In this episode, Spencer and Darrius go “behind the hack” and discuss what life is like behind the keyboard of a web application penetration […]
Subscribe to the CyberThreatPOV Podcast
Episode 63: A Day In The Life: Internal Penetration Testing
 In this episode, Brad and Spencer go “behind the hack” and discuss what life is like behind the keyboard of an internal penetration tester. […]
Episode 62: What Makes a Great Penetration Test Report?
 In this episode, we discuss what makes a great penetration test report. The report is THE crucial deliverable of a penetration test. It’s the […]
Episode 61: How to Mitigate Social Engineering Attacks
 In this episode, we explore the various tactics used by malicious actors to manipulate individuals and organizations, and provide practical tips to safeguard against […]
Episode 60: Cybersecurity Hot Takes
 In this episode, Spencer and Darrius discuss unpopular Cybersecurity opinions, which are referred to as “hot takes.” This discussion was inspired from a tweet […]
Episode 59: Offensive TTPs and Tooling Trends
 In this episode, Darrius and Spencer discuss Offensive Security TTPs and tools that look promising, that we’re excited for, or are trending. Introduction Section […]
Episode 58: How To Identify and Mitigate Insecure Windows Services
 In this episode, we’re talking about How To Identify and Mitigate Insecure Windows Services. This is a very common issue we see on internal […]
Episode 57: Find and Fix AD CS Vulnerabilities Using Locksmith with Jake and Sam
 In this episode, we talk all about Active Directory Certificate Services and a free tool designed to help find and fix AD CS misconfigurations […]
Episode 56: Vulnerabilities & Severity – Explain It To Me Like I’m 5
 In this episode, Brad and Spencer talk about how vulnerabilities are assigned severity ratings, why they are important, how they are not perfect and […]
Episode 55: What If Your EDR Doesn’t Detect or Respond?
 In this episode, Brad and Spencer discuss the role EDR and Antivirus plays in a modern security stack, the overreliance on EDR, and how […]