The Cyber Threat Perspective cover image

The Cyber Threat Perspective

Latest episodes

undefined
Oct 30, 2024 • 39min

Episode 112: Key Insights From The Microsoft Digital Defense Report 2024

Explore the latest trends in global cybersecurity as highlighted in the Microsoft Digital Defense Report 2024. Discover how threat actors are targeting the education and research sectors and the rising complexities of ransomware incidents involving universities. Learn about the critical need for stronger identity protection measures and the challenges posed by technical debt. The discussion also emphasizes the importance of understanding attack paths and optimizing existing security tools for a robust defense strategy.
undefined
Oct 23, 2024 • 44min

(Replay) How To Actually Protect Credentials

In this episode replay, Spencer and Darrius break down the complexities of credential protection, discussing everything from user education and tools to threat modeling and guardrails. Plus, we delve into the world of protecting credentials within scripts and code. This is a must-listen for all IT admins, CISOs and any other IT/Security professional.Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://twitter.com/cyberthreatpovWork with Us: https://securit360.com
undefined
Oct 16, 2024 • 31min

Episode 111: Red Team Tools (OST) Managing Open-Source Threats

The hosts dive into a recent Trend Micro research project examining red team tools and their implications for cybercriminals and nation states. They explore the evolution and ethics of these offensive security tools, tracing their history and debating responsible research publication. Differentiating red teaming from penetration testing, they discuss the management of open-source tools and their associated risks. Ethical considerations take center stage as they highlight the challenges of using these tools wisely and the importance of collaboration in cybersecurity.
undefined
Oct 9, 2024 • 36min

(Replay) Vulnerability Management Deep Dive

Daniel Perkins, a Senior Information Security Officer at SecurIT360 with over 20 years in cybersecurity, joins to dive deep into vulnerability management. They discuss best practices like effective collaboration and constant monitoring, essential for organizational security. Perkins emphasizes a unified strategy for multinationals, the importance of accurate asset cataloging, and risk-based approaches. Additionally, he highlights tracking success through key performance indicators and the need for proactive strategies to manage critical vulnerabilities effectively.
undefined
Oct 2, 2024 • 23min

Episode 110: AD Security Workshop Preview

In this conversation, Spencer, the organizer of an upcoming cybersecurity workshop, shares insights on hardening Active Directory to fend off cyber threats. They discuss the workshop's focus on practical training for IT and security professionals, emphasizing the importance of AD's evolution in today's cloud-centric world. Spencer reveals methods for penetrating testing and mitigating internal attacks, while highlighting effective hardening techniques against elusive low noise attacks. Get ready to beef up your cybersecurity skills!
undefined
Sep 25, 2024 • 40min

Episode 109: Current State of Pentesting - Internal and External

Spencer and Tyler dive into the thrilling world of penetration testing, sharing what they love and loathe about the field. They discuss the crucial balance between vulnerability scanning and thorough pen tests, touching upon the role of cloud security and AI. Communication emerges as key, enhancing partnerships for better assessments. The duo emphasizes continuous improvement in standards and the importance of client feedback. They also share excitement about an upcoming cybersecurity conference and a workshop on Active Directory hardening.
undefined
Sep 18, 2024 • 39min

Episode 108: New tales from the trenches!

Dive into the world of penetration testing with hands-on experiences at a financial institution, revealing how GraphQL challenges security. Discover the importance of securing JWTs and SMTP servers to prevent email vulnerabilities. Explore the complexities of API security and the advantages of certificate-based authentication for SSH. Learn about the risks institutions face from user enumeration and the need for robust identity safeguards. Finally, understand why a layered security strategy is essential, extending beyond just multi-factor authentication.
undefined
Sep 11, 2024 • 38min

Episode 107: How To Defend Against Lateral Movement

This discussion dives deep into the world of lateral movement in cybersecurity, highlighting how attackers exploit techniques like RDP and PowerShell Remoting to navigate networks undetected. It emphasizes the critical risks organizations face due to endpoint vulnerabilities and over-reliance on EDR systems. Credential gathering tactics, including password spraying, reveal the dangers of poor management. The speakers outline robust strategies such as network segmentation and least privilege access to strengthen defenses and monitor for suspicious activity.
undefined
Sep 4, 2024 • 31min

(Replay) DNS Security

In our "DNS Security" podcast, we delve into DNS's critical role in how the internet works, exploring its vulnerabilities and attacks like DNS spoofing, cache poisoning, and DDoS. We discuss DNSSEC and its components, including public and private keys, and examine practical solutions such as DNS and content filtering. The episode also highlights the advantages of cloud-based DNS services, like those offered by Cloudflare.Finally, we share best practices and resources for securing DNS infrastructure, addressing challenges like scalability and false positives. Join us for a concise yet comprehensive exploration of DNS security's complexities and solutions.For questions, hit us up!brad@securit360.comBlog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://twitter.com/cyberthreatpovWork with Us: https://securit360.com
undefined
Aug 28, 2024 • 28min

Episode 106: An Overview of Cyber Risk

Dive into the world of cyber risk classification and its implications for organizations. Discover various risk types, including reputational, financial, and operational risks, especially in penetration testing scenarios. Learn about the challenges of vulnerability scanning tools and the irreplaceable role of penetration testers in assessing risks. Explore the financial fallout from reputational damage and the complexities of securing cyber insurance. Plus, get insights on operational disruptions and the necessity of robust business continuity plans.

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode