Introduction Have you ever received the advice, “use a strong password.”? I’m sure most of you have. Maybe in your personal life by a family […]
Subscribe to the CyberThreatPOV Podcast
Public Wi-Fi: The Double-Edged Sword of Connectivity and Cybersecurity
The appeal of free public Wi-Fi is inescapable in today’s digital world. The ability to connect, work, and socialize from any location – be it […]
Hidden Menace: How to Identify Misconfigured and Dangerous Logon Scripts
Introduction Internal networks are rife with lurking threats that often manifest in unexpected ways. Among these, logon scripts, a seemingly innocuous component of user and […]
Does AI remove the need for DEVSECOPs?
Introduction As technology evolves, so do the methodologies and tools employed in software development. The emergence of Artificial Intelligence (AI), specifically Large Language Models (LLM) […]
Securing Windows: Common Misconfigurations That Give Attackers The Advantage
Introduction In the ever-evolving landscape of cybersecurity, securing your Windows environment is paramount to safeguarding your organization and data. However, even with its built-in security […]
FTC and HHS Guidance for Online Tracking Technologies by HIPAA Covered Entities and Business Associates
On January 7, 2021, the Department of Health and Human Services (HHS) Office for Civil Rights (OCR) published guidance on the use of tracking technologies […]
Hidden Danger: How To Identify and Mitigate Insecure Windows Services
Introduction Services, in Windows, are a critical component of the operating system and provide essential functions that keep our computers running smoothly, and hopefully securely. […]
DMARC Rundown
Hello everyone, this is Tyler from the Offensive Security Team. I wanted to put together a white paper detailing DMARC and it’s two components SPF […]
Be Smart: Hire a Hacker
The job of IT IT people, you are some of the busiest. Think about it. You’ve got to not only keep the lights on but […]
Offensive Security Testing Part 4 – External Penetration Pentesting
 This is part 4 of a multi-episode series where the Offsec group at SecurIT360 dives into the details of various Offensive Security Tests, what […]