In this episode, Brad and Spencer talk about how vulnerabilities are assigned severity ratings, why they are important, how they are not perfect and […]
Subscribe to the CyberThreatPOV Podcast
Episode 55: What If Your EDR Doesn’t Detect or Respond?
 In this episode, Brad and Spencer discuss the role EDR and Antivirus plays in a modern security stack, the overreliance on EDR, and how […]
Hidden Menace: How to Identify Misconfigured and Dangerous Logon Scripts
Introduction Internal networks are rife with lurking threats that often manifest in unexpected ways. Among these, logon scripts, a seemingly innocuous component of user and […]
Episode 54: Misconfigured and Dangerous Logon Scripts
 In this episode we’re talking about misconfigured and dangerous logon scripts. Spencer and Brad discuss 4 common examples, based on real-world engagements, of how […]
Episode 53: How to Defend and Mitigate PowerShell Attacks
 This episode concludes our miniseries all about PowerShell. In this episode, we’re going to discuss How to Defend and Mitigate PowerShell Attacks. Definitely check […]
Does AI remove the need for DEVSECOPs?
Introduction As technology evolves, so do the methodologies and tools employed in software development. The emergence of Artificial Intelligence (AI), specifically Large Language Models (LLM) […]
Episode 52: How to Prepare for an External Penetration Test
 In this episode Spencer and Tyler discuss the most important things you must do before you have an external penetration test. Everything from understanding […]
Episode 51: Security Automation with PowerShell
 Spencer and Darrius continue their series of episodes all about PowerShell. In this episode, they discuss using PowerShell for automation and orchestration. Stay tuned […]
Episode 50: How Attackers Use PowerShell
 In this episode Spencer and Darrius discuss how cyber adversaries harness the power of PowerShell to orchestrate their malicious activities. Stay tuned for the […]
Episode 49: Scoping Offensive Security Engagements
 In this episode, Brad and Spencer discuss the nuances around scoping offensive security engagements. Scoping an offensive security engagement involves defining boundaries, objectives, and […]