The Cyber Threat Perspective cover image

The Cyber Threat Perspective

Latest episodes

undefined
Feb 21, 2025 • 35min

(Replay) How To Monitor Your Attack Surface

Unlock the secrets of effective attack surface monitoring in this replay of The Cyber Threat Perspective. Brad and Spencer dive into essential practices, tools, and methodologies to keep your systems secure.Define and understand attack surface and attack vectorsDistinguish between physical and digital attack surfacesExplore DIY vs. commercial tools for attack surface monitoringLearn from bug bounty industry methodologies and resourcesEmphasize the importance of continuous monitoring and asset managementCheck out our show notes for additional resources, and don't forget to like, share, and subscribe!Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://twitter.com/cyberthreatpovWork with Us: https://securit360.com
undefined
Feb 14, 2025 • 54min

Episode 124: MFA != Secure

The podcast dives into the complexities surrounding multi-factor authentication (MFA), revealing its limitations and vulnerabilities in real-world applications. It highlights how certain MFA methods, like SMS and social engineering, can be compromised. The discussion also introduces number matching as a more secure alternative and emphasizes the need for continuous monitoring and adaptive authentication for enhanced security. Moreover, the role of AI in facilitating cyber threats is examined, underlining the necessity for a multifaceted approach to user authentication.
undefined
Feb 7, 2025 • 40min

Episode 123: Insecure Active Directory Protocols

Dive into the world of insecure Active Directory protocols and discover how they can be exploited by attackers for privilege escalation and lateral movement. Learn about essential tools like Pincastle and Purple Knight for identifying security issues. Explore the risks of legacy protocols such as LMNR and NBNS, including potential attacks. Understand the evolving challenges in internal penetration testing and the vulnerabilities of the Windows web client service, emphasizing the importance of updating security practices.
undefined
Jan 31, 2025 • 15min

Episode 122: AI/ChatGPT Interviews a Web Pen Tester!!

Chelsea interviews Brad about web application penetration testing, uncovering the essential stages and methodologies. They discuss the importance of client involvement and proper scoping to ensure safety. The conversation delves into prioritizing vulnerabilities and utilizing the Common Vulnerability Scoring System. A collaborative approach to remediation is highlighted, along with effective reporting strategies. Lastly, they emphasize measuring success through client feedback and integrating security practices early in development.
undefined
9 snips
Jan 24, 2025 • 41min

Episode 121: How We Evade Detection During Internal Pentests

Dive into the intriguing world of evasion in internal penetration testing. Discover how security professionals cleverly navigate detection systems using customized tools and obfuscation methods. Learn about adapting techniques to overcome modern security challenges, as well as the role of languages like PowerShell and C#. Explore advanced tactics like token duplication for lateral movement, emphasizing the need for better monitoring to catch subtle threats. This insightful discussion bridges the gap between offensive strategies and defensive measures in cybersecurity.
undefined
Jan 17, 2025 • 41min

Episode 120: Demystifying Pentests: What Every Organization Needs to Know

Dive into the fascinating world of penetration testing! Discover how it differs from vulnerability assessments and why manual testing is essential. Learn about the communication dynamics that improve client relationships and ensure effective remediation. Explore specific risks, like those associated with OneDrive, and the importance of staying updated with evolving methodologies. Finally, uncover the value of post-engagement discussions that enhance understanding of vulnerabilities and guide better security investments.
undefined
Jan 10, 2025 • 46min

Episode 119: Lessons Natural Disasters Can Teach Us About Cybersecurity

In this episode, we draw parallels between natural disasters and navigating today’s cybersecurity landscape. From the importance of preparation and layered defenses to the critical need for constant monitoring and resilience, we uncover valuable lessons that nature’s challenges can teach us about protecting systems and data. Whether you’re an IT professional, a business owner, or just someone passionate about cybersecurity, this episode will inspire you to think differently about your defenses—and stay one step ahead.Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://twitter.com/cyberthreatpovWork with Us: https://securit360.com
undefined
Jan 1, 2025 • 57min

(Replay) Tales From The Trenches

Join us for this replay of episode 78 - an enthralling journey into the heart of cybersecurity operations with “Tales from the Trenches,” an exclusive podcast presented by Brad Causey, Vice President of Offensive Security at SecurIT360.Dive deep into the high-stakes world of offensive security as Brad shares his firsthand experiences from a career spent on the front lines of digital defense.Engage with real-life stories illustrating offensive cybersecurity's intense challenges and triumphant victories. Brad's narrative will transport you to the core of high-pressure operations, where strategic decisions can impact the security posture of entire organizations.Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://twitter.com/cyberthreatpovWork with Us: https://securit360.com
undefined
Dec 25, 2024 • 27min

(Replay) Email Spoofing: From Basics to Advanced Techniques and Solutions

Dive into the intricate world of email spoofing, where attackers impersonate trusted sources to launch phishing campaigns. Explore the alarming rise in spoofed emails and the technological misconfigurations fueling this threat. The discussion covers essential security protocols like SPF, DKIM, and DMARC, highlighting their role in protecting against spoofing. Personal insights reveal the impact of automated spam scoring on email classification. Stay informed on the evolving tactics of cybercriminals and the importance of robust email security solutions.
undefined
Dec 18, 2024 • 48min

(Replay) Windows and Active Directory Hardening

In this episode of The Cyber Threat Perspective, Nathan and Spencer discuss crucial strategies for Windows and Active Directory hardening, emphasizing the importance of community collaboration and the value of using CIS benchmarks for security compliance.In this episode, we cover:Implementing multi-factor authentication for domain adminsThe benefits and importance of using CIS benchmarks for Windows 10 and 11Advantages of having a consistent standard in an active directory environmentAssurance and verification tools available in the benchmarksSimulated environment testing and active community participation for benchmark improvementBlog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://twitter.com/cyberthreatpovWork with Us: https://securit360.com

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode