
Episode 156: Post-Exploitation Tactics That Still Work in 2025
The Cyber Threat Perspective
00:00
Block RMMs and use app control to prevent persistence
Spencer recommends blocking known RMM tools using community lists and app control; Tyler notes blocking reveals unapproved software.
Play episode from 19:20
Transcript


