The Cyber Threat Perspective

SecurIT360
undefined
Aug 30, 2023 • 26min

Episode 56: Vulnerabilities & Severity - Explain It To Me Like I'm 5

Brad and Spencer dive into the world of cybersecurity vulnerabilities and their severity ratings. They break down why these ratings are essential, yet imperfect. The duo highlights the confusion in cybersecurity language and the need for clear communication. Real-world examples illustrate the limitations of the Common Vulnerability Scoring System. They advocate for a genuine vulnerability management strategy that focuses on identifying true threats rather than relying solely on automated patching. Context and human analysis are key to effective risk management.
undefined
Aug 23, 2023 • 24min

Episode 55: What If Your EDR Doesn't Detect or Respond?

The discussion highlights the dangers of over-relying on Endpoint Detection and Response (EDR) solutions in cybersecurity. Real-world examples reveal significant limitations and the need for proper configuration. Attackers are evolving, pushing the importance of comprehensive strategies beyond traditional EDR tools. Monitoring network traffic becomes crucial for enhanced visibility and protection. The conversation emphasizes a well-rounded defense, warning against misconceptions about advanced detection systems.
undefined
Aug 16, 2023 • 23min

Episode 54: Misconfigured and Dangerous Logon Scripts

Misconfigured logon scripts pose significant security threats. The discussion highlights four real-world examples of how these scripts can be exploited. Risks include exposing sensitive credentials and creating malicious DNS entries. The conversation emphasizes the importance of managing logon scripts with appropriate tools like group policies. Best practices to secure these scripts and minimize vulnerabilities are shared, alongside insights on using 'Script Century' to identify issues. Access control for privileged accounts is also crucial for preventing exploitation.
undefined
Aug 9, 2023 • 29min

Episode 53: How to Defend and Mitigate PowerShell Attacks

In this discussion, Joey Vandegrift, who leads the blue team at SecurIT360, shares his expertise in defending against PowerShell attacks. He explores the dual role of PowerShell as a tool for both automation and criminal activities. Joey emphasizes the importance of access controls and logging in mitigating risks. He also introduces strategies for privilege management, highlighting tools like MakeMeAdmin. The conversation wraps up with essential defensive practices, including the need for execution policies and regular system updates.
undefined
Aug 2, 2023 • 22min

Episode 52: How to Prepare for an External Penetration Test

Get ready for an eye-opening discussion on preparing for an external penetration test! Explore the essential steps, from understanding goals to performing asset inventories. Discover the importance of clear communication and proactive dark web monitoring to safeguard sensitive information. Learn how breach credentials and password reuse can threaten your organization. This podcast is packed with expert tips to make your penetration testing process not only effective but also secure!
undefined
Jul 26, 2023 • 36min

Episode 51: Security Automation with PowerShell

Discover the power of PowerShell for automating and orchestrating security tasks. Learn how it compares to Python and why hands-on experience is essential. Delve into coding best practices for security automation and effective incident response. Explore the pros and cons of different coding environments, such as PowerShell ISE and Visual Studio Code. Plus, uncover strategies for streamlining IT processes and mastering essential techniques that boost productivity in cybersecurity.
undefined
Jul 19, 2023 • 28min

Episode 50: How Attackers Use PowerShell

Discover the sinister side of PowerShell as cyber adversaries exploit its capabilities for malicious attacks. The discussion reveals how attackers use PowerShell for everything from reconnaissance to bypassing security measures. Techniques like fileless malware and SQL server exploitation are analyzed, showcasing the tool's dual-edged nature. The speakers emphasize the importance of monitoring PowerShell to defend against these evolving threats while highlighting its indispensable role in both offensive and defensive cybersecurity.
undefined
Jul 12, 2023 • 28min

Episode 49: Scoping Offensive Security Engagements

Explore the critical nuances of scoping offensive security engagements, defining objectives and boundaries for effective penetration testing. Discover the evolving metrics that influence costs and timelines, as well as the challenges posed by cloud security. Learn about the complexities of scoping across various environments, including post-pandemic considerations. Delve into internal testing and the importance of alignment with client expectations, showcasing the collaborative dynamics of red and blue teams for enhanced security.
undefined
Jul 5, 2023 • 22min

Episode 48: Authentication done right!

The discussion kicks off with the flaws in traditional username and password systems, advocating for stronger, adaptive security measures. They highlight the critical role of strong passwords and even suggest the use of password managers. The talk then delves into multi-factor authentication (MFA), addressing risks due to poor configurations. The shift towards passwordless solutions, like magic links, is explored along with the challenges of user adoption. They finally touch on the complexities of ensuring robust security through conditional access and the future potential of Privileged Identity Management.
undefined
Jun 28, 2023 • 26min

Episode 47: How to Sharpen your Sword as a Pentester

In this episode Spencer, Darrius and Tyler get together for a round-table discussion on sharpening your sword as a pentester. They discuss what they do to keep improving, upping their skill and honing their craft. Spoiler, it's not just the technical aspects of pentesting that are important to work on.Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://click.spenceralessi.com/mylinks Work with Us: https://securit360.com

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app