The Cyber Threat Perspective

SecurIT360
undefined
Nov 22, 2023 • 29min

Episode 67: A Day In The Life: External Penetration Testing

Tyler Roberts, an offensive security professional and penetration tester, takes listeners behind the scenes of external pentesting. He emphasizes the importance of meticulous planning and documentation for efficient testing. Tyler shares insights on day-one recon, the balance between automation and manual research, and the risks of forgotten client assets. He explores various attack strategies like credential stuffing and the significance of multi-factor authentication across cloud services. Ultimately, Tyler highlights how pentesters provide value by validating security processes and empowering IT teams.
undefined
Nov 15, 2023 • 34min

(Replay) HACKERS: How we GET IN and how to STOP US

Discover the top methods attackers use to gain access, including credential stuffing and password spraying. Learn how to detect compromises and reinforce defenses with multi-factor authentication. Dive into web app vulnerabilities, where small apps pose big risks. They highlight effective phishing techniques and how to bolster email defenses. Plus, many security solutions are low-cost or even free! Get ready to close those security gaps!
undefined
Nov 8, 2023 • 19min

Episode 66: The DevSec Divide: Breaking Down Barriers for Better Security

In this episode, Spencer and Darrius discuss a common divide found among companies between the Security Team and the development teams. These are two teams that are ultimately trying to benefit the company, and by working together both are able to succeed.Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://go.spenceralessi.com/links Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.
undefined
Nov 1, 2023 • 15min

11/2023 Cyber Threat Recap: Okta, Octo Temptest, Smishing

This is the November 2023 Cyber Threat Recap. Every day our Cyber Threat Intelligence team is tracking, researching, and analyzing threats, vulnerabilities, exploits, and techniques with the purpose of keeping you up-to-date on what's relevant and important in the industry. So you can be more prepared today than you were yesterday to protect your organization.Okta Breach/1PasswordOkta says its support system was breached using stolen credentials1Password Detects Suspicious Activity Following Okta Support BreachHackers Stole Access Tokens from Okta’s Support Unit – Krebs on SecurityOcto Tempesthttps://www.microsoft.com/en-us/security/blog/2023/10/25/octo-tempest-crosses-boundaries-to-facilitate-extortion-encryption-and-destruction/Trendshttps://www.simplilearn.com/top-cybersecurity-trends-articleThe 10 Biggest Cyber Security Trends In 2024 Everyone Must Be Ready For NowBlog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://go.spenceralessi.com/links Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.
undefined
Oct 31, 2023 • 35min

Episode 65: Unsecured Credentials and Where To Find Them

Get ready for a spine-chilling dive into the world of unsecured credentials! Discover the hidden spots where credentials often lurk, like unattended answer files and even auto hotkey scripts. The hosts share eye-opening stories about the dangers of overprivileged accounts and misconfigured tools. Uncover how everyday items like sticky notes can become gateways for hackers. Ultimately, this thrilling discussion highlights the urgent need for better security practices and user education in the digital realm.
undefined
Oct 25, 2023 • 35min

Episode 64: A Day In The Life: Web Application Penetration Testing

Dive into the intriguing world of web application penetration testing! Discover the meticulous planning involved, from kickoff meetings to defining scopes and workflows. Learn how client-side validations can be risky and explore real-world exploitation strategies. Catch insights on handling out-of-scope findings and the importance of creating clear proofs-of-concept. Experience the creativity in exploiting vulnerabilities, including playful demonstrations, all while tackling common challenges like WAFs and undocumented APIs. It's a fascinating peek behind the keyboard!
undefined
Oct 18, 2023 • 30min

Episode 63: A Day in The Life: Internal Penetration Testing

Discover the intriguing life of an internal penetration tester as Brad and Spencer dive into their daily tasks. Learn about the meticulous planning that goes into preparation, from tool selection to client conversations. They emphasize the importance of an assumed-breach model and endpoint testing, while also discussing the challenge of finding vulnerabilities in out-of-scope systems. With insights on maintaining workflow and effective note-taking, listeners gain a clear understanding of how to validate vulnerabilities and provide true client value.
undefined
6 snips
Oct 11, 2023 • 28min

Episode 62: What Makes a Great Penetration Test Report?

Learn what makes a penetration test report truly impactful. Discover the essential elements that ensure clarity and actionable insights for improving organizational security. Hear about the importance of clear communication and contextual risk framing in conveying findings to stakeholders. The discussion also covers challenges in vulnerability remediation and the need for ongoing audits. Plus, tips on enhancing report composition and the critical role of client feedback in refining the reporting process.
undefined
Oct 4, 2023 • 27min

Episode 61: How to Mitigate Social Engineering Attacks

Delve into the manipulative tactics of social engineering and their rising prevalence in cybersecurity. Discover the importance of comprehensive training to foster awareness and a strong security culture within organizations. Learn about effective strategies like Multi-Factor Authentication and the principles of least privilege. Embrace a proactive approach to identify vulnerabilities and enhance defenses against these attacks. Explore how viewing challenges as opportunities can strengthen overall security.
undefined
Sep 27, 2023 • 35min

Episode 60: Cybersecurity Hot Takes

In this episode, Spencer and Darrius discuss unpopular Cybersecurity opinions, which are referred to as "hot takes." This discussion was inspired from a tweet by John Breth (@JBizzle703) which as of recording has close to 4 million views.Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://go.spenceralessi.com/links Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app