In this episode, we explore the various tactics used by malicious actors to manipulate individuals and organizations, and provide practical tips to safeguard against […]
Subscribe to the CyberThreatPOV Podcast
Episode 60: Cybersecurity Hot Takes
 In this episode, Spencer and Darrius discuss unpopular Cybersecurity opinions, which are referred to as “hot takes.” This discussion was inspired from a tweet […]
Episode 59: Offensive TTPs and Tooling Trends
 In this episode, Darrius and Spencer discuss Offensive Security TTPs and tools that look promising, that we’re excited for, or are trending. Introduction Section […]
Episode 58: How To Identify and Mitigate Insecure Windows Services
 In this episode, we’re talking about How To Identify and Mitigate Insecure Windows Services. This is a very common issue we see on internal […]
Episode 57: Find and Fix AD CS Vulnerabilities Using Locksmith with Jake and Sam
 In this episode, we talk all about Active Directory Certificate Services and a free tool designed to help find and fix AD CS misconfigurations […]
Episode 56: Vulnerabilities & Severity – Explain It To Me Like I’m 5
 In this episode, Brad and Spencer talk about how vulnerabilities are assigned severity ratings, why they are important, how they are not perfect and […]
Episode 55: What If Your EDR Doesn’t Detect or Respond?
 In this episode, Brad and Spencer discuss the role EDR and Antivirus plays in a modern security stack, the overreliance on EDR, and how […]
Episode 54: Misconfigured and Dangerous Logon Scripts
 In this episode we’re talking about misconfigured and dangerous logon scripts. Spencer and Brad discuss 4 common examples, based on real-world engagements, of how […]
Episode 53: How to Defend and Mitigate PowerShell Attacks
 This episode concludes our miniseries all about PowerShell. In this episode, we’re going to discuss How to Defend and Mitigate PowerShell Attacks. Definitely check […]
Episode 52: How to Prepare for an External Penetration Test
 In this episode Spencer and Tyler discuss the most important things you must do before you have an external penetration test. Everything from understanding […]