The Cyber Threat Perspective

SecurIT360
undefined
Aug 22, 2025 • 45min

Episode 146: What Are the Security Implications of AI?

In this episode of The Cyber Threat Perspective, we’re exploring the broader security implications of artificial intelligence. AI is transforming everything—from how we defend our networks to how attackers exploit them. We’ll break down the risks, the opportunities, and what security teams need to be thinking about right now as AI becomes embedded in both our tools and becomes a part of our daily life.Spencer's next webinar 8/28 12pm EasternTopic: Securing Windows, Common Misconfigurations That Give Attackers The Advantagehttps://go.spenceralessi.com/windowsBlog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://go.spenceralessi.com/links Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.
undefined
Aug 15, 2025 • 34min

Episode 145: What To Do Minute 1 When Incident Response Arrives

In this episode, we're diving into what to do the minute incident response arrives. That first moment matters—a lot. Whether it's a ransomware attack, unauthorized access, or data exfiltration, how you act in minute one can either help or hinder the investigation. We’ll cover the do’s, don’ts, and common mistakes we see, so you’re ready when the heat is on.Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://go.spenceralessi.com/links Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.
undefined
Aug 8, 2025 • 32min

Episode 144: How Cyber Threat Actors Are Using AI

In this episode of The Cyber Threat Perspective, we're diving into one of the most pressing trends in cybersecurity: how threat actors are using AI. From deepfake scams and AI-generated phishing emails to automated malware and voice cloning, attackers are leveraging artificial intelligence to scale their operations and sharpen their tactics. We’ll break down real-world examples, tools like WormGPT, and what this means for defenders going forward.Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://go.spenceralessi.com/links Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.
undefined
Aug 1, 2025 • 45min

Episode 143: Stop Wasting Money on Pentests - Do This First

Explore when organizations should rethink the need for penetration testing. Learn about the differences between pentests, vulnerability scans, and risk assessments. Discover the critical steps necessary to prepare effectively for penetration testing, including vulnerability management and security auditing. Understand the evolving landscape of cloud security assessments and emphasize the importance of tailoring cybersecurity services to meet client needs. It's all about maximizing impact and avoiding wasted resources!
undefined
Jul 25, 2025 • 36min

Episode 142: How Active Directory Certificates Become Active Threats

In this episode, we're diving into one of the most overlooked yet dangerous components of Active Directory: Certificate Services. What was designed to build trust and secure authentication is now being exploited by attackers to silently escalate privileges and persist in your environment. We’ll break down how AD CS works, how it gets abused, and what defenders need to do to lock it down.Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://go.spenceralessi.com/links Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.
undefined
Jul 18, 2025 • 30min

Episode 141: Are You Making These Windows Security Mistakes

It’s easy to overlook small misconfigurations on Windows endpoints, but those little mistakes can create big opportunities for attackers. In this episode, we break down the most common Windows security missteps we see in real-world environments, from missing the basics to reused local admin passwords. If you’re a sysadmin, IT admin, or just responsible for keeping Windows machines secure, this one's for you.Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://go.spenceralessi.com/links Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.
undefined
Jul 11, 2025 • 44min

Episode 140: Financial Services Cybersecurity Challenges & How to Address Them - Part 2

In this episode, we dive into the unique cybersecurity challenges faced by the financial services sector, from high-value targets and strict compliance requirements to the constant threat of phishing and ransomware. We’ll break down common attack paths, what makes financial orgs so attractive to threat actors, and most importantly, what IT and security teams can do to stay ahead. Whether you're on the red team, blue team, or in leadership, this episode will help you strengthen your security posture in one of the most targeted industries on the planet.Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://go.spenceralessi.com/links Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.
undefined
Jul 4, 2025 • 41min

Episode 139: Financial Services Cybersecurity Challenges & How to Address Them - Part 1

In this episode, we dive into the unique cybersecurity challenges faced by the financial services sector, from high-value targets and strict compliance requirements to the constant threat of phishing and ransomware. Whether you're on the red team, blue team, or in leadership, this episode will help you strengthen your security posture in one of the most targeted industries on the planet.Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://go.spenceralessi.com/links Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.
undefined
Jun 27, 2025 • 41min

(Replay) How We Evade Detection During Internal Pentests

Dive into the world of evasion tactics in internal penetration testing. Discover why evasion is crucial as defenders grow stronger. Learn how attackers cleverly use trusted tools and modify binaries to evade detection. Find out why low-tech changes like renaming can still be effective, and explore the benefits of building custom tools instead of tweaking existing ones. Get insights on lateral movement techniques, including the subtle use of PowerShell, and essential defensive strategies to enhance detection.
undefined
Jun 20, 2025 • 42min

Episode 138: The 7 Questions Every Security Leader Should Ask After a Pentest

Explore the seven crucial questions security leaders should consider after a penetration test. Discover the importance of planning for post-test actions to ensure long-term value. Learn how tracking remediation and assigning ownership can make a difference. The discussion highlights common security hygiene failures and how to translate findings into enterprise risk. Gain insights on mapping vulnerabilities to potential attacker actions, reshaping defensive strategies, and effectively communicating results to leadership.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app