*Check out our podcast and youtube video released on 10/5/22, where we talk about this subject. Hope to see you there! Introduction Web […]
Subscribe to the CyberThreatPOV Podcast
Episode 9: Breaking In Or Branching Out: How To Get A Job In Cybersecurity
 There’s essentially a 0% unemployment rate in cybersecurity. It’s a very hot field, great job security, great pay and great mission. But, with that […]
Episode 8: Hackers: How we get in and how to stop us
 In this episode Brad and Spencer discuss the THREE primary ways we gain initial access on penetration tests and how to stop […]
9-16-22 Week in Review: Uber Hacked, Teams Cleartext Tokens, Intermittent Ransomware Encryption
 In this week’s review Uber was hacked Microsoft Teams stores auth tokens as cleartext in Windows, Linux, Macs Ransomware Developers Turn to Intermittent Encryption […]
Episode 7: How to Make Threat Actors Cry
 In this episode Brad and Spencer talk about what mature, proactive organizations are doing to harden and secure their environments, with the end goal […]
9-9-22 Week In Review: New EvilProxy Phishing Service and Linux Malware
 In this week’s review: New EvilProxy Phishing Service Allowing Cybercriminals to Bypass 2-Factor Security New Linux Malware Evades Detection Using Multi-stage Deployment If you’re […]
Episode 6: 5 Ways to Get More Value out of your External Penetration Test
 Are you sure you’re getting what you paid for when it comes to external penetration tests? In this podcast Brad and Spencer discuss 5 […]
9-2-22 Week in Review: Okta Phishing, BEC Analysis, LNK Attacks
 In this week’s review Roasting 0ktapus: The phishing campaign going after Okta identity credentials Advanced BEC Scam Campaign Targeting Executives on O365 The Rise […]
Episode 5: Common High-Risk Findings on Internal Pentests
 It’s an unfortunate truth that we see these common high risk findings time and time again on internal pentests. We find these issues on […]
8-26-22 Week in Review: LastPass Breach, Office 365 Abuse, DevSecOps
 In this week’s review Hackers Breach LastPass Developer System to Steal Source Code You Can’t Audit Me: APT29 Continues Targeting Microsoft 365 | Mandiant […]