The Cyber Threat Perspective

SecurIT360
undefined
Mar 7, 2025 • 32min

Episode 126: Typosquatting - How and Why It Works and How to Defend Against It

Dive into the quirky underworld of digital misdirection in this episode, where we explore the art of typosquatting. Discover how a simple mistyped URL can turn into a gateway for cyber trickery, as we break down the many forms of typosquatting—from subtle misspellings that mimic trusted sites to more elaborate schemes designed to deceive. Learn why these small errors are so effective in luring unsuspecting users and get insider tips on how to protect yourself from falling into these cleverly crafted traps. Whether you're a digital native or just curious about the hidden risks of the internet, this episode equips you with the knowledge and defenses you need to navigate online spaces with confidence. Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://click.spenceralessi.com/mylinks Work with Us: https://securit360.com
undefined
Feb 28, 2025 • 56min

Episode 125: Whose Job Is Harder? Red or Blue

The discussion dives into the roles of red and blue teams in cybersecurity, comparing their unique challenges. Personal anecdotes shed light on the journey from help desk to specialized roles. There's a focus on the hefty prep work behind penetration testing, demonstrating the extensive time needed for successful outcomes. The importance of collaboration for effective security practices is emphasized, alongside tips for maintaining mental well-being in a high-pressure field. Staying updated with industry trends through various tools is also highlighted.
undefined
Feb 21, 2025 • 35min

(Replay) How To Monitor Your Attack Surface

Unlock the secrets of effective attack surface monitoring in this replay of The Cyber Threat Perspective. Brad and Spencer dive into essential practices, tools, and methodologies to keep your systems secure.Define and understand attack surface and attack vectorsDistinguish between physical and digital attack surfacesExplore DIY vs. commercial tools for attack surface monitoringLearn from bug bounty industry methodologies and resourcesEmphasize the importance of continuous monitoring and asset managementCheck out our show notes for additional resources, and don't forget to like, share, and subscribe!Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://click.spenceralessi.com/mylinks Work with Us: https://securit360.com
undefined
Feb 14, 2025 • 54min

Episode 124: MFA != Secure

The podcast dives into the complexities surrounding multi-factor authentication (MFA), revealing its limitations and vulnerabilities in real-world applications. It highlights how certain MFA methods, like SMS and social engineering, can be compromised. The discussion also introduces number matching as a more secure alternative and emphasizes the need for continuous monitoring and adaptive authentication for enhanced security. Moreover, the role of AI in facilitating cyber threats is examined, underlining the necessity for a multifaceted approach to user authentication.
undefined
Feb 7, 2025 • 40min

Episode 123: Insecure Active Directory Protocols

Dive into the world of insecure Active Directory protocols and discover how they can be exploited by attackers for privilege escalation and lateral movement. Learn about essential tools like Pincastle and Purple Knight for identifying security issues. Explore the risks of legacy protocols such as LMNR and NBNS, including potential attacks. Understand the evolving challenges in internal penetration testing and the vulnerabilities of the Windows web client service, emphasizing the importance of updating security practices.
undefined
Jan 31, 2025 • 15min

Episode 122: AI/ChatGPT Interviews a Web Pen Tester!!

Chelsea interviews Brad about web application penetration testing, uncovering the essential stages and methodologies. They discuss the importance of client involvement and proper scoping to ensure safety. The conversation delves into prioritizing vulnerabilities and utilizing the Common Vulnerability Scoring System. A collaborative approach to remediation is highlighted, along with effective reporting strategies. Lastly, they emphasize measuring success through client feedback and integrating security practices early in development.
undefined
9 snips
Jan 24, 2025 • 41min

Episode 121: How We Evade Detection During Internal Pentests

Dive into the intriguing world of evasion in internal penetration testing. Discover how security professionals cleverly navigate detection systems using customized tools and obfuscation methods. Learn about adapting techniques to overcome modern security challenges, as well as the role of languages like PowerShell and C#. Explore advanced tactics like token duplication for lateral movement, emphasizing the need for better monitoring to catch subtle threats. This insightful discussion bridges the gap between offensive strategies and defensive measures in cybersecurity.
undefined
Jan 17, 2025 • 41min

Episode 120: Demystifying Pentests: What Every Organization Needs to Know

Dive into the fascinating world of penetration testing! Discover how it differs from vulnerability assessments and why manual testing is essential. Learn about the communication dynamics that improve client relationships and ensure effective remediation. Explore specific risks, like those associated with OneDrive, and the importance of staying updated with evolving methodologies. Finally, uncover the value of post-engagement discussions that enhance understanding of vulnerabilities and guide better security investments.
undefined
Jan 10, 2025 • 46min

Episode 119: Lessons Natural Disasters Can Teach Us About Cybersecurity

In this episode, we draw parallels between natural disasters and navigating today’s cybersecurity landscape. From the importance of preparation and layered defenses to the critical need for constant monitoring and resilience, we uncover valuable lessons that nature’s challenges can teach us about protecting systems and data. Whether you’re an IT professional, a business owner, or just someone passionate about cybersecurity, this episode will inspire you to think differently about your defenses—and stay one step ahead.Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://click.spenceralessi.com/mylinks Work with Us: https://securit360.com
undefined
Jan 1, 2025 • 57min

(Replay) Tales From The Trenches

Join us for this replay of episode 78 - an enthralling journey into the heart of cybersecurity operations with “Tales from the Trenches,” an exclusive podcast presented by Brad Causey, Vice President of Offensive Security at SecurIT360.Dive deep into the high-stakes world of offensive security as Brad shares his firsthand experiences from a career spent on the front lines of digital defense.Engage with real-life stories illustrating offensive cybersecurity's intense challenges and triumphant victories. Brad's narrative will transport you to the core of high-pressure operations, where strategic decisions can impact the security posture of entire organizations.Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://click.spenceralessi.com/mylinks Work with Us: https://securit360.com

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app