

The Cyber Threat Perspective
SecurIT360
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics.brad@securit360.com
Episodes
Mentioned books

Nov 22, 2023 • 29min
Episode 67: A Day In The Life: External Penetration Testing
Tyler Roberts, an offensive security professional and penetration tester, takes listeners behind the scenes of external pentesting. He emphasizes the importance of meticulous planning and documentation for efficient testing. Tyler shares insights on day-one recon, the balance between automation and manual research, and the risks of forgotten client assets. He explores various attack strategies like credential stuffing and the significance of multi-factor authentication across cloud services. Ultimately, Tyler highlights how pentesters provide value by validating security processes and empowering IT teams.

Nov 15, 2023 • 34min
(Replay) HACKERS: How we GET IN and how to STOP US
Discover the top methods attackers use to gain access, including credential stuffing and password spraying. Learn how to detect compromises and reinforce defenses with multi-factor authentication. Dive into web app vulnerabilities, where small apps pose big risks. They highlight effective phishing techniques and how to bolster email defenses. Plus, many security solutions are low-cost or even free! Get ready to close those security gaps!

Nov 8, 2023 • 19min
Episode 66: The DevSec Divide: Breaking Down Barriers for Better Security
In this episode, Spencer and Darrius discuss a common divide found among companies between the Security Team and the development teams. These are two teams that are ultimately trying to benefit the company, and by working together both are able to succeed.Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://go.spenceralessi.com/links Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.

Nov 1, 2023 • 15min
11/2023 Cyber Threat Recap: Okta, Octo Temptest, Smishing
This is the November 2023 Cyber Threat Recap. Every day our Cyber Threat Intelligence team is tracking, researching, and analyzing threats, vulnerabilities, exploits, and techniques with the purpose of keeping you up-to-date on what's relevant and important in the industry. So you can be more prepared today than you were yesterday to protect your organization.Okta Breach/1PasswordOkta says its support system was breached using stolen credentials1Password Detects Suspicious Activity Following Okta Support BreachHackers Stole Access Tokens from Okta’s Support Unit – Krebs on SecurityOcto Tempesthttps://www.microsoft.com/en-us/security/blog/2023/10/25/octo-tempest-crosses-boundaries-to-facilitate-extortion-encryption-and-destruction/Trendshttps://www.simplilearn.com/top-cybersecurity-trends-articleThe 10 Biggest Cyber Security Trends In 2024 Everyone Must Be Ready For NowBlog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://go.spenceralessi.com/links Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.

Oct 31, 2023 • 35min
Episode 65: Unsecured Credentials and Where To Find Them
Get ready for a spine-chilling dive into the world of unsecured credentials! Discover the hidden spots where credentials often lurk, like unattended answer files and even auto hotkey scripts. The hosts share eye-opening stories about the dangers of overprivileged accounts and misconfigured tools. Uncover how everyday items like sticky notes can become gateways for hackers. Ultimately, this thrilling discussion highlights the urgent need for better security practices and user education in the digital realm.

Oct 25, 2023 • 35min
Episode 64: A Day In The Life: Web Application Penetration Testing
Dive into the intriguing world of web application penetration testing! Discover the meticulous planning involved, from kickoff meetings to defining scopes and workflows. Learn how client-side validations can be risky and explore real-world exploitation strategies. Catch insights on handling out-of-scope findings and the importance of creating clear proofs-of-concept. Experience the creativity in exploiting vulnerabilities, including playful demonstrations, all while tackling common challenges like WAFs and undocumented APIs. It's a fascinating peek behind the keyboard!

Oct 18, 2023 • 30min
Episode 63: A Day in The Life: Internal Penetration Testing
Discover the intriguing life of an internal penetration tester as Brad and Spencer dive into their daily tasks. Learn about the meticulous planning that goes into preparation, from tool selection to client conversations. They emphasize the importance of an assumed-breach model and endpoint testing, while also discussing the challenge of finding vulnerabilities in out-of-scope systems. With insights on maintaining workflow and effective note-taking, listeners gain a clear understanding of how to validate vulnerabilities and provide true client value.

6 snips
Oct 11, 2023 • 28min
Episode 62: What Makes a Great Penetration Test Report?
Learn what makes a penetration test report truly impactful. Discover the essential elements that ensure clarity and actionable insights for improving organizational security. Hear about the importance of clear communication and contextual risk framing in conveying findings to stakeholders. The discussion also covers challenges in vulnerability remediation and the need for ongoing audits. Plus, tips on enhancing report composition and the critical role of client feedback in refining the reporting process.

Oct 4, 2023 • 27min
Episode 61: How to Mitigate Social Engineering Attacks
Delve into the manipulative tactics of social engineering and their rising prevalence in cybersecurity. Discover the importance of comprehensive training to foster awareness and a strong security culture within organizations. Learn about effective strategies like Multi-Factor Authentication and the principles of least privilege. Embrace a proactive approach to identify vulnerabilities and enhance defenses against these attacks. Explore how viewing challenges as opportunities can strengthen overall security.

Sep 27, 2023 • 35min
Episode 60: Cybersecurity Hot Takes
In this episode, Spencer and Darrius discuss unpopular Cybersecurity opinions, which are referred to as "hot takes." This discussion was inspired from a tweet by John Breth (@JBizzle703) which as of recording has close to 4 million views.Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://go.spenceralessi.com/links Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.


