In this episode of “The Cyber Threat Perspective,” hosts Spencer and Brad dive into the intricate world of InfoStealer malware, which affects 10,000 victims […]
Subscribe to the CyberThreatPOV Podcast
Episode 100: The OpenSSH RegreSSHion Vulnerability
In this episode of The Cyber Threat Perspective, Brad and Spencer dive into the OpenSSH RegreSSHion Vulnerability, discussing its implications and defense mechanisms. You won’t […]
Episode 99: ToolTime – OneDriveEnum and AD Miner
 In this episode, we dive into two powerful tools, OneDriveEnum and AD Miner, and explore their unique features and usage in cybersecurity engagements. Join […]
Episode 98: Current State of M365 Attacks – Initial Access
 In this episode, we discuss the latest trends and techniques for enumerating Microsoft 365. We break down how attackers may identify M365 tenants, how […]
Episode 97: Current State of M365 Attacks Enumeration
 In this episode of The Cyber Threat Perspective, Spencer and Tyler dive into the world of Microsoft 365 attacks with a focus on enumeration […]
Episode 96: How To Harden Active Directory To Prevent Cyber Attacks
 This is a recording of a webinar aimed at IT professionals, system administrators, and cybersecurity professionals eager to bolster their defenses against cyber threats. […]
Episode 95: Navigating the Legal Maze of Cybersecurity with Alexander Boyd
 In this episode of The Cyber Threat Perspective, legal expert Alexander Boyd sheds light on navigating the complex legal landscape of cybersecurity incidents. From […]
Episode 94: Defending Against Ransomware Part 2
 Join hosts Brad and Spencer from SecurIT360 as they delve into crucial strategies for defending against ransomware in their latest podcast episode. Learn about […]
Episode 93: Defending Against Ransomware Part 1
 In Episode 93 of The Cyber Threat Perspective, Spencer and Brad discuss crucial strategies for defending against ransomware. This first part focuses on preparation […]
Episode 92: Cybersecurity Training and Certification Advice
In this episode of The Cyber Threat Perspective, Spencer and Darrius dive into essential tips and advice for cybersecurity training and certification. From strategizing study […]