

The Cyber Threat Perspective
SecurIT360
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics.brad@securit360.com
Episodes
Mentioned books

Jul 19, 2023 • 28min
Episode 50: How Attackers Use PowerShell
Discover the sinister side of PowerShell as cyber adversaries exploit its capabilities for malicious attacks. The discussion reveals how attackers use PowerShell for everything from reconnaissance to bypassing security measures. Techniques like fileless malware and SQL server exploitation are analyzed, showcasing the tool's dual-edged nature. The speakers emphasize the importance of monitoring PowerShell to defend against these evolving threats while highlighting its indispensable role in both offensive and defensive cybersecurity.

Jul 12, 2023 • 28min
Episode 49: Scoping Offensive Security Engagements
Explore the critical nuances of scoping offensive security engagements, defining objectives and boundaries for effective penetration testing. Discover the evolving metrics that influence costs and timelines, as well as the challenges posed by cloud security. Learn about the complexities of scoping across various environments, including post-pandemic considerations. Delve into internal testing and the importance of alignment with client expectations, showcasing the collaborative dynamics of red and blue teams for enhanced security.

Jul 5, 2023 • 22min
Episode 48: Authentication done right!
The discussion kicks off with the flaws in traditional username and password systems, advocating for stronger, adaptive security measures. They highlight the critical role of strong passwords and even suggest the use of password managers. The talk then delves into multi-factor authentication (MFA), addressing risks due to poor configurations. The shift towards passwordless solutions, like magic links, is explored along with the challenges of user adoption. They finally touch on the complexities of ensuring robust security through conditional access and the future potential of Privileged Identity Management.

Jun 28, 2023 • 26min
Episode 47: How to Sharpen your Sword as a Pentester
In this episode Spencer, Darrius and Tyler get together for a round-table discussion on sharpening your sword as a pentester. They discuss what they do to keep improving, upping their skill and honing their craft. Spoiler, it's not just the technical aspects of pentesting that are important to work on.Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://go.spenceralessi.com/links Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.

Jun 21, 2023 • 37min
Episode 46: Reducing Active Directory Security Risks from a Hackers Perspective
Dive into the intriguing world of Active Directory security risks from a hacker's perspective. The discussion covers various attack techniques and essential tools. Listeners learn about the vulnerabilities tied to legacy protocols and the urgency of disabling them. Key strategies for managing Kerberos vulnerabilities and local admin rights are explored, along with the importance of continuous security reviews. Practical tools like Script Century and Pincastle are introduced to enhance security measures.

9 snips
Jun 14, 2023 • 21min
Episode 45: Our Most Common External Pen Test Findings
Tyler and Brad delve into the most frequent vulnerabilities found during external penetration tests. They unpack user enumeration issues on law firm websites and the risks of exposing personal information. The conversation shifts to cross-site scripting vulnerabilities, stressing the dangers of outdated web libraries. They also analyze security flaws in WordPress and the critical need for patch management. Finally, they highlight how implementing DMARC records can significantly bolster email security against attacks and domain misuse.

Jun 7, 2023 • 20min
Episode 44: Should penetration testers know how to code?
In this episode, Darrius and Brad talk about the need for coding skills in the offensive security world. There's some fun with regard to which languages are important too. Check it out!Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://go.spenceralessi.com/links Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.

May 31, 2023 • 32min
Episode 43: Hacking for Good - Insights and Inspiration with John Hammond
In this episode John Hammond joins us on the show! We talk about John's background and how he got interested in computers, how he approaches learning a new topic, if you have to create content to grow your career and so much more. There's a whole lot of fun and smiles and joy in this episode, check it out!Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://go.spenceralessi.com/links Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.

May 24, 2023 • 34min
Episode 42: OSINT - What You Don't Know Can Hurt You
Tyler Roberts, a cybersecurity expert, dives into the world of Open Source Intelligence (OSINT) and its dual nature. He highlights the risks of oversharing personal data online, as seemingly harmless posts can be exploited by attackers. The discussion uncovers vulnerabilities in law firm websites and the dangers posed by social engineering. Roberts also emphasizes the importance of securing sensitive data and mitigating risks through effective online monitoring, showcasing how even default web configurations can lead to security breaches.

May 17, 2023 • 37min
Episode 41: Security Assessment vs Pentest Which is More Impactful and Why
Delve into the key differences between security assessments and penetration tests, highlighting how each serves distinct roles in safeguarding IT infrastructure. Discover the value of real-world penetration testing in measuring the effectiveness of security policies. The conversation emphasizes the critical need for testing third-party applications to unveil vulnerabilities and discusses the challenges organizations face in resource allocation for effective assessments. Gain insights on how both methods complement each other for a stronger cybersecurity strategy.


