Episodi

  • Episode 169: Malicious Browser Extensions
    Feb 20 2026

    In this episode, we’re digging into malicious browser extensions...the quiet, often overlooked attack vector living inside nearly every organization. While we focus on patching servers, hardening Active Directory, and deploying EDR, attackers are increasingly abusing the browser as their initial foothold. We’ll break down how these extensions work, why they’re so dangerous, and what IT leaders can realistically do about it.


    Check out these resources:

    Annex - Enterprise Software Extension Security & Management

    https://crxaminer.tech/

    https://x.com/tuckner

    https://x.com/IceSolst

    Blog: https://offsec.blog/
    Youtube: https://www.youtube.com/@cyberthreatpov
    Twitter: https://x.com/cyberthreatpov

    Follow Spencer on social ⬇
    Spencer's Links: https://spenceralessi.com

    Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.

    Mostra di più Mostra meno
    30 min
  • Episode 168: Do you need a web app pen test?
    Feb 13 2026

    Brad and Jordan talk bout web app pen testing, why you might need it, and why other forms of app sec might not be good enough.

    Blog: https://offsec.blog/
    Youtube: https://www.youtube.com/@cyberthreatpov
    Twitter: https://x.com/cyberthreatpov

    Follow Spencer on social ⬇
    Spencer's Links: https://spenceralessi.com

    Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.

    Mostra di più Mostra meno
    23 min
  • Episode 167: TLS and SSL vulnerabilities - do they matter?
    Feb 6 2026

    You've got Tyler & Brad and In this episode, we break down the early versions of Transport Layer Security (TLS) — TLS 1.0 and TLS 1.1 — and explain why these once-standard encryption protocols are now considered insecure. We’ll cover when they were released, how modern attacks and cryptographic weaknesses caught up with them, and why today’s internet relies on newer, more secure protocols like TLS 1.2 and TLS 1.3.

    We’ll also discuss how even “secure” protocols can become vulnerable when weak ciphers are enabled, using Sweet32 as a real-world example of cipher-level risk.

    Blog: https://offsec.blog/
    Youtube: https://www.youtube.com/@cyberthreatpov
    Twitter: https://x.com/cyberthreatpov

    Follow Spencer on social ⬇
    Spencer's Links: https://spenceralessi.com

    Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.

    Mostra di più Mostra meno
    30 min
  • Episode 166: Why Your Pentest Didn’t Make You Safer
    Jan 30 2026

    In this episode, we explore why many organizations invest in penetration testing yet see little improvement in their actual security posture. We discuss the common pitfalls of treating pentests as one-time events, how attackers operate very differently from scoped assessments, and why remediation—not the report—is what determines real safety. If you’ve ever wondered why “passing” a pentest didn’t translate into stronger defenses, this episode is for you.

    Blog: https://offsec.blog/
    Youtube: https://www.youtube.com/@cyberthreatpov
    Twitter: https://x.com/cyberthreatpov

    Follow Spencer on social ⬇
    Spencer's Links: https://spenceralessi.com

    Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.

    Mostra di più Mostra meno
    40 min
  • Episode 165: What to expect on your API Pentest
    Jan 23 2026

    In this episode, Brad and Jordan talk about API pen testing, how it works, and what you can expect if you want to procure one. They discuss pitfalls, common findings, and ways to streamline the process.

    Blog: https://offsec.blog/
    Youtube: https://www.youtube.com/@cyberthreatpov
    Twitter: https://x.com/cyberthreatpov

    Follow Spencer on social ⬇
    Spencer's Links: https://spenceralessi.com

    Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.

    Mostra di più Mostra meno
    34 min
  • Episode 164: Offensive Security in the Age of AI: What Has Changed
    Jan 16 2026

    In this episode, we take a step back from the AI hype and focus on what has actually changed in offensive security. AI isn’t replacing attackers or inventing brand-new techniques, but it is dramatically reducing friction across the attack lifecycle. We break down the myths, explain where AI is already impacting real-world attacks, and walk through how defenders need to adapt if they want to keep up.

    Blog: https://offsec.blog/
    Youtube: https://www.youtube.com/@cyberthreatpov
    Twitter: https://x.com/cyberthreatpov

    Follow Spencer on social ⬇
    Spencer's Links: https://spenceralessi.com

    Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.

    Mostra di più Mostra meno
    35 min
  • Episode 163: The Vendor Security Trap: Are You Losing Control?
    Jan 9 2026

    In this episode, we dissect the dangerous trend of organizations ceding control of their security strategy to vendors, exploring the pitfalls of vendor lock-in, overspending, and the illusion of comprehensive protection. We'll provide actionable steps to reclaim your security posture and build an independent strategy tailored to your specific needs.

    Blog: https://offsec.blog/
    Youtube: https://www.youtube.com/@cyberthreatpov
    Twitter: https://x.com/cyberthreatpov

    Follow Spencer on social ⬇
    Spencer's Links: https://spenceralessi.com

    Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.

    Mostra di più Mostra meno
    35 min
  • Episode 162: Before the Breach How Attackers Profile Your Organization
    Dec 19 2025

    In this episode, Brad and Spencer from SecurIT360's Offensive Security group delve into the crucial reconnaissance phase attackers undertake before launching an attack. They discuss the real-world impact of seemingly harmless data leaks, how attackers chain them together to build a profile of your organization, and common misconceptions about what data is truly "sensitive" from an external attacker's perspective. Learn how organizations can realistically assess their external attack surface beyond automated scanning and discover creative OSINT techniques defenders can use to mimic attacker reconnaissance.

    Blog: https://offsec.blog/
    Youtube: https://www.youtube.com/@cyberthreatpov
    Twitter: https://x.com/cyberthreatpov

    Follow Spencer on social ⬇
    Spencer's Links: https://spenceralessi.com

    Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.

    Mostra di più Mostra meno
    36 min