Subscribe to the CyberThreatPOV Podcast

Episode 162 – Before The Breach: How Attackers Profile Your Organization

How do attackers profile your organization before a breach? In this episode, Brad and Spencer break down the methods and information threat actors use—and what you can do about it.

  • What publicly available information can make your organization a target
  • How job postings and social media posts expose your technology stack and employees
  • The impact of breach history, mergers, and public company news on attacker interest
  • The dangers of “shadow IT” and personal accounts linked to corporate resources
  • How AI and new web technologies are rapidly expanding the attack surface

Stay tuned for practical advice and real-world examples to help you strengthen your defenses.

Blog: https://offsec.blog/
Youtube: https://www.youtube.com/@cyberthreatpov
Twitter: https://x.com/cyberthreatpov

Follow Spencer on social ⬇
Spencer’s Links: https://go.spenceralessi.com/links

Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.