

The Cyber Threat Perspective
SecurIT360
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics.brad@securit360.com
Episodes
Mentioned books

Mar 7, 2025 • 32min
Episode 126: Typosquatting - How and Why It Works and How to Defend Against It
Dive into the quirky underworld of digital misdirection in this episode, where we explore the art of typosquatting. Discover how a simple mistyped URL can turn into a gateway for cyber trickery, as we break down the many forms of typosquatting—from subtle misspellings that mimic trusted sites to more elaborate schemes designed to deceive. Learn why these small errors are so effective in luring unsuspecting users and get insider tips on how to protect yourself from falling into these cleverly crafted traps. Whether you're a digital native or just curious about the hidden risks of the internet, this episode equips you with the knowledge and defenses you need to navigate online spaces with confidence. Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://click.spenceralessi.com/mylinks Work with Us: https://securit360.com

Feb 28, 2025 • 56min
Episode 125: Whose Job Is Harder? Red or Blue
The discussion dives into the roles of red and blue teams in cybersecurity, comparing their unique challenges. Personal anecdotes shed light on the journey from help desk to specialized roles. There's a focus on the hefty prep work behind penetration testing, demonstrating the extensive time needed for successful outcomes. The importance of collaboration for effective security practices is emphasized, alongside tips for maintaining mental well-being in a high-pressure field. Staying updated with industry trends through various tools is also highlighted.

Feb 21, 2025 • 35min
(Replay) How To Monitor Your Attack Surface
Unlock the secrets of effective attack surface monitoring in this replay of The Cyber Threat Perspective. Brad and Spencer dive into essential practices, tools, and methodologies to keep your systems secure.Define and understand attack surface and attack vectorsDistinguish between physical and digital attack surfacesExplore DIY vs. commercial tools for attack surface monitoringLearn from bug bounty industry methodologies and resourcesEmphasize the importance of continuous monitoring and asset managementCheck out our show notes for additional resources, and don't forget to like, share, and subscribe!Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://click.spenceralessi.com/mylinks Work with Us: https://securit360.com

Feb 14, 2025 • 54min
Episode 124: MFA != Secure
The podcast dives into the complexities surrounding multi-factor authentication (MFA), revealing its limitations and vulnerabilities in real-world applications. It highlights how certain MFA methods, like SMS and social engineering, can be compromised. The discussion also introduces number matching as a more secure alternative and emphasizes the need for continuous monitoring and adaptive authentication for enhanced security. Moreover, the role of AI in facilitating cyber threats is examined, underlining the necessity for a multifaceted approach to user authentication.

Feb 7, 2025 • 40min
Episode 123: Insecure Active Directory Protocols
Dive into the world of insecure Active Directory protocols and discover how they can be exploited by attackers for privilege escalation and lateral movement. Learn about essential tools like Pincastle and Purple Knight for identifying security issues. Explore the risks of legacy protocols such as LMNR and NBNS, including potential attacks. Understand the evolving challenges in internal penetration testing and the vulnerabilities of the Windows web client service, emphasizing the importance of updating security practices.

Jan 31, 2025 • 15min
Episode 122: AI/ChatGPT Interviews a Web Pen Tester!!
Chelsea interviews Brad about web application penetration testing, uncovering the essential stages and methodologies. They discuss the importance of client involvement and proper scoping to ensure safety. The conversation delves into prioritizing vulnerabilities and utilizing the Common Vulnerability Scoring System. A collaborative approach to remediation is highlighted, along with effective reporting strategies. Lastly, they emphasize measuring success through client feedback and integrating security practices early in development.

9 snips
Jan 24, 2025 • 41min
Episode 121: How We Evade Detection During Internal Pentests
Dive into the intriguing world of evasion in internal penetration testing. Discover how security professionals cleverly navigate detection systems using customized tools and obfuscation methods. Learn about adapting techniques to overcome modern security challenges, as well as the role of languages like PowerShell and C#. Explore advanced tactics like token duplication for lateral movement, emphasizing the need for better monitoring to catch subtle threats. This insightful discussion bridges the gap between offensive strategies and defensive measures in cybersecurity.

Jan 17, 2025 • 41min
Episode 120: Demystifying Pentests: What Every Organization Needs to Know
Dive into the fascinating world of penetration testing! Discover how it differs from vulnerability assessments and why manual testing is essential. Learn about the communication dynamics that improve client relationships and ensure effective remediation. Explore specific risks, like those associated with OneDrive, and the importance of staying updated with evolving methodologies. Finally, uncover the value of post-engagement discussions that enhance understanding of vulnerabilities and guide better security investments.

Jan 10, 2025 • 46min
Episode 119: Lessons Natural Disasters Can Teach Us About Cybersecurity
In this episode, we draw parallels between natural disasters and navigating today’s cybersecurity landscape. From the importance of preparation and layered defenses to the critical need for constant monitoring and resilience, we uncover valuable lessons that nature’s challenges can teach us about protecting systems and data. Whether you’re an IT professional, a business owner, or just someone passionate about cybersecurity, this episode will inspire you to think differently about your defenses—and stay one step ahead.Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://click.spenceralessi.com/mylinks Work with Us: https://securit360.com

Jan 1, 2025 • 57min
(Replay) Tales From The Trenches
Join us for this replay of episode 78 - an enthralling journey into the heart of cybersecurity operations with “Tales from the Trenches,” an exclusive podcast presented by Brad Causey, Vice President of Offensive Security at SecurIT360.Dive deep into the high-stakes world of offensive security as Brad shares his firsthand experiences from a career spent on the front lines of digital defense.Engage with real-life stories illustrating offensive cybersecurity's intense challenges and triumphant victories. Brad's narrative will transport you to the core of high-pressure operations, where strategic decisions can impact the security posture of entire organizations.Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://click.spenceralessi.com/mylinks Work with Us: https://securit360.com