Season 1 Episode 133
In this episode of The Cyber Threat Perspective, we break down how attackers steal credentials and hijack sessions to gain unauthorized access to systems and data. From phishing to cookie stealing to…
Published on 4 months, 2 weeks ago
Season 1 Episode 132
In this episode Spencer and Brad review the M-Trends 2025 Report. M-Trends 2025 is Mandiant's annual report that shares frontline learnings from its global incident-response engagements—over 450 000 …
Published on 4 months, 3 weeks ago
In this replay, Spencer and Brad dive into lateral movement, discussing various techniques like RDP, RATs, Impacket tools, PsExec, PTH, PTT, and PowerShell Remoting. They explain how attackers use th…
Published on 5 months ago
Season 1 Episode 131
In this episode, Tyler and Brad discuss DMARC and how the latest version of the PCI framework requires phishing protection. You'll also learn about DMARC, DKIM, and SPF and how to elevate them to hel…
Published on 5 months, 2 weeks ago
Season 1 Episode 130
In this episode of The Cyber Threat Perspective, we explore the strategic integration of deception technology like canaries and honeypots into your cybersecurity defenses. Discover how these tools al…
Published on 5 months, 3 weeks ago
Season 1 Episode 130
In this episode of The Cyber Threat Perspective, we explore the strategic integration of deception technology like canaries and honeypots into your cybersecurity defenses. Discover how these tools al…
Published on 5 months, 3 weeks ago
Season 1 Episode 129
Threat reports can be goldmines for defenders — but only if we know how to extract and apply what matters. A good analysis can mean catching an attack early or missing it entirely. There's no shortag…
Published on 5 months, 4 weeks ago
Season 1 Episode 128
In this episode, Brad and Sam discuss the most common security issues found on external penetration tests, how to find them yourself, and how to address them.
Blog: https://offsec.blog/
Youtube: https…
Published on 6 months ago
Season 1 Episode 127
This episode focuses on SaaS (Software as a Service) Supply Chain Attacks. We discuss what SaaS applications are most at risk, what the real danger of saas supply chain attacks are and most importan…
Published on 6 months, 1 week ago
Season 1 Episode 126
Dive into the quirky underworld of digital misdirection in this episode, where we explore the art of typosquatting. Discover how a simple mistyped URL can turn into a gateway for cyber trickery, as w…
Published on 6 months, 2 weeks ago
If you like Podbriefly.com, please consider donating to support the ongoing development.
Donate