PodGrabber.com
PodGrabber Logo/Mascot - Blue Gorilla with Red Headphones

The Cyber Threat Perspective - Archive

Generated 2026-04-10 00:11:32

← Back to PodGrabber Archives

Click title to play/pause!

Episode 176: Cybersecurity Advice That Sounds Smart But Fails in Practice

Podcast image

Published: 04/09/2026 09:00:00

Episode 176: Cybersecurity Advice That Sounds Smart But Fails in Practice Episode Details

In Episode 176 of the Cyber Threat Perspective podcast, Brad and Spencer break down some of the most repeated cybersecurity best practices in the industry and explain why, despite sounding solid on paper, they consistently fall short in real IT environments. This isn't about dismissing good security principles. It's about closing the gap between advice that looks great in a framework and controls that actually hold up against how attackers operate. Topics covered include: "Just enable MFA eve...

Episode 175: NetTools - The Free Active Directory Swiss Army Knife for IT Admins & Pen Testers

Podcast image

Published: 04/02/2026 06:00:00

Episode 175: NetTools - The Free Active Directory Swiss Army Knife for IT Admins & Pen Testers Episode Details

In Episode 175, Spencer and Tyler break down NetTools — a free, self-contained Active Directory management and troubleshooting tool that’s become a go-to for their internal penetration testing engagements. They start with the backstory: years of relying on AD Explorer from Microsoft Sysinternals, and the growing need to evade EDR detections. At one point, that meant manually obfuscating binaries with a hex editor. NetTools eliminates that friction entirely — no installation, no dependencies, ...

Episode 174: Web Application Penetration Testing Tools & Techniques with Jordan

Podcast image

Published: 03/26/2026 12:00:00

Episode 174: Web Application Penetration Testing Tools & Techniques with Jordan Episode Details

In Episode 174, host Brad Causey is joined by guest Jordan Natter for a practical, tool-focused conversation on web application penetration testing. Together they break down the essential tools and Burp Suite Pro extensions that make up a modern web app pen testing toolkit. Topics covered include: Burp Suite Pro vs. OWASP ZAP — comparing capabilities, extensions, and use casesCSP Auditor — identifying unsafe Content Security Policy directivesJSON Web Token (JWT) extension — surfacing and tamp...

Episode 173: How to Find Insecure Active Directory Permissions with ADeleg

Podcast image

Published: 03/19/2026 12:00:00

Episode 173: How to Find Insecure Active Directory Permissions with ADeleg Episode Details

How do you find insecure permissions in Active Directory before they turn into attack paths? In this episode, we take a practical look at how to identify insecure Active Directory permissions using ADeleg, a free security tool trusted by penetration testers. Misconfigured delegation and overly permissive access rights are a common source of risk in Active Directory environments. These gaps can create hidden attack paths—but many teams don’t know where to look or how to interpret what they’re ...

Episode 172: The biggest security blind spots in Midsized companies

Podcast image

Published: 03/12/2026 00:00:00

Episode 172: The biggest security blind spots in Midsized companies Episode Details

Hey folks! Greetings from the Offensive Security group at SecurIT360. Brad & Spencer are on this episode of The Cyber Threat Perspective to break down The Biggest Security Blind Spots in Mid-Size Companies. In this episode, we expose the most common (and dangerous) gaps that leave mid-sized organizations wide open: poor asset inventory, flat networks, flat identities, overconfidence in security tools, credential reuse, and the emerging risks with AI. If any of these hit home, go to offs...

Episode 171: The future of pentesting with AI

Podcast image

Published: 03/06/2026 00:00:00

Episode 171: The future of pentesting with AI Episode Details

Pentesting is quickly evolving with the integration of AI, fundamentally changing how cybersecurity professionals approach their work. In this episode, Spencer and Brad discuss the real shifts they’re seeing in the industry and what the future may look like. The pivotal changes in AI that have impacted pentesting over the past yearThe emergence of agents, orchestration, and single-pane-of-glass platforms for streamlined operationsHow AI is enabling rapid tool creation, customization, and admi...

Episode 170: The Evasive Adversary

Podcast image

Published: 02/27/2026 04:00:00

Episode 170: The Evasive Adversary Episode Details

In this episode, we break down the biggest insights from the CrowdStrike 2026 Global Threat Report and what they actually mean for IT leaders, security teams, and executives. From attackers abusing trusted identities and bypassing security tools to exploiting edge infrastructure and leveraging AI to move faster than ever, the modern threat landscape is shifting in ways many organizations aren’t prepared for. https://www.crowdstrike.com/en-us/global-threat-report/ https://mhaggis.github.io/Cli...

Episode 169: Malicious Browser Extensions

Podcast image

Published: 02/20/2026 04:00:00

Episode 169: Malicious Browser Extensions Episode Details

In this episode, we’re digging into malicious browser extensions...the quiet, often overlooked attack vector living inside nearly every organization. While we focus on patching servers, hardening Active Directory, and deploying EDR, attackers are increasingly abusing the browser as their initial foothold. We’ll break down how these extensions work, why they’re so dangerous, and what IT leaders can realistically do about it. Check out these resources: Annex - Enterprise Software Extension Se...

Episode 168: Do you need a web app pen test?

Podcast image

Published: 02/13/2026 00:00:00

Episode 168: Do you need a web app pen test? Episode Details

Brad and Jordan talk bout web app pen testing, why you might need it, and why other forms of app sec might not be good enough. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇ Spencer's Links: https://spenceralessi.com Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.

Episode 167: TLS and SSL vulnerabilities - do they matter?

Podcast image

Published: 02/06/2026 00:00:00

Episode 167: TLS and SSL vulnerabilities - do they matter? Episode Details

You've got Tyler & Brad and In this episode, we break down the early versions of Transport Layer Security (TLS) — TLS 1.0 and TLS 1.1 — and explain why these once-standard encryption protocols are now considered insecure. We’ll cover when they were released, how modern attacks and cryptographic weaknesses caught up with them, and why today’s internet relies on newer, more secure protocols like TLS 1.2 and TLS 1.3. We’ll also discuss how even “secure” protocols can become vulnerable when w...

Episode 166: Why Your Pentest Didn’t Make You Safer

Podcast image

Published: 01/30/2026 04:00:00

Episode 166: Why Your Pentest Didn't Make You Safer Episode Details

In this episode, we explore why many organizations invest in penetration testing yet see little improvement in their actual security posture. We discuss the common pitfalls of treating pentests as one-time events, how attackers operate very differently from scoped assessments, and why remediation—not the report—is what determines real safety. If you’ve ever wondered why “passing” a pentest didn’t translate into stronger defenses, this episode is for you. Blog: https://offsec.blog/ Youtube: ht...

