In this episode, Brad and Spencer discuss the role EDR and Antivirus plays in a modern security stack, the overreliance on EDR, and how […]
Subscribe to the CyberThreatPOV Podcast
Episode 54: Misconfigured and Dangerous Logon Scripts
 In this episode we’re talking about misconfigured and dangerous logon scripts. Spencer and Brad discuss 4 common examples, based on real-world engagements, of how […]
Episode 53: How to Defend and Mitigate PowerShell Attacks
 This episode concludes our miniseries all about PowerShell. In this episode, we’re going to discuss How to Defend and Mitigate PowerShell Attacks. Definitely check […]
Episode 52: How to Prepare for an External Penetration Test
 In this episode Spencer and Tyler discuss the most important things you must do before you have an external penetration test. Everything from understanding […]
Episode 51: Security Automation with PowerShell
 Spencer and Darrius continue their series of episodes all about PowerShell. In this episode, they discuss using PowerShell for automation and orchestration. Stay tuned […]
Episode 50: How Attackers Use PowerShell
 In this episode Spencer and Darrius discuss how cyber adversaries harness the power of PowerShell to orchestrate their malicious activities. Stay tuned for the […]
Episode 49: Scoping Offensive Security Engagements
 In this episode, Brad and Spencer discuss the nuances around scoping offensive security engagements. Scoping an offensive security engagement involves defining boundaries, objectives, and […]
Episode 48: Authentication done right!
 In this episode, Brad and Darrius talk about Authentication and what issues they routinely see while performing penetration tests. They talk about MFA, Passwords, […]
Episode 47: How to Sharpen your Sword as a Pentester
 In this episode Spencer, Darrius and Tyler get together for a round-table discussion on sharpening your sword as a pentester. They discuss what they […]
Episode 46: Reducing Active Directory Security Risks from a Hackers Perspective
 In this episode Spencer and Darrius discuss and explore Active Directory security risks from a hacker’s point of view. They discuss various techniques and […]