In this episode we’re talking about misconfigured and dangerous logon scripts. Spencer and Brad discuss 4 common examples, based on real-world engagements, of how […]
Subscribe to the CyberThreatPOV Podcast
Episode 53: How to Defend and Mitigate PowerShell Attacks
 This episode concludes our miniseries all about PowerShell. In this episode, we’re going to discuss How to Defend and Mitigate PowerShell Attacks. Definitely check […]
Episode 52: How to Prepare for an External Penetration Test
 In this episode Spencer and Tyler discuss the most important things you must do before you have an external penetration test. Everything from understanding […]
Episode 51: Security Automation with PowerShell
 Spencer and Darrius continue their series of episodes all about PowerShell. In this episode, they discuss using PowerShell for automation and orchestration. Stay tuned […]
Episode 49: Scoping Offensive Security Engagements
 In this episode, Brad and Spencer discuss the nuances around scoping offensive security engagements. Scoping an offensive security engagement involves defining boundaries, objectives, and […]
Episode 47: How to Sharpen your Sword as a Pentester
 In this episode Spencer, Darrius and Tyler get together for a round-table discussion on sharpening your sword as a pentester. They discuss what they […]
Episode 46: Reducing Active Directory Security Risks from a Hackers Perspective
 In this episode Spencer and Darrius discuss and explore Active Directory security risks from a hacker’s point of view. They discuss various techniques and […]
Episode 43: Hacking for Good – Insights and Inspiration with John Hammond
 In this episode, John Hammond joins us on the show! We talk about John’s background and how he got interested in computers, how he […]
Episode 42: OSINT – What You Don’t Know Can Hurt You
 OSINT – Open Source Intelligence: is the process of collecting and analyzing publicly available information in order to achieve some goal or facilitate some kind of […]
Securing Windows: Common Misconfigurations That Give Attackers The Advantage
Introduction In the ever-evolving landscape of cybersecurity, securing your Windows environment is paramount to safeguarding your organization and data. However, even with its built-in security […]