Episode 165: What to expect on your API Pentest

Podcast image

Published: 01/23/2026 00:00:00

Episode 165: What to expect on your API Pentest Episode Details

In this episode, Brad and Jordan talk about API pen testing, how it works, and what you can expect if you want to procure one. They discuss pitfalls, common findings, and ways to streamline the process. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇ Spencer's Links: https://spenceralessi.com Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal ...

Episode 164: Offensive Security in the Age of AI: What Has Changed

Podcast image

Published: 01/16/2026 04:00:00

Episode 164: Offensive Security in the Age of AI: What Has Changed Episode Details

In this episode, we take a step back from the AI hype and focus on what has actually changed in offensive security. AI isn’t replacing attackers or inventing brand-new techniques, but it is dramatically reducing friction across the attack lifecycle. We break down the myths, explain where AI is already impacting real-world attacks, and walk through how defenders need to adapt if they want to keep up. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x...

Episode 163: The Vendor Security Trap: Are You Losing Control?

Podcast image

Published: 01/09/2026 04:00:00

Episode 163: The Vendor Security Trap: Are You Losing Control? Episode Details

In this episode, we dissect the dangerous trend of organizations ceding control of their security strategy to vendors, exploring the pitfalls of vendor lock-in, overspending, and the illusion of comprehensive protection. We'll provide actionable steps to reclaim your security posture and build an independent strategy tailored to your specific needs. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇ Spen...

Episode 162: Before the Breach How Attackers Profile Your Organization

Podcast image

Published: 12/19/2025 04:00:00

Episode 162: Before the Breach How Attackers Profile Your Organization Episode Details

In this episode, Brad and Spencer from SecurIT360's Offensive Security group delve into the crucial reconnaissance phase attackers undertake before launching an attack. They discuss the real-world impact of seemingly harmless data leaks, how attackers chain them together to build a profile of your organization, and common misconceptions about what data is truly "sensitive" from an external attacker's perspective. Learn how organizations can realistically assess their external attack surface b...

Episode 161: The Evolution of Pentesting Going Into 2026

Podcast image

Published: 12/12/2025 04:00:00

Episode 161: The Evolution of Pentesting Going Into 2026 Episode Details

In this episode Brad and Spencer discuss the rapid technology shift that's happening in cybersecurity, hybrid pentesting models and the overall evolution of pen testing as we head into 2026. Need a pentest before the end of the year? Learn how here... Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇ Spencer's Links: https://spenceralessi.com Work with Us: https://securit360.com | Find vulnerabilities t...

Episode 160: Should You Alert Your SOC Before a Pentest?

Podcast image

Published: 12/05/2025 04:00:00

Episode 160: Should You Alert Your SOC Before a Pentest? Episode Details

In this episode, we're discussing the pros and mostly the cons of notifying your SOC/MSSP before your penetration test. Spencer and Brad delve into the details of why it matters and share their experience from hundreds of penetration tests. Get your 2025 External Pentest done before time runs out! https://www.securit360.com/external-penetration-testing-services-sa/ Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com/cyberthreatpov Follow Sp...

Episode 159: How to Break Into Cybersecurity in 2026

Podcast image

Published: 11/28/2025 04:00:00

Episode 159: How to Break Into Cybersecurity in 2026 Episode Details

In this episode, we’re sharing practical, no-fluff advice for getting into cybersecurity, whether you're switching careers, just starting out, or leveling up your IT skills. We’ll cover what actually matters to employers, what to avoid, and the fastest paths into the industry. If you’re looking for a clear roadmap into cybersecurity, this episode is for you. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com/cyberthreatpov Follow Spencer on soci...

Episode 158: How to get kicked out of AWS by the FBI

Podcast image

Published: 11/21/2025 04:00:00

Episode 158: How to get kicked out of AWS by the FBI Episode Details

In this episode Brad and Jordan sit down to discuss how she was caught and reported on a penetration test engagement. We deep dive into the details and why it's a net positive. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇ Spencer's Links: https://spenceralessi.com Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.

Episode 157: AppSec Findings in 2025

Podcast image

Published: 11/13/2025 04:00:00

Episode 157: AppSec Findings in 2025 Episode Details

In this episode Brad and Jordan sit down to discuss common web application security findings we've seen this year. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇ Spencer's Links: https://spenceralessi.com Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.

Episode 156: Post-Exploitation Tactics That Still Work in 2025

Podcast image

Published: 11/07/2025 04:00:00

Episode 156: Post-Exploitation Tactics That Still Work in 2025 Episode Details

In this episode Spencer and Tyler discuss post-exploitation tactics that still work in 2025. The guys discuss everything from credential access techniques to defense evasion, lateral movement and even exfiltration. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇ Spencer's Links: https://spenceralessi.com Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do int...

Episode 155: How We Use AI Offensively

Podcast image

Published: 10/31/2025 04:00:00

Episode 155: How We Use AI Offensively Episode Details

In this episode, we're taking a deep dive into how the Offensive Security group at SecurIT360 is strategically leveraging and utilizing artificial intelligence technologies in offensive security operations. We'll explore the innovative ways this team is harnessing the power of AI to enhance their penetration testing capabilities, automate security assessments, and identify vulnerabilities more efficiently. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: ht...

Episode 154: Pentesting on a Budget for IT Admins

Podcast image

Published: 10/24/2025 04:00:00

Episode 154: Pentesting on a Budget for IT Admins Episode Details

This episode is all about pentesting on a budget for IT Admins. This episode is inspired by the PDQ Live stream held on October 23rd, 2025, where Spencer shared tips, tactics, tools and advice for IT admins wanting to better defend and protect their environments. All tools, checklists, guides and resources can be found here: https://go.spenceralessi.com/budget Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com/cyberthreatpov Follow Spencer on so...

Episode 153: How to Prove Your Security Works Before Attackers Do

Podcast image

Published: 10/17/2025 04:00:00

Episode 153: How to Prove Your Security Works Before Attackers Do Episode Details

In this episode, we dig into how to move from “we think we’re secure” to “we can prove it.” We’ll lay out a practical loop for validating controls, gathering evidence, and tracking results that leadership understands. If you’ve ever wondered how to demonstrate security value beyond dashboards and audits, this is your playbook. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇ Spencer's Links: https://sp...

(replay) Common Pentest Findings That Shouldn't Exist in 2025

Podcast image

Published: 10/10/2025 04:00:00

(replay) Common Pentest Findings That Shouldn't Exist in 2025 Episode Details

In this episode of The Cyber Threat Perspective, we highlight the pentest findings that, frankly, have no business showing up in 2025. From accounts with weak passwords and no MFA to plaintext credentials on file shares, we break down the common misconfigurations and oversights that attackers still abuse, despite years of seeing the same issues over and over again. If you're an IT admin or security leader, this episode is your checklist of what to fix yesterday. Blog: https://offsec.blog/ You...

Episode 152: What is Offensive Security?

