
Episode 156: Post-Exploitation Tactics That Still Work in 2025
The Cyber Threat Perspective
00:00
Exfiltration using cloud storage and rclone
Spencer summarizes common exfiltration patterns: cloud file storage, rclone, FTP and other file-transfer tools used by attackers.
Play episode from 26:53
Transcript


