The Cyber Threat Perspective cover image

Episode 156: Post-Exploitation Tactics That Still Work in 2025

The Cyber Threat Perspective

00:00

Exfiltration using cloud storage and rclone

Spencer summarizes common exfiltration patterns: cloud file storage, rclone, FTP and other file-transfer tools used by attackers.

Play episode from 26:53
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app