Podcast image

Published: 10/03/2025 04:00:00

Episode 152: What is Offensive Security? Episode Details

In this episode, Spencer and Brad dig into a question that comes up all the time: what exactly is offensive security? Hint: it’s not just “pentesting.” Offensive security covers a whole spectrum of activities, including, penetration testing, red teaming, purple teaming, adversary emulation, and more. We’ll break down what each of these means, how they’re different, and how we do things at SecurIT360. By the end, you’ll have a clearer picture of how offensive security fits into a bigger securi...

Episode 151: Tool Time - PingCastle for Defenders

Podcast image

Published: 09/26/2025 04:00:00

Episode 151: Tool Time - PingCastle for Defenders Episode Details

In this episode, we’re digging into a super awesome Active Directory security tool called PingCastle. We’ll cover what it is, why it matters for Active Directory security, and how IT and security teams can leverage it to get ahead of adversaries. PingCastle is a staple tool on our internal pentesting toolbelt. In this episode, you will find out why. 👉Find vulnerabilities that matter, learn about how we do assume breach internal pentesting here. Blog: https://offsec.blog/ Youtube: https://www....

Episode 150: How to Use Pentest Findings to Justify Your Next Security Spend

Podcast image

Published: 09/19/2025 09:00:00

Episode 150: How to Use Pentest Findings to Justify Your Next Security Spend Episode Details

https://offsec.blog/budget In this episode, we’re tackling an often-overlooked opportunity: using pentest results to secure more budget for security initiatives. Too many organizations run a pentest, file the report away, and move on without leveraging it for strategic value. We’ll break down how to translate findings into business language, influence leadership, and turn vulnerabilities into funding for better defenses. Click here to see if you're a fit for our style of internal pentesting. ...

Episode 149: Building a Security Stack That Works A Practitioner’s Perspective

Podcast image

Published: 09/12/2025 04:00:00

Episode 149: Building a Security Stack That Works A Practitioner's Perspective Episode Details

In this episode, Brad and Spencer sit down with an experienced information security and risk manager to explore how they build and manage their security stack, choose the right tools, and win support from their team and leadership. We dig into the balance between technical defenses and business-driven risk management, from budgeting and vendor selection to measuring success and preparing for emerging threats. Whether you’re a hands-on practitioner or a security leader, you’ll walk away with p...

Episode 148: Securing Windows: Common Misconfigurations That Give Attackers The Advantage

Podcast image

Published: 09/05/2025 04:00:00

Episode 148: Securing Windows: Common Misconfigurations That Give Attackers The Advantage Episode Details

This is the webinar I gave in August 2025 on the topic of common Windows misconfigurations I see during internal pentests. Make sure you grab your free gifts! Learn how we do internal pentesting differently... https://securit360.com/free-gifts https://links.spenceralessi.com/creds https://go.spenceralessi.com/windows-slides Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇ Spencer's Links: https://spenc...

Episode 147: When to Accept the Risk

Podcast image

Published: 08/29/2025 04:00:00

Episode 147: When to Accept the Risk Episode Details

In this episode, we’re digging into one of the most overlooked parts of a penetration test, when it actually makes sense to not fix a finding. Not every vulnerability deserves equal treatment, and sometimes accepting the risk is the most mature decision a business can make. We’ll cover how to recognize those situations, avoid common pitfalls, and document your choices so they stand up to scrutiny. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter:...

Episode 146: What Are the Security Implications of AI?

Podcast image

Published: 08/22/2025 04:00:00

Episode 146: What Are the Security Implications of AI? Episode Details

In this episode of The Cyber Threat Perspective, we’re exploring the broader security implications of artificial intelligence. AI is transforming everything—from how we defend our networks to how attackers exploit them. We’ll break down the risks, the opportunities, and what security teams need to be thinking about right now as AI becomes embedded in both our tools and becomes a part of our daily life. Spencer's next webinar 8/28 12pm Eastern Topic: Securing Windows, Common Misconfigurations ...

Episode 145: What To Do Minute 1 When Incident Response Arrives

Podcast image

Published: 08/15/2025 04:00:00

Episode 145: What To Do Minute 1 When Incident Response Arrives Episode Details

In this episode, we're diving into what to do the minute incident response arrives. That first moment matters—a lot. Whether it's a ransomware attack, unauthorized access, or data exfiltration, how you act in minute one can either help or hinder the investigation. We’ll cover the do’s, don’ts, and common mistakes we see, so you’re ready when the heat is on. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com/cyberthreatpov Follow Spencer on socia...

Episode 144: How Cyber Threat Actors Are Using AI

Podcast image

Published: 08/08/2025 04:00:00

Episode 144: How Cyber Threat Actors Are Using AI Episode Details

In this episode of The Cyber Threat Perspective, we're diving into one of the most pressing trends in cybersecurity: how threat actors are using AI. From deepfake scams and AI-generated phishing emails to automated malware and voice cloning, attackers are leveraging artificial intelligence to scale their operations and sharpen their tactics. We’ll break down real-world examples, tools like WormGPT, and what this means for defenders going forward. Blog: https://offsec.blog/ Youtube: https://ww...

Episode 143: Stop Wasting Money on Pentests - Do This First

Podcast image

Published: 08/01/2025 04:00:00

Episode 143: Stop Wasting Money on Pentests - Do This First Episode Details

In this episode, we break down a question that often gets overlooked: When should you not do a penetration test? Not every organization needs a pentest right away, and choosing the wrong assessment can waste time, money, and effort. We’ll walk through the differences between pentests, vulnerability scans, and risk assessments — and when each one is the right move. Learn how we do internal pentesting differently... Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twi...

Episode 142: How Active Directory Certificates Become Active Threats

Podcast image

Published: 07/25/2025 04:00:00

Episode 142: How Active Directory Certificates Become Active Threats Episode Details

In this episode, we're diving into one of the most overlooked yet dangerous components of Active Directory: Certificate Services. What was designed to build trust and secure authentication is now being exploited by attackers to silently escalate privileges and persist in your environment. We’ll break down how AD CS works, how it gets abused, and what defenders need to do to lock it down. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com/cyberth...

Episode 141: Are You Making These Windows Security Mistakes

Podcast image

Published: 07/18/2025 04:00:00

Episode 141: Are You Making These Windows Security Mistakes Episode Details

It’s easy to overlook small misconfigurations on Windows endpoints, but those little mistakes can create big opportunities for attackers. In this episode, we break down the most common Windows security missteps we see in real-world environments, from missing the basics to reused local admin passwords. If you’re a sysadmin, IT admin, or just responsible for keeping Windows machines secure, this one's for you. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: ...

Episode 140: Financial Services Cybersecurity Challenges & How to Address Them - Part 2

Podcast image

Published: 07/11/2025 04:00:00

Episode 140: Financial Services Cybersecurity Challenges & How to Address Them - Part 2 Episode Details

In this episode, we dive into the unique cybersecurity challenges faced by the financial services sector, from high-value targets and strict compliance requirements to the constant threat of phishing and ransomware. We’ll break down common attack paths, what makes financial orgs so attractive to threat actors, and most importantly, what IT and security teams can do to stay ahead. Whether you're on the red team, blue team, or in leadership, this episode will help you strengthen your security p...

