Podcast Episodes
Back to SearchEpisode 106: An Overview of Cyber Risk
Season 1 Episode 106
Let's talk about cyber risk classification in this episode of The Cyber Threat Perspective.
Brad and Tyler provide a high-level overview of various t…
1 year, 4 months ago
Episode 105: How to Monitor Your Attack Surface
Season 1 Episode 105
In this episode Brad and Spencer discuss Attack Surface Monitoring, what it is, and why it's important for defending against cyber-attacks. They give…
1 year, 4 months ago
Episode 104: How To Get Into Cyber For First Responders
Season 1 Episode 104
In this episode, Spencer has Sam Killingsworth on the show to talk about getting into cybersecurity, specifically penetration testing, coming from a …
1 year, 5 months ago
Episode 103: Email Spoofing
Season 1 Episode 103
In this episode, Spencer and Brad dive into the complex maze of 3rd party email providers, filtering and spoofing. Email spoofing is a technique used…
1 year, 5 months ago
Episode 102: The Global CrowdStrike Outage
Season 1 Episode 102
In this episode, Spencer is joined by Joey Vandergrift (SecurIT360's VP of Security Operations) and Mark Brophy (SecurIT360's DFIR practice lead). To…
1 year, 5 months ago
Episode 101: Infostealers - 10,000 Victims a Day
Season 1 Episode 101
In this episode, Spencer and Brad dive into the deep underworld of infostealer malware. They discuss what infostealers are, how they are used and wha…
1 year, 5 months ago
(Replay) How We Hack Medical Devices To Save Lives
Discover the vulnerabilities lurking within medical devices and how ethical hacking can safeguard patient care. Join Brad, VP of Offensive Security a…
1 year, 5 months ago
Episode 100: The OpenSSH RegreSSHion Vulnerability
Season 1 Episode 100
In this episode, Spencer and Brad discuss the OpenSSH "regreSSHion" vulnerability. This is being tracked as CVE-2024-6409 & CVE-2024-6387. A security…
1 year, 6 months ago
Episode 99: Tool Time - OneDriveEnum & AD Miner
Season 1 Episode 99
In this episode, Spencer and Tyler discuss two of their current favorite tools: OneDriveEnum for enumerating user accounts in Microsoft 365 and AD Mi…
1 year, 6 months ago
Episode 98: Current State of M365 Attacks: Initial Access
Season 1 Episode 98
In this episode, we discuss the latest trends and techniques for enumerating Microsoft 365. We break down how attackers may identify M365 tenants, ho…
1 year, 6 months ago