
Episode 156: Post-Exploitation Tactics That Still Work in 2025
The Cyber Threat Perspective
00:00
Log tampering and buffer exhaustion to hide activity
Tyler and Spencer explain attackers clearing logs or spamming events to overwrite EDR buffers and obscure malicious actions.
Play episode from 21:54
Transcript


