In this episode, Tyler and Brad talk about the most common external penetration test findings. We see these findings over and over again and […]
Subscribe to the CyberThreatPOV Podcast
Episode 44: Should Penetration Testers Know How To Code?
In this episode, Darrius and Brad talk about the need for coding skills in the offensive security world. There’s some fun with regard to […]
Episode 43: Hacking for Good – Insights and Inspiration with John Hammond
In this episode, John Hammond joins us on the show! We talk about John’s background and how he got interested in computers, how he […]
Episode 42: OSINT – What You Don’t Know Can Hurt You
OSINT – Open Source Intelligence: is the process of collecting and analyzing publicly available information in order to achieve some goal or facilitate some kind of […]
Securing Windows: Common Misconfigurations That Give Attackers The Advantage
Introduction In the ever-evolving landscape of cybersecurity, securing your Windows environment is paramount to safeguarding your organization and data. However, even with its built-in security […]
Episode 41: Security Assessment vs Pentest Which is More Impactful and Why
In this episode, Brad, Spencer, and Tyler discuss the major differences and pros and cons of Security Assessments and Penetration Tests. In the end […]
Episode 40: How Attackers Target Law Firms and How To Detect & Prevent It
It’s no secret law firms have become prime targets for attackers due to the sensitive information they handle and the clients they do business […]
Episode 39: Pentesting Certifications Tier List Part 2
This is part 2 of a 2 part series where Spencer, Darrius and Tyler talk about pentesting certifications and where they fall on a […]
Episode 38: Pentesting Certifications Tier List Part 1
This is part 1 of a 2 part series where Spencer, Darrius and Tyler talk about pentesting certifications and where they fall on a […]
Episode 37: Offensive Security Testing Part 5 – Wireless Pentesting
In this episode Brad and Darrius continue the Offensive Security Testing series and discuss Wireless Penetration Testing. Wireless Pentesting is often overlooked, but could […]