller organizations often don’t have an IR plan until it’s too late. They don’t think they’re a target. Everyone, regardless of size, should be prepared because attackers look for easy openings.

What emerging threats and tactics do you see on the horizon—especially with AI and deepfakes?
We’re seeing attackers:

  1. Leverage AI to craft more believable phishing emails and refine their malware.
  2. Use deepfake voices or videos to pose as employees or partners, bypassing basic security checks.
  3. Exploit stolen email content to create legitimate-looking invoices or documents.

These trends mean we need to think beyond superficial ‘red flags.’ Even if a voice sounds right or an invoice looks authentic, we must verify through independent methods—like calling the person back on a known number or using separate communication channels to confirm identities.

Before we wrap up, is there anything you’d like to share about your current work at Huntress or any final advice for our audience?
At Huntress, we’re committed to making advanced security accessible, especially for smaller businesses that might not have in-house security teams. We’re also hiring. If you’re passionate about forensics, security or just want to help organizations defend themselves, check out our careers page. We want people who are curious, driven and ready to shape the future of cybersecurity.



Source link

Tags: Channel Women In SecurityLatest Videos
CRN

CRN

Next Post
Chainlink CCIP, Data Streams, and Data Feeds Are Now Live on Soneium Mainnet

Chainlink CCIP, Data Streams, and Data Feeds Are Now Live on Soneium Mainnet

Recommended.

ZTE recognized with EcoVadis Gold Medal for sustainability excellence, ranked among the top 4% globally

ZTE recognized with EcoVadis Gold Medal for sustainability excellence, ranked among the top 4% globally

January 21, 2025
Zscaler Finding A ‘Second North Star’ In Security Operations, Partner Services Push

Zscaler Finding A ‘Second North Star’ In Security Operations, Partner Services Push

June 5, 2025

Trending.

⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

October 6, 2025
Cloud Computing on the Rise: Market Projected to Reach .6 Trillion by 2030

Cloud Computing on the Rise: Market Projected to Reach $1.6 Trillion by 2030

August 1, 2025
Stocks making the biggest moves midday: Autodesk, PayPal, Rivian, Nebius, Waters and more

Stocks making the biggest moves midday: Autodesk, PayPal, Rivian, Nebius, Waters and more

July 14, 2025
The Ultimate MSP Guide to Structuring and Selling vCISO Services

The Ultimate MSP Guide to Structuring and Selling vCISO Services

February 19, 2025
Translators’ Voices: China shares technological achievements with the world for mutual benefit

Translators’ Voices: China shares technological achievements with the world for mutual benefit

June 3, 2025

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio