How do attackers profile your organization before a breach? In this episode, Brad and Spencer break down the methods and information threat actors use—and what […]
Subscribe to the CyberThreatPOV Podcast
Episode 161: The Evolution of Pentesting Going Into 2026
Get ready for a sharp look at how penetration testing is evolving as we approach 2026. In this episode, Brad and Spencer break down current […]
Episode 160: Should You Alert Your SOC Before a Pentest?
Should you alert your SOC before a penetration test? In this episode, the Cyber Threat Perspective team dives into why notifying your SOC might not […]
Episode 159: How to Break Into Cybersecurity in 2026
In this episode, we’re sharing practical, no-fluff advice for getting into cybersecurity, whether you’re switching careers, just starting out, or leveling up your IT skills. […]
LockBox.Upload: Because Path.GetExtension() Isn’t Security
“The last file-upload validator your .NET app will ever need.” When hackers throw files, we throw them back. The File Upload Security Problem Let me […]
GraphQL Hunter: Because Your GraphQL API Deserves a Proper Security Audit
“Because GraphQL APIs deserve a security audit that’s more thorough than your code reviews.” 😎 The GraphQL Security Problem Nobody Talks About GraphQL is everywhere. […]
Episode 158: How to get kicked out of AWS by the FBI
Ever wondered how a routine pen test can spiral into a showdown with AWS and the FBI? This episode dives straight into the technical missteps […]
Introducing PenDoc: Stop Manually Screenshotting 500 Web Apps
Because manually screenshotting 500 web apps is NOT how you want to spend your Friday. The Problem Every Penetration Tester Faces We’ve all been there. […]
Episode 157: AppSec Findings In 2025
Web application security continues to evolve, and new vulnerabilities crop up every year. In this episode, Brad and Jordan Natter break down the most notable […]
Episode 156: Post Exploitation Tactics That Still Work in 2025
In this episode of The Cyber Threat Perspective, Tyler Roberts joins Spencer Alessi to break down the post-exploitation tactics that are still working in 2025. […]