Episode 139: Financial Services Cybersecurity Challenges & How to Address Them - Part 1

Podcast image

Published: 07/04/2025 04:00:00

Episode 139: Financial Services Cybersecurity Challenges & How to Address Them - Part 1 Episode Details

In this episode, we dive into the unique cybersecurity challenges faced by the financial services sector, from high-value targets and strict compliance requirements to the constant threat of phishing and ransomware. Whether you're on the red team, blue team, or in leadership, this episode will help you strengthen your security posture in one of the most targeted industries on the planet. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com/cyberth...

(Replay) How We Evade Detection During Internal Pentests

Podcast image

Published: 06/27/2025 07:00:00

(Replay) How We Evade Detection During Internal Pentests Episode Details

(Replay) In this episode, Spencer and Brad discuss the ever popular and highly debated topic of evasion. In this podcast we talk about evasion from the context of evading defense controls, not necessarily EDR specific evasion techniques. Our hope with this episode is to shed light on this topic and help defenders understand various methods of evasion and this topic more in general. Resources (Jun 1, 2021) Evadere Classifications - detection & response focusDefense Evasion, Tactic TA0005 ...

Episode 138: The 7 Questions Every Security Leader Should Ask After a Pentest

Podcast image

Published: 06/20/2025 04:00:00

Episode 138: The 7 Questions Every Security Leader Should Ask After a Pentest Episode Details

In this episode of The Cyber Threat Perspective, we break down the 7 critical questions every security leader should ask after a penetration test. A pentest isn’t just about checking a box, it’s an opportunity to assess your defenses, measure progress, and refine your strategy. We discuss how to go beyond the report, extract real value from the assessment, and ensure findings lead to meaningful action across your organization. Whether you’re a CISO, IT director, or team lead, this episode wil...

Episode 137: Common Pentest Findings That Shouldn’t Exist in 2025

Podcast image

Published: 06/13/2025 04:00:00

Episode 137: Common Pentest Findings That Shouldn't Exist in 2025 Episode Details

In this episode of The Cyber Threat Perspective, we highlight the pentest findings that, frankly, have no business showing up in 2025. From accounts with weak passwords and no MFA to plaintext credentials on file shares, we break down the common misconfigurations and oversights that attackers still abuse, despite years of seeing the same issues over and over again. If you're an IT admin or security leader, this episode is your checklist of what to fix yesterday. Blog: https://offsec.blog/ You...

Episode 136: A day in the life of an External Penetration Tester

Podcast image

Published: 06/06/2025 06:00:00

Episode 136: A day in the life of an External Penetration Tester Episode Details

In this episode of The Cyber Threat Perspective, we dive into why a “A day in the life of an External Penetration Tester." What do we actually do, and how do the things we do affect the overall engagement? What's important? We answer all of these questions and more in this week's episode. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇ Spencer's Links: https://spenceralessi.com Work with Us: htt...

(Replay) How To Harden Active Directory To Prevent Cyber Attacks - Webinar

Podcast image

Published: 05/30/2025 13:00:00

(Replay) How To Harden Active Directory To Prevent Cyber Attacks - Webinar Episode Details

(REPLAY) This is a recording of a webinar aimed at IT professionals, system administrators, and cybersecurity professionals eager to bolster their defenses against cyber threats. In this session, "How to Harden Active Directory to Prevent Cyber Attacks," our expert speakers will discuss comprehensive strategies and best practices for securing your Active Directory environment. Download the slides here. Key Takeaways: - Understanding AD Vulnerabilities: Learn about the most common secu...

Episode 135: We Couldn’t Get In...And That’s a Good Thing, Or Is It?

Podcast image

Published: 05/23/2025 04:00:00

Episode 135: We Couldn't Get In...And That's a Good Thing, Or Is It? Episode Details

In this episode of The Cyber Threat Perspective, we dive into why a “we couldn’t get in” result on a pentest isn’t always the victory it seems—and why it can be a great sign if interpreted correctly. We break down the real defensive controls that prevented compromise, explore what might still be hiding under the surface, and share why even a clean report shouldn’t mean letting your guard down. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com/c...

Episode 134: Preventing Data Breaches: Strategies to Mitigate Initial Compromise

Podcast image

Published: 05/16/2025 13:00:00

Episode 134: Preventing Data Breaches: Strategies to Mitigate Initial Compromise Episode Details

In this episode of The Cyber Threat Perspective, we tackle the crucial first step in cybersecurity: preventing initial compromise. We'll dissect common attack vectors like phishing and exploitation and explore layered defenses ranging from MFA and patch management to DMZs and WAFs. Get actionable guidance to integrate these controls into your security program and safeguard your organization against the risk of that initial foothold. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/...

Episode 133: How Cyber Attackers Steal Credentials & Hijack Sessions

Podcast image

Published: 05/09/2025 04:00:00

Episode 133: How Cyber Attackers Steal Credentials & Hijack Sessions Episode Details

In this episode of The Cyber Threat Perspective, we break down how attackers steal credentials and hijack sessions to gain unauthorized access to systems and data. From phishing to cookie stealing to session token theft, we’ll explore the most common techniques and how to defend against them. Whether you're an IT admin or security pro, you’ll walk away with practical tips to help protect your users and your organization. Learn how we do internal pentesting differently... Recommended Condition...

Episode 132: Reviewing the Mandiant M-Trends 2025 Report

Podcast image

Published: 05/02/2025 04:00:00

Episode 132: Reviewing the Mandiant M-Trends 2025 Report Episode Details

In this episode Spencer and Brad review the M-Trends 2025 Report. M-Trends 2025 is Mandiant's annual report that shares frontline learnings from its global incident-response engagements—over 450 000 hours of investigations in 2024—providing sanitized, data-driven analysis of evolving attacker tactics, dwell times, industry and regional trends, and practical recommendations to help organizations improve their defenses. M-Trends 2025: Data, Insights, and Recommendations From the Frontlines | Go...

(Replay) How To Defend Against Lateral Movement

Podcast image

Published: 04/25/2025 08:00:00

(Replay) How To Defend Against Lateral Movement Episode Details

In this replay, Spencer and Brad dive into lateral movement, discussing various techniques like RDP, RATs, Impacket tools, PsExec, PTH, PTT, and PowerShell Remoting. They explain how attackers use these methods to gain unauthorized access, evade detection, and enable malicious activities. They also discuss precursors to lateral movement and strategies to restrict it, such as least privilege access, network segmentation, and monitoring. The podcast emphasizes the importance of understanding la...

Episode 131: DMARC & PCI 4.0 Compliance - Is your Organization Compliant?

