The Cyber Threat Perspective

SecurIT360
undefined
Oct 10, 2025 • 27min

(replay) Common Pentest Findings That Shouldn't Exist in 2025

Tyler Roberts, an offensive security practitioner, sheds light on critical pentest findings still plaguing organizations in 2025. Discussion covers the alarming persistence of weak passwords, risks from corporate emails used for third-party signups, and the dangers of plaintext credentials on file shares. Tyler emphasizes the importance of updating outdated TLS protocols and tackling local admin password reuse. The conversation also highlights vulnerabilities in on-prem Exchange systems and the need for better control over public-facing protocols. This is a must-listen for anyone in IT security!
undefined
Oct 3, 2025 • 44min

Episode 152: What is Offensive Security?

In this episode, Spencer and Brad dig into a question that comes up all the time: what exactly is offensive security? Hint: it’s not just “pentesting.” Offensive security covers a whole spectrum of activities, including, penetration testing, red teaming, purple teaming, adversary emulation, and more. We’ll break down what each of these means, how they’re different, and how we do things at SecurIT360. By the end, you’ll have a clearer picture of how offensive security fits into a bigger security strategy and why it’s more than just finding vulnerabilities.👉Find vulnerabilities that matter, learn about how we do assume breach internal pentesting here.Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://go.spenceralessi.com/links Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal assume breach pentesting here.
undefined
Sep 26, 2025 • 42min

Episode 151: Tool Time - PingCastle for Defenders

Discover how PingCastle transforms Active Directory security management! The hosts dive into its impressive capabilities, revealing how it uncovers vulnerabilities and provides actionable insights. From identifying sensitive account settings to tracking security maturity, the tool's depth is impressive. Explore findings like GPP password risks and unsafe delegations that can lead to domain compromise. Plus, learn how PingCastle's scanning abilities provide a comprehensive overview of your environment, making it an essential resource for defenders.
undefined
Sep 19, 2025 • 31min

Episode 150: How to Use Pentest Findings to Justify Your Next Security Spend

Discover how to turn pentest results into budget justification for your security initiatives. Learn to link vulnerabilities to real-world risks and potential financial impacts on your organization. Explore strategies for prioritizing high-ROI fixes and tailoring findings into business language that resonates with leadership. The hosts also discuss staffing challenges and the benefits of fractional CISOs, while offering insights into future security investments. Transforming pentest data into actionable funding strategies has never been more vital.
undefined
Sep 12, 2025 • 37min

Episode 149: Building a Security Stack That Works A Practitioner’s Perspective

In this episode, Brad and Spencer sit down with an experienced information security and risk manager to explore how they build and manage their security stack, choose the right tools, and win support from their team and leadership. We dig into the balance between technical defenses and business-driven risk management, from budgeting and vendor selection to measuring success and preparing for emerging threats. Whether you’re a hands-on practitioner or a security leader, you’ll walk away with practical insights on building stronger defenses and aligning security with business goals.Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://go.spenceralessi.com/links Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal assume breach pentesting here.
undefined
Sep 5, 2025 • 55min

Episode 148: Securing Windows: Common Misconfigurations That Give Attackers The Advantage

This is the webinar I gave in August 2025 on the topic of common Windows misconfigurations I see during internal pentests. Make sure you grab your free gifts!Learn how we do internal pentesting differently...https://securit360.com/free-giftshttps://links.spenceralessi.com/credshttps://go.spenceralessi.com/windows-slidesBlog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://go.spenceralessi.com/links Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal assume breach pentesting here.
undefined
Aug 29, 2025 • 39min

Episode 147: When to Accept the Risk

 In this episode, we’re digging into one of the most overlooked parts of a penetration test, when it actually makes sense to not fix a finding. Not every vulnerability deserves equal treatment, and sometimes accepting the risk is the most mature decision a business can make. We’ll cover how to recognize those situations, avoid common pitfalls, and document your choices so they stand up to scrutiny. Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://go.spenceralessi.com/links Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal assume breach pentesting here.
undefined
Aug 22, 2025 • 45min

Episode 146: What Are the Security Implications of AI?

In this episode of The Cyber Threat Perspective, we’re exploring the broader security implications of artificial intelligence. AI is transforming everything—from how we defend our networks to how attackers exploit them. We’ll break down the risks, the opportunities, and what security teams need to be thinking about right now as AI becomes embedded in both our tools and becomes a part of our daily life.Spencer's next webinar 8/28 12pm EasternTopic: Securing Windows, Common Misconfigurations That Give Attackers The Advantagehttps://go.spenceralessi.com/windowsBlog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://go.spenceralessi.com/links Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal assume breach pentesting here.
undefined
Aug 15, 2025 • 34min

Episode 145: What To Do Minute 1 When Incident Response Arrives

In this episode, we're diving into what to do the minute incident response arrives. That first moment matters—a lot. Whether it's a ransomware attack, unauthorized access, or data exfiltration, how you act in minute one can either help or hinder the investigation. We’ll cover the do’s, don’ts, and common mistakes we see, so you’re ready when the heat is on.Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://go.spenceralessi.com/links Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal assume breach pentesting here.
undefined
Aug 8, 2025 • 32min

Episode 144: How Cyber Threat Actors Are Using AI

In this episode of The Cyber Threat Perspective, we're diving into one of the most pressing trends in cybersecurity: how threat actors are using AI. From deepfake scams and AI-generated phishing emails to automated malware and voice cloning, attackers are leveraging artificial intelligence to scale their operations and sharpen their tactics. We’ll break down real-world examples, tools like WormGPT, and what this means for defenders going forward.Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://go.spenceralessi.com/links Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal assume breach pentesting here.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app