The Cyber Threat Perspective cover image

The Cyber Threat Perspective

Latest episodes

undefined
Jan 31, 2025 • 15min

Episode 122: AI/ChatGPT Interviews a Web Pen Tester!!

Chelsea interviews Brad about web application penetration testing, uncovering the essential stages and methodologies. They discuss the importance of client involvement and proper scoping to ensure safety. The conversation delves into prioritizing vulnerabilities and utilizing the Common Vulnerability Scoring System. A collaborative approach to remediation is highlighted, along with effective reporting strategies. Lastly, they emphasize measuring success through client feedback and integrating security practices early in development.
undefined
9 snips
Jan 24, 2025 • 41min

Episode 121: How We Evade Detection During Internal Pentests

Dive into the intriguing world of evasion in internal penetration testing. Discover how security professionals cleverly navigate detection systems using customized tools and obfuscation methods. Learn about adapting techniques to overcome modern security challenges, as well as the role of languages like PowerShell and C#. Explore advanced tactics like token duplication for lateral movement, emphasizing the need for better monitoring to catch subtle threats. This insightful discussion bridges the gap between offensive strategies and defensive measures in cybersecurity.
undefined
Jan 17, 2025 • 41min

Episode 120: Demystifying Pentests: What Every Organization Needs to Know

Dive into the fascinating world of penetration testing! Discover how it differs from vulnerability assessments and why manual testing is essential. Learn about the communication dynamics that improve client relationships and ensure effective remediation. Explore specific risks, like those associated with OneDrive, and the importance of staying updated with evolving methodologies. Finally, uncover the value of post-engagement discussions that enhance understanding of vulnerabilities and guide better security investments.
undefined
Jan 10, 2025 • 46min

Episode 119: Lessons Natural Disasters Can Teach Us About Cybersecurity

In this episode, we draw parallels between natural disasters and navigating today’s cybersecurity landscape. From the importance of preparation and layered defenses to the critical need for constant monitoring and resilience, we uncover valuable lessons that nature’s challenges can teach us about protecting systems and data. Whether you’re an IT professional, a business owner, or just someone passionate about cybersecurity, this episode will inspire you to think differently about your defenses—and stay one step ahead.Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Spencer's Twitter: https://x.com/techspenceSpencer's LinkedIn: https://linkedin.com/in/SpencerAlessi Work with Us: https://securit360.com
undefined
Jan 1, 2025 • 57min

(Replay) Tales From The Trenches

Join us for this replay of episode 78 - an enthralling journey into the heart of cybersecurity operations with “Tales from the Trenches,” an exclusive podcast presented by Brad Causey, Vice President of Offensive Security at SecurIT360.Dive deep into the high-stakes world of offensive security as Brad shares his firsthand experiences from a career spent on the front lines of digital defense.Engage with real-life stories illustrating offensive cybersecurity's intense challenges and triumphant victories. Brad's narrative will transport you to the core of high-pressure operations, where strategic decisions can impact the security posture of entire organizations.Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Spencer's Twitter: https://x.com/techspenceSpencer's LinkedIn: https://linkedin.com/in/SpencerAlessi Work with Us: https://securit360.com
undefined
Dec 25, 2024 • 27min

(Replay) Email Spoofing: From Basics to Advanced Techniques and Solutions

Dive into the intricate world of email spoofing, where attackers impersonate trusted sources to launch phishing campaigns. Explore the alarming rise in spoofed emails and the technological misconfigurations fueling this threat. The discussion covers essential security protocols like SPF, DKIM, and DMARC, highlighting their role in protecting against spoofing. Personal insights reveal the impact of automated spam scoring on email classification. Stay informed on the evolving tactics of cybercriminals and the importance of robust email security solutions.
undefined
Dec 18, 2024 • 48min

(Replay) Windows and Active Directory Hardening

In this episode of The Cyber Threat Perspective, Nathan and Spencer discuss crucial strategies for Windows and Active Directory hardening, emphasizing the importance of community collaboration and the value of using CIS benchmarks for security compliance.In this episode, we cover:Implementing multi-factor authentication for domain adminsThe benefits and importance of using CIS benchmarks for Windows 10 and 11Advantages of having a consistent standard in an active directory environmentAssurance and verification tools available in the benchmarksSimulated environment testing and active community participation for benchmark improvementBlog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Spencer's Twitter: https://x.com/techspenceSpencer's LinkedIn: https://linkedin.com/in/SpencerAlessi Work with Us: https://securit360.com
undefined
Dec 11, 2024 • 46min

Episode 118: 2025 - A CISO's Perspective with Mike Whitt

In this episode, we’re discussing what a seasoned CISO is focused on going into 2025. Mike Whitt is a Cheif Information Security Officer in the financial sector with over 20 years of experience building teams, security programs, and leading organizations to a more secure posture. https://www.linkedin.com/in/mike-whitt-a4b4802/Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Spencer's Twitter: https://x.com/techspenceSpencer's LinkedIn: https://linkedin.com/in/SpencerAlessi Work with Us: https://securit360.com
undefined
Dec 4, 2024 • 39min

Episode 117: Why Do Pentests Cost So Much?

This discussion uncovers the high costs of penetration testing and whether they're justified. Listeners will learn about the staggering financial toll data breaches take on various industries. It dives deep into the hidden costs related to security incidents, including lost trust and recovery expenses. The value of human expertise in pentesting is emphasized over automated solutions. Ultimately, proactive security investments are framed as essential to avoiding even bigger financial risks in the future.
undefined
Nov 27, 2024 • 36min

Episode 116: Painfully Persistent Problems - Weak Passwords

In this episode, we’re diving into one of the most enduring cybersecurity challenges—weak passwords. We’ll explore how poor password practices and identity management pitfalls leave organizations vulnerable to compromise. From understanding the most common mistakes to implementing effective defenses, we’re breaking down what it takes to fortify your systems against attackers exploiting the weakest link. Sourceshttps://www.verizon.com/about/news/2023-data-breach-investigations-report?utm_source=chatgpt.comhttps://blog.1password.com/challenges-of-shadow-it/https://www.microsoft.com/en-us/security/security-insider/intelligence-reports/microsoft-digital-defense-report-2024?msockid=2e875ee0e1fe64d22f854aa6e0746523Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Spencer's Twitter: https://x.com/techspenceSpencer's LinkedIn: https://linkedin.com/in/SpencerAlessi Work with Us: https://securit360.com

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner