Unlock the secrets of effective attack surface monitoring in this episode of The Cyber Threat Perspective. Brad and Spencer dive into essential practices, tools, and […]
Subscribe to the CyberThreatPOV Podcast
Episode 104: How To Get Into Cyber For First Responders
Join us in this episode as we talk with Sam Killingsworth, a pen tester and career firefighter paramedic, about transitioning into a cybersecurity career. Discover […]
Episode 103: Email Spoofing and Cybersecurity: Misconfigurations, Protections, and Mitigations
Welcome to The Cyber Threat Perspective! In this episode, Brad and Spencer dive into the mechanics and recent developments of email spoofing, shedding light on […]
Episode 102: The Global CrowdStrike Outage
In this episode of The Cyber Threat Perspective, we dive into the recent global CrowdStrike outage and its far-reaching implications. Join us as we break […]
Episode 101: Infostealers – 10000 Victims a Day
 In this episode of “The Cyber Threat Perspective,” hosts Spencer and Brad dive into the intricate world of InfoStealer malware, which affects 10,000 victims […]
Episode 100: The OpenSSH RegreSSHion Vulnerability
In this episode of The Cyber Threat Perspective, Brad and Spencer dive into the OpenSSH RegreSSHion Vulnerability, discussing its implications and defense mechanisms. You won’t […]
Episode 99: ToolTime – OneDriveEnum and AD Miner
 In this episode, we dive into two powerful tools, OneDriveEnum and AD Miner, and explore their unique features and usage in cybersecurity engagements. Join […]
Episode 98: Current State of M365 Attacks – Initial Access
 In this episode, we discuss the latest trends and techniques for enumerating Microsoft 365. We break down how attackers may identify M365 tenants, how […]
Episode 97: Current State of M365 Attacks Enumeration
 In this episode of The Cyber Threat Perspective, Spencer and Tyler dive into the world of Microsoft 365 attacks with a focus on enumeration […]
Episode 96: How To Harden Active Directory To Prevent Cyber Attacks
 This is a recording of a webinar aimed at IT professionals, system administrators, and cybersecurity professionals eager to bolster their defenses against cyber threats. […]