This is part 4 of a multi-episode series where the Offsec group at SecurIT360 dives into the details of various Offensive Security Tests, what […]
Subscribe to the CyberThreatPOV Podcast
Episode 14: Offensive Security Testing Part 3 – Web App Pentesting
This is part 3 of a multi-episode series where the Offsec group at SecurIT360 dives into the details of various Offensive Security Tests, what they […]
Episode 13: Offensive Security Testing Part 2 – Mobile Pentesting
 Introduction Have you ever wondered why your mobile application isn’t allowed to be published in the app store? Has the mobile application undergone a […]
Episode 11: Offensive Security Testing Part 1 – Internal Pentesting
 *Check out our podcast and YouTube video released on 10/12/22, where we talk about this subject. Hope to see you there! Introduction Have you […]
Episode 10: Web Application Threats in the Modern Landscape
 *Check out our podcast and youtube video released on 10/5/22, where we talk about this subject. Hope to see you there! Introduction Web […]
3 Qualities of a Great Penetration Tester
Intro Working as a penetration tester is more complex than just attempting to access networks or exploit vulnerabilities. Throughout the process of penetration testing, there […]
7 Awesome Ways to Show Off Your Skills as a Pentester
 Introduction Cybersecurity is an extremely fast moving field. While there are some tried and true things in cybersecurity, there are just as many things […]
It’s a Trap! Avoid These 4 Common Pentesting Mistakes
Introduction Penetration testing and ethical hacking is awesome and it’s all a TON of fun. Well, most of the time, when you’re not troubleshooting for […]
What to Expect During Your Upcoming External Penetration Test
Background Customers often have questions about their upcoming external network penetration test. Many times our analysts are asked: What systems will be affected? Will this […]
3 Easy Wins For Defenders From A Pentesters Point Of View
There’s no shortage of stories about how a bad actor was able to compromise a user’s computer, and within minutes, move laterally, achieve Domain Admin […]