Podcast image

Published: 04/11/2025 10:00:00

Episode 131: DMARC & PCI 4.0 Compliance - Is your Organization Compliant? Episode Details

In this episode, Tyler and Brad discuss DMARC and how the latest version of the PCI framework requires phishing protection. You'll also learn about DMARC, DKIM, and SPF and how to elevate them to help protect your organization from attacks like Business Email Compromise (BEC). Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇ Spencer's Links: https://spenceralessi.com Work with Us: https://securit36...

Episode 130: Using Deception Technology to Detect Cyber Attacks

Podcast image

Published: 04/04/2025 15:00:00

Episode 130: Using Deception Technology to Detect Cyber Attacks Episode Details

In this episode of The Cyber Threat Perspective, we explore the strategic integration of deception technology like canaries and honeypots into your cybersecurity defenses. Discover how these tools allow you to detect threat actors earlier in their attack sequence, disrupt malicious activities, and mitigate potential damage to your organization. Join us for actionable insights and defensive advice to enhance your organization's security posture. Blog: https://offsec.blog/ Youtube: https://www....

Episode 129: How to Analyze Threat Reports for Defenders

Podcast image

Published: 03/28/2025 04:00:00

Episode 129: How to Analyze Threat Reports for Defenders Episode Details

Threat reports can be goldmines for defenders — but only if we know how to extract and apply what matters. A good analysis can mean catching an attack early or missing it entirely. There's no shortage of threat intel out there. The real challenge is making sense of it without getting overwhelmed. In this episode we discuss: What makes up a threat reportGoals of analyzing threat reportsHow to analyze the pieces that matterActionable tips you can use todayBlog: https://offsec.blog/ Youtube: htt...

Episode 128: The Most Common External Pen Test Findings—And How to Fix Them

Podcast image

Published: 03/21/2025 00:00:00

Episode 128: The Most Common External Pen Test Findings-And How to Fix Them Episode Details

In this episode, Brad and Sam discuss the most common security issues found on external penetration tests, how to find them yourself, and how to address them. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇ Spencer's Links: https://spenceralessi.com Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.

Episode 127: SaaS Supply Chain Attacks - How to Stay Secure

Podcast image

Published: 03/14/2025 04:00:00

Episode 127: SaaS Supply Chain Attacks - How to Stay Secure Episode Details

This episode focuses on SaaS (Software as a Service) Supply Chain Attacks. We discuss what SaaS applications are most at risk, what the real danger of saas supply chain attacks are and most importantly how to defend and detect these attacks. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇ Spencer's Links: https://spenceralessi.com Work with Us: https://securit360.com | Find vulnerabilities...

Episode 126: Typosquatting - How and Why It Works and How to Defend Against It

Podcast image

Published: 03/07/2025 04:00:00

Episode 126: Typosquatting - How and Why It Works and How to Defend Against It Episode Details

Dive into the quirky underworld of digital misdirection in this episode, where we explore the art of typosquatting. Discover how a simple mistyped URL can turn into a gateway for cyber trickery, as we break down the many forms of typosquatting—from subtle misspellings that mimic trusted sites to more elaborate schemes designed to deceive. Learn why these small errors are so effective in luring unsuspecting users and get insider tips on how to protect yourself from falling into these cleverly ...

Episode 125: Whose Job Is Harder? Red or Blue

Podcast image

Published: 02/28/2025 04:00:00

Episode 125: Whose Job Is Harder? Red or Blue Episode Details

In this episode, we discuss whose job is harder. The red team or the blue team? We discuss the roles and responsibilities of many red and blue teamers, the challenges both those teams face, and then we share some advice for handling and overcoming those challenges. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇ Spencer's Links: https://spenceralessi.com Work with Us: https://securit360.com | Find vul...

(Replay) How To Monitor Your Attack Surface

Podcast image

Published: 02/21/2025 09:00:00

(Replay) How To Monitor Your Attack Surface Episode Details

Unlock the secrets of effective attack surface monitoring in this replay of The Cyber Threat Perspective. Brad and Spencer dive into essential practices, tools, and methodologies to keep your systems secure. Define and understand attack surface and attack vectorsDistinguish between physical and digital attack surfacesExplore DIY vs. commercial tools for attack surface monitoringLearn from bug bounty industry methodologies and resourcesEmphasize the importance of continuous monitoring and asse...

Episode 124: MFA != Secure

Podcast image

Published: 02/14/2025 04:00:00

Episode 124: MFA != Secure Episode Details

Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇ Spencer's Links: https://spenceralessi.com Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.

Episode 123: Insecure Active Directory Protocols

Podcast image

Published: 02/07/2025 04:00:00

Episode 123: Insecure Active Directory Protocols Episode Details

In this episode, we discuss several insecure protocols that are found within Active Directory environments. When these protocols are enabled, they could be abused by an attacker to perform a number of attacks, including privilege escalation and lateral movement. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇ Spencer's Links: https://spenceralessi.com Work with Us: https://securit360.com | Find ...

Episode 122: AI/ChatGPT Interviews a Web Pen Tester!!

Podcast image

Published: 01/31/2025 00:00:00

Episode 122: AI/ChatGPT Interviews a Web Pen Tester!! Episode Details

In this episode, Chelsea (ChatGTP) interviews Brad about web application penetration testing. Listen in to learn how the process works from start to finish! Resources https://owasp.org/https://nvd.nist.gov/vuln-metrics/cvsshttps://chatgpt.com/ Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇ Spencer's Links: https://spenceralessi.com Work with Us: https://securit360.com | Find vulnerabilities that m...

Episode 121: How We Evade Detection During Internal Pentests

Podcast image

Published: 01/24/2025 04:00:00

Episode 121: How We Evade Detection During Internal Pentests Episode Details

In this episode, Spencer and Brad discuss the ever popular and highly debated topic of evasion. In this podcast we talk about evasion from the context of evading defense controls, not necessarily EDR specific evasion techniques. Our hope with this episode is to shed light on this topic and help defenders understand various methods of evasion and this topic more in general. Resources (Jun 1, 2021) Evadere Classifications - detection & response focusDefense Evasion, Tactic TA0005 - Enterpr...

Episode 120: Demystifying Pentests: What Every Organization Needs to Know

Podcast image

Published: 01/17/2025 04:00:00

Episode 120: Demystifying Pentests: What Every Organization Needs to Know Episode Details

In this episode, Spencer and Tyler discuss key things that they as pentesters wish all organizations knew about pentesting and the pentest process. They go through the entire lifecycle of a pentest and discuss definitions, processes, misconceptions and much more. By the end of this episode, we hope you have a better understanding of everything that goes into the pentesting process including things that are not typically visible to clients. Blog: https://offsec.blog/ Youtube: https://www.youtu...

