In this episode, Darrius and Spencer discuss Offensive Security TTPs and tools that look promising, that we’re excited for, or are trending. Introduction Section […]
Subscribe to the CyberThreatPOV Podcast
Episode 58: How To Identify and Mitigate Insecure Windows Services
 In this episode, we’re talking about How To Identify and Mitigate Insecure Windows Services. This is a very common issue we see on internal […]
Episode 57: Find and Fix AD CS Vulnerabilities Using Locksmith with Jake and Sam
 In this episode, we talk all about Active Directory Certificate Services and a free tool designed to help find and fix AD CS misconfigurations […]
Episode 56: Vulnerabilities & Severity – Explain It To Me Like I’m 5
 In this episode, Brad and Spencer talk about how vulnerabilities are assigned severity ratings, why they are important, how they are not perfect and […]
Episode 55: What If Your EDR Doesn’t Detect or Respond?
 In this episode, Brad and Spencer discuss the role EDR and Antivirus plays in a modern security stack, the overreliance on EDR, and how […]
Episode 54: Misconfigured and Dangerous Logon Scripts
 In this episode we’re talking about misconfigured and dangerous logon scripts. Spencer and Brad discuss 4 common examples, based on real-world engagements, of how […]
Episode 53: How to Defend and Mitigate PowerShell Attacks
 This episode concludes our miniseries all about PowerShell. In this episode, we’re going to discuss How to Defend and Mitigate PowerShell Attacks. Definitely check […]
Episode 52: How to Prepare for an External Penetration Test
 In this episode Spencer and Tyler discuss the most important things you must do before you have an external penetration test. Everything from understanding […]
Episode 51: Security Automation with PowerShell
 Spencer and Darrius continue their series of episodes all about PowerShell. In this episode, they discuss using PowerShell for automation and orchestration. Stay tuned […]
Episode 50: How Attackers Use PowerShell
 In this episode Spencer and Darrius discuss how cyber adversaries harness the power of PowerShell to orchestrate their malicious activities. Stay tuned for the […]