

The Cyber Threat Perspective
SecurIT360
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics.brad@securit360.com
Episodes
Mentioned books

Aug 30, 2023 • 26min
Episode 56: Vulnerabilities & Severity - Explain It To Me Like I'm 5
Brad and Spencer dive into the world of cybersecurity vulnerabilities and their severity ratings. They break down why these ratings are essential, yet imperfect. The duo highlights the confusion in cybersecurity language and the need for clear communication. Real-world examples illustrate the limitations of the Common Vulnerability Scoring System. They advocate for a genuine vulnerability management strategy that focuses on identifying true threats rather than relying solely on automated patching. Context and human analysis are key to effective risk management.

Aug 23, 2023 • 24min
Episode 55: What If Your EDR Doesn't Detect or Respond?
The discussion highlights the dangers of over-relying on Endpoint Detection and Response (EDR) solutions in cybersecurity. Real-world examples reveal significant limitations and the need for proper configuration. Attackers are evolving, pushing the importance of comprehensive strategies beyond traditional EDR tools. Monitoring network traffic becomes crucial for enhanced visibility and protection. The conversation emphasizes a well-rounded defense, warning against misconceptions about advanced detection systems.

Aug 16, 2023 • 23min
Episode 54: Misconfigured and Dangerous Logon Scripts
Misconfigured logon scripts pose significant security threats. The discussion highlights four real-world examples of how these scripts can be exploited. Risks include exposing sensitive credentials and creating malicious DNS entries. The conversation emphasizes the importance of managing logon scripts with appropriate tools like group policies. Best practices to secure these scripts and minimize vulnerabilities are shared, alongside insights on using 'Script Century' to identify issues. Access control for privileged accounts is also crucial for preventing exploitation.

Aug 9, 2023 • 29min
Episode 53: How to Defend and Mitigate PowerShell Attacks
In this discussion, Joey Vandegrift, who leads the blue team at SecurIT360, shares his expertise in defending against PowerShell attacks. He explores the dual role of PowerShell as a tool for both automation and criminal activities. Joey emphasizes the importance of access controls and logging in mitigating risks. He also introduces strategies for privilege management, highlighting tools like MakeMeAdmin. The conversation wraps up with essential defensive practices, including the need for execution policies and regular system updates.

Aug 2, 2023 • 22min
Episode 52: How to Prepare for an External Penetration Test
Get ready for an eye-opening discussion on preparing for an external penetration test! Explore the essential steps, from understanding goals to performing asset inventories. Discover the importance of clear communication and proactive dark web monitoring to safeguard sensitive information. Learn how breach credentials and password reuse can threaten your organization. This podcast is packed with expert tips to make your penetration testing process not only effective but also secure!

Jul 26, 2023 • 36min
Episode 51: Security Automation with PowerShell
Discover the power of PowerShell for automating and orchestrating security tasks. Learn how it compares to Python and why hands-on experience is essential. Delve into coding best practices for security automation and effective incident response. Explore the pros and cons of different coding environments, such as PowerShell ISE and Visual Studio Code. Plus, uncover strategies for streamlining IT processes and mastering essential techniques that boost productivity in cybersecurity.

Jul 19, 2023 • 28min
Episode 50: How Attackers Use PowerShell
Discover the sinister side of PowerShell as cyber adversaries exploit its capabilities for malicious attacks. The discussion reveals how attackers use PowerShell for everything from reconnaissance to bypassing security measures. Techniques like fileless malware and SQL server exploitation are analyzed, showcasing the tool's dual-edged nature. The speakers emphasize the importance of monitoring PowerShell to defend against these evolving threats while highlighting its indispensable role in both offensive and defensive cybersecurity.

Jul 12, 2023 • 28min
Episode 49: Scoping Offensive Security Engagements
Explore the critical nuances of scoping offensive security engagements, defining objectives and boundaries for effective penetration testing. Discover the evolving metrics that influence costs and timelines, as well as the challenges posed by cloud security. Learn about the complexities of scoping across various environments, including post-pandemic considerations. Delve into internal testing and the importance of alignment with client expectations, showcasing the collaborative dynamics of red and blue teams for enhanced security.

Jul 5, 2023 • 22min
Episode 48: Authentication done right!
The discussion kicks off with the flaws in traditional username and password systems, advocating for stronger, adaptive security measures. They highlight the critical role of strong passwords and even suggest the use of password managers. The talk then delves into multi-factor authentication (MFA), addressing risks due to poor configurations. The shift towards passwordless solutions, like magic links, is explored along with the challenges of user adoption. They finally touch on the complexities of ensuring robust security through conditional access and the future potential of Privileged Identity Management.

Jun 28, 2023 • 26min
Episode 47: How to Sharpen your Sword as a Pentester
In this episode Spencer, Darrius and Tyler get together for a round-table discussion on sharpening your sword as a pentester. They discuss what they do to keep improving, upping their skill and honing their craft. Spoiler, it's not just the technical aspects of pentesting that are important to work on.Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://click.spenceralessi.com/mylinks Work with Us: https://securit360.com