Episode 119: Lessons Natural Disasters Can Teach Us About Cybersecurity

Podcast image

Published: 01/10/2025 04:00:00

Episode 119: Lessons Natural Disasters Can Teach Us About Cybersecurity Episode Details

In this episode, we draw parallels between natural disasters and navigating today’s cybersecurity landscape. From the importance of preparation and layered defenses to the critical need for constant monitoring and resilience, we uncover valuable lessons that nature’s challenges can teach us about protecting systems and data. Whether you’re an IT professional, a business owner, or just someone passionate about cybersecurity, this episode will inspire you to think differently about your defense...

(Replay) Tales From The Trenches

Podcast image

Published: 01/01/2025 06:00:00

(Replay) Tales From The Trenches Episode Details

Join us for this replay of episode 78 - an enthralling journey into the heart of cybersecurity operations with “Tales from the Trenches,” an exclusive podcast presented by Brad Causey, Vice President of Offensive Security at SecurIT360. Dive deep into the high-stakes world of offensive security as Brad shares his firsthand experiences from a career spent on the front lines of digital defense. Engage with real-life stories illustrating offensive cybersecurity's intense challenges and triumpha...

(Replay) Email Spoofing: From Basics to Advanced Techniques and Solutions

Podcast image

Published: 12/25/2024 05:00:00

(Replay) Email Spoofing: From Basics to Advanced Techniques and Solutions Episode Details

Welcome to this replay on The Cyber Threat Perspective! In this episode, Brad and Spencer dive into the mechanics and recent developments of email spoofing, shedding light on how attackers are bypassing advanced email protections. In this episode, we cover: The fundamentals of email spoofing and why it's a significant threat.Insight into the recent echo spoofing campaign exploiting Proofpoint's misconfiguration.The role of SPF, DKIM, and DMARC in combating email spoofing.How threat actors are...

(Replay) Windows and Active Directory Hardening

Podcast image

Published: 12/18/2024 08:00:00

(Replay) Windows and Active Directory Hardening Episode Details

In this episode of The Cyber Threat Perspective, Nathan and Spencer discuss crucial strategies for Windows and Active Directory hardening, emphasizing the importance of community collaboration and the value of using CIS benchmarks for security compliance. In this episode, we cover: Implementing multi-factor authentication for domain adminsThe benefits and importance of using CIS benchmarks for Windows 10 and 11Advantages of having a consistent standard in an active directory environmentAssura...

Episode 118: 2025 - A CISO's Perspective with Mike Whitt

Podcast image

Published: 12/11/2024 07:00:00

Episode 118: 2025 - A CISO's Perspective with Mike Whitt Episode Details

In this episode, we’re discussing what a seasoned CISO is focused on going into 2025. Mike Whitt is a Cheif Information Security Officer in the financial sector with over 20 years of experience building teams, security programs, and leading organizations to a more secure posture. https://www.linkedin.com/in/mike-whitt-a4b4802/ Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇ Spencer's Links: http...

Episode 117: Why Do Pentests Cost So Much?

Podcast image

Published: 12/04/2024 04:00:00

Episode 117: Why Do Pentests Cost So Much? Episode Details

In this episode, we’re peeling back the layers of the question so many organizations ask: Why do penetration tests cost so much? But here’s the real twist—are they actually expensive, or are we measuring their value the wrong way? By the end of this episode, you’ll understand not just the cost of a penetration test, but its value as an investment in protecting your business. We’ll dive into real-world examples, break down the factors that drive pentest pricing, and explore how it compares to ...

Episode 116: Painfully Persistent Problems - Weak Passwords

Podcast image

Published: 11/27/2024 04:00:00

Episode 116: Painfully Persistent Problems - Weak Passwords Episode Details

In this episode, we’re diving into one of the most enduring cybersecurity challenges—weak passwords. We’ll explore how poor password practices and identity management pitfalls leave organizations vulnerable to compromise. From understanding the most common mistakes to implementing effective defenses, we’re breaking down what it takes to fortify your systems against attackers exploiting the weakest link. Sources https://www.verizon.com/about/news/2023-data-breach-investigations-report?utm_so...

Episode 115: How to understand and address risk w/ Robert McElroy

Podcast image

Published: 11/20/2024 07:00:00

Episode 115: How to understand and address risk w/ Robert McElroy Episode Details

In this episode, we discuss the broad concept of risk, what it is, and how to manage it. This episode is a great way to begin understanding how to develop an overall risk management strategy at your organization or understand how a risk management program might work for you. You find out more about what Rob and his team can do here: https://www.securit360.com/services/managed-services-consulting/ Reach him directly here: rob@securit360.com Blog: https://offsec.blog/ Youtube: https://...

Episode 114: Making Penetration Test Results Actionable

Podcast image

Published: 11/13/2024 04:00:00

Episode 114: Making Penetration Test Results Actionable Episode Details

In this episode, we discuss the challenge of translating penetration test findings into practical and effective security improvements, and we delve into the three major bottlenecks to improving security and give recommendations for overcoming them. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇ Spencer's Links: https://spenceralessi.com Work with Us: https://securit360.com | Find vulnerabilities that...

Episode 113: Phishing with Malicious RDP Files

Podcast image

Published: 11/06/2024 04:00:00

Episode 113: Phishing with Malicious RDP Files Episode Details

In this episode, we're talking about a significant development in the cyber threat landscape. There has been a surge in activity from a group known as Midnight Blizzard, also known as APT29. They're a sophisticated Russian state-sponsored group, and their primary targets are governments, diplomats, NGOs, and IT service providers, mainly in the US and Europe. What's really alarming is their recent shift in tactics. They're now using malicious RDP files in their spear-phishing campaigns, which ...

Episode 112: Key Insights From The Microsoft Digital Defense Report 2024

Podcast image

Published: 10/30/2024 04:00:00

Episode 112: Key Insights From The Microsoft Digital Defense Report 2024 Episode Details

In this episode, we dive deep into the newly released Microsoft Digital Defense Report 2024, which offers a comprehensive look at the latest trends in the global cybersecurity landscape. From evolving cyber threats and attack strategies to Microsoft's analysis of the most vulnerable sectors, we break down the key findings and what they mean for businesses, governments, and cybersecurity professionals. Join us as we discuss how threat actors are leveraging new technologies, the role of AI in d...

(Replay) How To Actually Protect Credentials

Podcast image

Published: 10/23/2024 09:00:00

(Replay) How To Actually Protect Credentials Episode Details

In this episode replay, Spencer and Darrius break down the complexities of credential protection, discussing everything from user education and tools to threat modeling and guardrails. Plus, we delve into the world of protecting credentials within scripts and code. This is a must-listen for all IT admins, CISOs and any other IT/Security professional. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇ Spe...

Episode 111: Red Team Tools (OST) Managing Open-Source Threats

Podcast image

Published: 10/16/2024 04:00:00

Episode 111: Red Team Tools (OST) Managing Open-Source Threats Episode Details

In this episode, Spencer and Brad discuss a recent Trend Micro research project and associated white paper "Red Team Tools in the Hands of Cybercriminals and Nation States". Spencer and Brad dig into what red teaming is, what red team tools (often referred to as offensive security tools) are and why they are used. They also cover the abuse of red team tools, the speed of exploitation after public release and supply chain attacks against red team tools. From Defense to Offense: The Misuse of ...

