In this episode, we’re diving into one of the most enduring cybersecurity challenges—weak passwords. We’ll explore how poor password practices and identity management pitfalls leave […]
Subscribe to the CyberThreatPOV Podcast
Episode 89: How To Actually Protect Credentials
Are you struggling to keep your sensitive credentials safe and secure? In Episode 89 of The Cyber Threat Perspective, we dive into effective strategies for […]
Demystifying STRONG Passwords
Introduction Have you ever received the advice, “use a strong password.”? I’m sure most of you have. Maybe in your personal life by a family […]
Episode 73: Password Spraying Inside & Out
 In this episode, we discuss password spraying, a favorite technique among attackers who are trying to compromise organizations. Spencer and Tyler discuss external and […]
Episode 65: Unsecured Credentials and Where To Find Them
 In this very special Halloween episode, prepared to be scared. Brad and Spencer discuss the common and not so common locations that we find […]
Episode 48: Authentication done right!
 In this episode, Brad and Darrius talk about Authentication and what issues they routinely see while performing penetration tests. They talk about MFA, Passwords, […]
Episode 27: Password Myths Misconceptions and Lies
 In this episode Brad and Spencer discuss all the bad advice that’s been given over the years regarding passwords and they provide insights into […]
8-19-22 Week in Review: Password Snooping, Supply Chain, Cl0p Ransomware
 In this week’s review Cleartext Shenanigans: Gifting User Passwords to Adversaries With NPPSPY Realtek SDK Vulnerability Exposes Routers InfoSec Handlers Diary Blog – SANS […]
Episode 2: How to Find Passwords on Network Shares Before Attackers Do
 Brad and Spencer discuss a common finding on internal penetration tests. If you’re on to go, listen here or on your favorite podcast app: […]
3 Easy Wins For Defenders From A Pentesters Point Of View
There’s no shortage of stories about how a bad actor was able to compromise a user’s computer, and within minutes, move laterally, achieve Domain Admin […]