Podcast Episodes

Back to Search
No image available

Episode 133: How Cyber Attackers Steal Credentials & Hijack Sessions


Season 1 Episode 133


In this episode of The Cyber Threat Perspective, we break down how attackers steal credentials and hijack sessions to gain unauthorized access to systems and data. From phishing to cookie stealing to…


Published on 4 months, 2 weeks ago

No image available

Episode 132: Reviewing the Mandiant M-Trends 2025 Report


Season 1 Episode 132


In this episode Spencer and Brad review the M-Trends 2025 Report. M-Trends 2025 is Mandiant's annual report that shares frontline learnings from its global incident-response engagements—over 450 000 …


Published on 4 months, 3 weeks ago

No image available

(Replay) How To Defend Against Lateral Movement



In this replay, Spencer and Brad dive into lateral movement, discussing various techniques like RDP, RATs, Impacket tools, PsExec, PTH, PTT, and PowerShell Remoting. They explain how attackers use th…


Published on 5 months ago

No image available

Episode 131: DMARC & PCI 4.0 Compliance - Is your Organization Compliant?


Season 1 Episode 131


In this episode, Tyler and Brad discuss DMARC and how the latest version of the PCI framework requires phishing protection. You'll also learn about DMARC, DKIM, and SPF and how to elevate them to hel…


Published on 5 months, 2 weeks ago

No image available

Episode 130: Using Deception Technology to Detect Cyber Attacks


Season 1 Episode 130


In this episode of The Cyber Threat Perspective, we explore the strategic integration of deception technology like canaries and honeypots into your cybersecurity defenses. Discover how these tools al…


Published on 5 months, 3 weeks ago

No image available

Episode 130: Using Deception Technology to Detect Cyber Attacks


Season 1 Episode 130


In this episode of The Cyber Threat Perspective, we explore the strategic integration of deception technology like canaries and honeypots into your cybersecurity defenses. Discover how these tools al…


Published on 5 months, 3 weeks ago

No image available

Episode 129: How to Analyze Threat Reports for Defenders


Season 1 Episode 129


Threat reports can be goldmines for defenders — but only if we know how to extract and apply what matters. A good analysis can mean catching an attack early or missing it entirely. There's no shortag…


Published on 5 months, 4 weeks ago

No image available

Episode 128: The Most Common External Pen Test Findings—And How to Fix Them


Season 1 Episode 128


In this episode, Brad and Sam discuss the most common security issues found on external penetration tests, how to find them yourself, and how to address them. 


Blog: https://offsec.blog/
Youtube: https…


Published on 6 months ago

No image available

Episode 127: SaaS Supply Chain Attacks - How to Stay Secure


Season 1 Episode 127


 This episode focuses on SaaS (Software as a Service) Supply Chain Attacks. We discuss what SaaS applications are most at risk, what the real danger of saas supply chain attacks are and most importan…


Published on 6 months, 1 week ago

No image available

Episode 126: Typosquatting - How and Why It Works and How to Defend Against It


Season 1 Episode 126


Dive into the quirky underworld of digital misdirection in this episode, where we explore the art of typosquatting. Discover how a simple mistyped URL can turn into a gateway for cyber trickery, as w…


Published on 6 months, 2 weeks ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate