Podcast Episodes

Back to Search
Episode 129: How to Analyze Threat Reports for Defenders

Season 1 Episode 129

Threat reports can be goldmines for defenders — but only if we know how to extract and apply what matters. A good analysis can mean catching an attac…

9 months, 2 weeks ago

Short Long
View Episode
Episode 128: The Most Common External Pen Test Findings—And How to Fix Them

Season 1 Episode 128

In this episode, Brad and Sam discuss the most common security issues found on external penetration tests, how to find them yourself, and how to addr…

9 months, 3 weeks ago

Short Long
View Episode
Episode 127: SaaS Supply Chain Attacks - How to Stay Secure

Season 1 Episode 127

 This episode focuses on SaaS (Software as a Service) Supply Chain Attacks. We discuss what SaaS applications are most at risk, what the real danger …

10 months ago

Short Long
View Episode
Episode 126: Typosquatting - How and Why It Works and How to Defend Against It

Season 1 Episode 126

Dive into the quirky underworld of digital misdirection in this episode, where we explore the art of typosquatting. Discover how a simple mistyped UR…

10 months, 1 week ago

Short Long
View Episode
Episode 125: Whose Job Is Harder? Red or Blue

Season 1 Episode 125

In this episode, we discuss whose job is harder. The red team or the blue team? We discuss the roles and responsibilities of many red and blue teamer…

10 months, 2 weeks ago

Short Long
View Episode
(Replay) How To Monitor Your Attack Surface

Unlock the secrets of effective attack surface monitoring in this replay of The Cyber Threat Perspective. Brad and Spencer dive into essential practi…

10 months, 3 weeks ago

Short Long
View Episode
Episode 124: MFA != Secure

Season 1 Episode 124

Blog: https://offsec.blog/
Youtube: https://www.youtube.com/@cyberthreatpov
Twitter: https://x.com/cyberthreatpov

Follow Spencer on social ⬇
Spencer's L…

11 months ago

Short Long
View Episode
Episode 123: Insecure Active Directory Protocols

Season 1 Episode 123

In this episode, we discuss several insecure protocols that are found within Active Directory environments. When these protocols are enabled, they co…

11 months, 1 week ago

Short Long
View Episode
Episode 122: AI/ChatGPT Interviews a Web Pen Tester!!

Season 1 Episode 122

In this episode, Chelsea (ChatGTP) interviews Brad about web application penetration testing. Listen in to learn how the process works from start to …

11 months, 2 weeks ago

Short Long
View Episode
Episode 121: How We Evade Detection During Internal Pentests

Season 1 Episode 121

In this episode, Spencer and Brad discuss the ever popular and highly debated topic of evasion. In this podcast we talk about evasion from the contex…

11 months, 3 weeks ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us