This is part 3 of a multi-episode series where the Offsec group at SecurIT360 dives into the details of various Offensive Security Tests, what they […]
Subscribe to the CyberThreatPOV Podcast
Episode 13: Offensive Security Testing Part 2 – Mobile Pentesting
 Introduction Have you ever wondered why your mobile application isn’t allowed to be published in the app store? Has the mobile application undergone a […]
Episode 12: Law Firm Security Challenges Live at LegalSec22
 Coming at you LIVE from LegalSec22 in San Antonio Texas. In this episode Brad and Spencer discuss common security challenges that are unique to […]
Episode 11: Offensive Security Testing Part 1 – Internal Pentesting
 *Check out our podcast and YouTube video released on 10/12/22, where we talk about this subject. Hope to see you there! Introduction Have you […]
Episode 10: Web Application Threats in the Modern Landscape
 *Check out our podcast and youtube video released on 10/5/22, where we talk about this subject. Hope to see you there! Introduction Web […]
Episode 9: Breaking In Or Branching Out: How To Get A Job In Cybersecurity
 There’s essentially a 0% unemployment rate in cybersecurity. It’s a very hot field, great job security, great pay and great mission. But, with that […]
Episode 8: Hackers: How we get in and how to stop us
 In this episode Brad and Spencer discuss the THREE primary ways we gain initial access on penetration tests and how to stop […]
9-16-22 Week in Review: Uber Hacked, Teams Cleartext Tokens, Intermittent Ransomware Encryption
 In this week’s review Uber was hacked Microsoft Teams stores auth tokens as cleartext in Windows, Linux, Macs Ransomware Developers Turn to Intermittent Encryption […]
Episode 7: How to Make Threat Actors Cry
 In this episode Brad and Spencer talk about what mature, proactive organizations are doing to harden and secure their environments, with the end goal […]
9-9-22 Week In Review: New EvilProxy Phishing Service and Linux Malware
 In this week’s review: New EvilProxy Phishing Service Allowing Cybercriminals to Bypass 2-Factor Security New Linux Malware Evades Detection Using Multi-stage Deployment If you’re […]