In this episode, we explore the various tactics used by malicious actors to manipulate individuals and organizations, and provide practical tips to safeguard against […]
Subscribe to the CyberThreatPOV Podcast
Episode 60: Cybersecurity Hot Takes
 In this episode, Spencer and Darrius discuss unpopular Cybersecurity opinions, which are referred to as “hot takes.” This discussion was inspired from a tweet […]
Episode 59: Offensive TTPs and Tooling Trends
 In this episode, Darrius and Spencer discuss Offensive Security TTPs and tools that look promising, that we’re excited for, or are trending. Introduction Section […]
Public Wi-Fi: The Double-Edged Sword of Connectivity and Cybersecurity
The appeal of free public Wi-Fi is inescapable in today’s digital world. The ability to connect, work, and socialize from any location – be it […]
Episode 58: How To Identify and Mitigate Insecure Windows Services
 In this episode, we’re talking about How To Identify and Mitigate Insecure Windows Services. This is a very common issue we see on internal […]
Episode 57: Find and Fix AD CS Vulnerabilities Using Locksmith with Jake and Sam
 In this episode, we talk all about Active Directory Certificate Services and a free tool designed to help find and fix AD CS misconfigurations […]
Episode 56: Vulnerabilities & Severity – Explain It To Me Like I’m 5
 In this episode, Brad and Spencer talk about how vulnerabilities are assigned severity ratings, why they are important, how they are not perfect and […]
Episode 55: What If Your EDR Doesn’t Detect or Respond?
 In this episode, Brad and Spencer discuss the role EDR and Antivirus plays in a modern security stack, the overreliance on EDR, and how […]
Hidden Menace: How to Identify Misconfigured and Dangerous Logon Scripts
Introduction Internal networks are rife with lurking threats that often manifest in unexpected ways. Among these, logon scripts, a seemingly innocuous component of user and […]
Episode 54: Misconfigured and Dangerous Logon Scripts
 In this episode we’re talking about misconfigured and dangerous logon scripts. Spencer and Brad discuss 4 common examples, based on real-world engagements, of how […]