(Replay) Vulnerability Management Deep Dive

Podcast image

Published: 10/09/2024 07:00:00

(Replay) Vulnerability Management Deep Dive Episode Details

In this replay episode, Spencer is joined by Daniel Perkins, a Senior Information Security Officer at SecurIT360 to discuss the intricacies of vulnerability management, the important prerequisites to vulnerability management, and best practices, and provide actionable strategies to level up your vulnerability management program. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇ Spencer's Links: https://...

Episode 110: AD Security Workshop Preview

Podcast image

Published: 10/02/2024 04:00:00

Episode 110: AD Security Workshop Preview Episode Details

In this episode, Brad and Spencer discuss Spencer's upcoming in-person workshop at Cyber SC. The **Hardening Active Directory to Prevent Cyber Attacks** Workshop is aimed at IT professionals, system administrators, and cybersecurity professionals eager to learn how to bolster their defenses against cyber threats. In this workshop, we will discuss comprehensive strategies and best practices for securing Active Directory. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatp...

Episode 109: Current State of Pentesting - Internal and External

Podcast image

Published: 09/25/2024 04:00:00

Episode 109: Current State of Pentesting - Internal and External Episode Details

In this episode, Spencer and Tyler share what they love and hate about the current state of penetration testing, they discuss current and future trends, and what it means to be a true cybersecurity partner. We hope you enjoy this episode! Learn how we do internal pentesting differently... Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇ Spencer's Links: https://spenceralessi.com Work with Us: https://s...

Episode 108: New tales from the trenches!

Podcast image

Published: 09/18/2024 00:00:00

Episode 108: New tales from the trenches! Episode Details

In this episode, Tyler and Brad talk about various security issues found on recent penetration tests. They outline the how and why, and talk about mitigation strategies to help you beat these issues in your environment. Resources Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://twitter.com/cyberthreatpov Work with Us: https://securit360.com Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com/cyberthrea...

Episode 107: How To Defend Against Lateral Movement

Podcast image

Published: 09/11/2024 04:00:00

Episode 107: How To Defend Against Lateral Movement Episode Details

In this episode, Spencer and Brad dive into lateral movement, discussing various techniques like RDP, RATs, Impacket tools, PsExec, PTH, PTT, and PowerShell Remoting. They explain how attackers use these methods to gain unauthorized access, evade detection, and enable malicious activities. They also discuss precursors to lateral movement and strategies to restrict it, such as least privilege access, network segmentation, and monitoring. The podcast emphasizes the importance of understanding l...

(Replay) DNS Security

Podcast image

Published: 09/04/2024 07:00:00

(Replay) DNS Security Episode Details

In our "DNS Security" podcast, we delve into DNS's critical role in how the internet works, exploring its vulnerabilities and attacks like DNS spoofing, cache poisoning, and DDoS. We discuss DNSSEC and its components, including public and private keys, and examine practical solutions such as DNS and content filtering. The episode also highlights the advantages of cloud-based DNS services, like those offered by Cloudflare. Finally, we share best practices and resources for securing DNS infras...

Episode 106: An Overview of Cyber Risk

Podcast image

Published: 08/28/2024 04:00:00

Episode 106: An Overview of Cyber Risk Episode Details

Let's talk about cyber risk classification in this episode of The Cyber Threat Perspective. Brad and Tyler provide a high-level overview of various types of cyber risk encountered in penetration testing. -Reputational Risk -Financial Risk -Operational Risk -Direct Risk -Indirect Risk -Lateral Risk -Strategic Risk -Compliance Risk https://offsec.blog Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com/cyberthreatpov Follow Spencer on soci...

Episode 105: How to Monitor Your Attack Surface

Podcast image

Published: 08/21/2024 04:00:00

Episode 105: How to Monitor Your Attack Surface Episode Details

In this episode Brad and Spencer discuss Attack Surface Monitoring, what it is, and why it's important for defending against cyber-attacks. They give into the difference between attack vectors and attack surface and share a high-level overview on how to go about monitoring your own attack surface. Finally, they share tools and techniques for attack surface monitoring, many of which are key concepts taken from the world of bug bounty. Blog: https://offsec.blog/ Youtube: https://www.youtube.com...

Episode 104: How To Get Into Cyber For First Responders

Podcast image

Published: 08/14/2024 04:00:00

Episode 104: How To Get Into Cyber For First Responders Episode Details

In this episode, Spencer has Sam Killingsworth on the show to talk about getting into cybersecurity, specifically penetration testing, coming from a first responder background. Sam is currently a full-time Firefighter/EMT and part-time penetration tester here at SecurIT360. Sam shares his background and experiences of learning cybersecurity and pentesting and how he has used the skills from his full-time job to help him be a better pentester. Blog: https://offsec.blog/ Youtube: https://www.yo...

Episode 103: Email Spoofing

Podcast image

Published: 08/07/2024 04:00:00

Episode 103: Email Spoofing Episode Details

In this episode, Spencer and Brad dive into the complex maze of 3rd party email providers, filtering and spoofing. Email spoofing is a technique used by cybercriminals to disguise the sender's address in an email message, making it appear as though the email originated from a different source. This can be used for a variety of malicious purposes, such as phishing attacks, fraudulent activities, or spreading malware. DMARC Rundown - Offensive Security Blog - SecurIT360 “EchoSpoofing” — A Ma...

Episode 102: The Global CrowdStrike Outage

Podcast image

Published: 07/31/2024 04:00:00

Episode 102: The Global CrowdStrike Outage Episode Details

In this episode, Spencer is joined by Joey Vandergrift (SecurIT360's VP of Security Operations) and Mark Brophy (SecurIT360's DFIR practice lead). Together they discuss how CrowdStrike, a leading EDR product, caused one of the largest global IT outages in history. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇ Spencer's Links: https://spenceralessi.com Work with Us: https://securit360.com | Find vuln...

Episode 101: Infostealers - 10,000 Victims a Day

Podcast image

Published: 07/24/2024 04:00:00

Episode 101: Infostealers - 10,000 Victims a Day Episode Details

In this episode, Spencer and Brad dive into the deep underworld of infostealer malware. They discuss what infostealers are, how they are used and what they are used for. They will dig into how the information obtained from infostealers can help cyber threat actors compromise large and small organizations, cloud providers and more but also how the infostealer data and logs can be used by authorities for good. Resources 10,000 Victims a Day: Infostealer Garden of Low-Hanging Fruithttps://x.com...

