How do attackers profile your organization before a breach? In this episode, Brad and Spencer break down the methods and information threat actors use—and what you can do about it.
- What publicly available information can make your organization a target
- How job postings and social media posts expose your technology stack and employees
- The impact of breach history, mergers, and public company news on attacker interest
- The dangers of “shadow IT” and personal accounts linked to corporate resources
- How AI and new web technologies are rapidly expanding the attack surface
Stay tuned for practical advice and real-world examples to help you strengthen your defenses.
Blog: https://offsec.blog/
Youtube: https://www.youtube.com/@cyberthreatpov
Twitter: https://x.com/cyberthreatpov
Follow Spencer on social ⬇
Spencer’s Links: https://go.spenceralessi.com/links
Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.
