In this episode, we discuss what makes a great penetration test report. The report is THE crucial deliverable of a penetration test. It’s the […]
Subscribe to the CyberThreatPOV Podcast
Episode 61: How to Mitigate Social Engineering Attacks
 In this episode, we explore the various tactics used by malicious actors to manipulate individuals and organizations, and provide practical tips to safeguard against […]
Episode 60: Cybersecurity Hot Takes
 In this episode, Spencer and Darrius discuss unpopular Cybersecurity opinions, which are referred to as “hot takes.” This discussion was inspired from a tweet […]
Episode 59: Offensive TTPs and Tooling Trends
 In this episode, Darrius and Spencer discuss Offensive Security TTPs and tools that look promising, that we’re excited for, or are trending. Introduction Section […]
Episode 58: How To Identify and Mitigate Insecure Windows Services
 In this episode, we’re talking about How To Identify and Mitigate Insecure Windows Services. This is a very common issue we see on internal […]
Episode 57: Find and Fix AD CS Vulnerabilities Using Locksmith with Jake and Sam
 In this episode, we talk all about Active Directory Certificate Services and a free tool designed to help find and fix AD CS misconfigurations […]
Episode 56: Vulnerabilities & Severity – Explain It To Me Like I’m 5
 In this episode, Brad and Spencer talk about how vulnerabilities are assigned severity ratings, why they are important, how they are not perfect and […]
Episode 55: What If Your EDR Doesn’t Detect or Respond?
 In this episode, Brad and Spencer discuss the role EDR and Antivirus plays in a modern security stack, the overreliance on EDR, and how […]
Episode 54: Misconfigured and Dangerous Logon Scripts
 In this episode we’re talking about misconfigured and dangerous logon scripts. Spencer and Brad discuss 4 common examples, based on real-world engagements, of how […]
Episode 53: How to Defend and Mitigate PowerShell Attacks
 This episode concludes our miniseries all about PowerShell. In this episode, we’re going to discuss How to Defend and Mitigate PowerShell Attacks. Definitely check […]