(Replay) How We Hack Medical Devices To Save Lives

Podcast image

Published: 07/17/2024 07:00:00

(Replay) How We Hack Medical Devices To Save Lives Episode Details

Discover the vulnerabilities lurking within medical devices and how ethical hacking can safeguard patient care. Join Brad, VP of Offensive Security at SecurIT360, as he unpacks the risks and protections against cyber threats in healthcare tech. - Unveiling the risks of wireless communication vulnerabilities in insulin pumps and glucose monitors that could be exploited through advanced hacking techniques. - Demonstrating the use of tools like ESP32, Hashcat, and attack scenarios to reveal how ...

Episode 100: The OpenSSH RegreSSHion Vulnerability

Podcast image

Published: 07/10/2024 04:00:00

Episode 100: The OpenSSH RegreSSHion Vulnerability Episode Details

In this episode, Spencer and Brad discuss the OpenSSH "regreSSHion" vulnerability. This is being tracked as CVE-2024-6409 & CVE-2024-6387. A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead to sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period. Links: https://nvd.nist.gov/vuln/detail/CVE-2024-6409https://nvd...

Episode 99: Tool Time - OneDriveEnum & AD Miner

Podcast image

Published: 07/03/2024 04:00:00

Episode 99: Tool Time - OneDriveEnum & AD Miner Episode Details

In this episode, Spencer and Tyler discuss two of their current favorite tools: OneDriveEnum for enumerating user accounts in Microsoft 365 and AD Miner for visualizing attack paths in Active Directory. We hope you enjoy and get value from this episode! Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇ Spencer's Links: https://spenceralessi.com Work with Us: https://securit360.com | Find vulnerabilities...

Episode 98: Current State of M365 Attacks: Initial Access

Podcast image

Published: 06/26/2024 00:00:00

Episode 98: Current State of M365 Attacks: Initial Access Episode Details

In this episode, we discuss the latest trends and techniques for enumerating Microsoft 365. We break down how attackers may identify M365 tenants, how they discover and validate accounts and what you as an IT admin can do to protect your organization in-light of this. Topics covered: Credential Stuffing, Brute Force Attacks, Password Spraying, Prompt Bombing, Session Hijacking, Adversary-in-the-Middle (AiTM) Attacks, OAuth Phishing, Legacy Authentication Protocols, App Pas...

Episode 97: Current State of M365 Attacks: Enumeration

Podcast image

Published: 06/19/2024 04:00:00

Episode 97: Current State of M365 Attacks: Enumeration Episode Details

In this episode, we discuss the latest trends and techniques for enumerating Microsoft 365. We break down how attackers may identify M365 tenants, how they discover and validate accounts and what you as an IT admin can do to protect your organization in-light of this. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇ Spencer's Links: https://spenceralessi.com Work with Us: https://securit360.com | Find ...

Episode 96: How to Harden Active Directory to Prevent Cyber Attacks

Podcast image

Published: 06/12/2024 04:00:00

Episode 96: How to Harden Active Directory to Prevent Cyber Attacks Episode Details

This is a recording of a webinar aimed at IT professionals, system administrators, and cybersecurity professionals eager to bolster their defenses against cyber threats. In this session, "How to Harden Active Directory to Prevent Cyber Attacks," our expert speakers will discuss comprehensive strategies and best practices for securing your Active Directory environment. Learn how we do internal pentesting differently... Key Takeaways: - Understanding AD Vulnerabilities: Learn about the most c...

Episode 95: Navigating the Legal Maze of Cybersecurity with Alexander Boyd

Podcast image

Published: 06/05/2024 04:00:00

Episode 95: Navigating the Legal Maze of Cybersecurity with Alexander Boyd Episode Details

In this episode, Alex Boyd joins Spencer and Brad. Alex is a shareholder in Polsinelli's national Technology Transactions and Data Privacy practice, shares crucial insights for CTOs, IT Directors, CISOs, Security Managers when responding to security incidents. Discover common misconceptions about breaches and the mistakes organizations make in regulatory compliance. Gain valuable advice on selecting cyber insurance policies and navigating the legal landscape of regulatory investigations, lice...

Episode 94: Defending Against Ransomware Part 2

Podcast image

Published: 05/29/2024 04:00:00

Episode 94: Defending Against Ransomware Part 2 Episode Details

In this episode, Brad and Spencer discuss the preparation stage of defending against ransomware. As we know, the time to have a plan is before you enter the woods and cybersecurity is no different. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇ Spencer's Links: https://spenceralessi.com Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting ...

Episode 93: Defending Against Ransomware Part 1

Podcast image

Published: 05/22/2024 04:00:00

Episode 93: Defending Against Ransomware Part 1 Episode Details

In this episode, Brad and Spencer discuss the preparation stage of defending against ransomware. As we know, the time to have a plan is before you enter the woods and cybersecurity is no different. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇ Spencer's Links: https://spenceralessi.com Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting ...

Episode 92: Cybersecurity Training and Certification Advice

Podcast image

Published: 05/15/2024 04:00:00

Episode 92: Cybersecurity Training and Certification Advice Episode Details

In this episode, Spencer and Darrius share their expertise on navigating the world of cybersecurity training and certification. With decades of experience and numerous certifications, they provide valuable insights, tips, and personal stories to help listeners stay ahead of emerging threats and advance their careers in cybersecurity. Whether you're a beginner or a veteran in the field, this episode offers practical advice to enhance your skills and succeed in this ever-changing industry. Tune...

Episode 91: The 2024 Verizon Data Breach Investigations Report

Podcast image

Published: 05/08/2024 04:00:00

Episode 91: The 2024 Verizon Data Breach Investigations Report Episode Details

In this episode, Spencer and Brad discuss the highly respected 2024 Verizon Data Breach Investigations Report (DBIR), a data-driven analysis of cyberattacks and data breaches from around the world. Tune in to discover the latest global trends and patterns in cybersecurity, as well as key insights for security professionals and executives. Don't miss out on this essential resource that has been shaping the industry for the past 15 years. Blog: https://offsec.blog/ Youtube: https://www.youtube....

Episode 90: Transforming Your Security - Insights from Coaching a Collegiate Cyber Defense Team

Podcast image

Published: 05/01/2024 16:00:00

Episode 90: Transforming Your Security - Insights from Coaching a Collegiate Cyber Defense Team Episode Details

In this episode Spencer chats with Mark Brophy (of SecurIT360) to discuss his background and experience with coaching a collegiate cyber defense team and how many of those lessons learned from defending against expert red team operators translate to securing organizations in today's modern thread landscape. Another must-listen to episode for all defenders, it admins, cisos, it directors, or anyone else in charge of managing, maintaining and/or securing computers and networks. Blog: https://of...

Episode 89: How to Actually Protect Credentials

Podcast image

Published: 04/24/2024 04:00:00

Episode 89: How to Actually Protect Credentials Episode Details

In this episode, Spencer and Darrius break down the complexities of credential protection, discussing everything from user education and tools to threat modeling and guardrails. Plus, we delve into the world of protecting credentials within scripts and code. This is a must-listen for all IT admins, CISOs and any other IT/Security professional. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇ Spencer's ...