Threat reports can be goldmines for defenders — but only if we know how to extract and apply what matters. A good analysis can mean […]
Subscribe to the CyberThreatPOV Podcast
Episode 128: The Most Common External Pen Test Findings—And How to Fix Them
In this episode of “The Cyber Threat Perspective,” Brad and Sam dive into the most common external penetration test findings and offer solutions. Gain insights […]
Episode 127: SaaS Supply Chain Attacks – How to Stay Secure
In this episode of “The Cyber Threat Perspective,” Spencer and Brad dive into the complex world of SaaS supply chain attacks, sharing their insights on […]
Episode 126: Typosquatting – How and Why It Works and How To Defend Against It
In this episode of The Cyber Threat Perspective, we dive deep into the world of typosquatting, exploring what it entails and how organizations can protect […]
Episode 125: Whose Job Is Harder, Red Team or Blue Team?
In this episode of The Cyber Threat Perspective, we dive into the age-old debate: is it harder to be on the red team or the […]
Why Number Matching Multi-Factor Authentication is Superior to Push Notification Multi-Factor Authentication
Organizations and individuals must strengthen their security measures and Multi-factor authentication (MFA) is one of the most effective ways to protect accounts from unauthorized access. […]
Episode 124: MFA Myths Debunked – Why It’s Not a Silver Bullet
In this episode of The Cyber Threat Perspective, hosts Tyler and Brad dive into the intricacies of multifactor authentication (MFA). They explore why it’s not […]
Episode 123: Insecure Active Directory Protocols
Join Brad and Spencer as they get into the complexities of insecure Active Directory protocols. Learn about key vulnerabilities and how they can be addressed […]
Episode 122: AI/ChatGPT Interviews a Web Pen Tester!
Join us this week on The Cyber Threat Perspective as Brad dives into the fundamentals of web application penetration testing. Co-hosted by an AI persona […]
DMARC Rundown
Hello everyone, this is Tyler from the Offensive Security Team. I wanted to put together a white paper detailing DMARC and it’s two components SPF […]