Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats.
We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals.
Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and stay secure!
๐ฐPrevent, Pay or Insure? ๐ฐ
Days before MGMโs computer systems were taken down in a cyberattack, fellow casino operator Caesars paid a $15 million ransom to attackers who infiltrated its systems.
MGM โฆ
"Hello! I'm a Printer! Please Let Me In!"
โHello! Iโm a printer! Please let me enter, thank you!โ โ It may sound absurd, but this is how attackers can trick your Linux systems through the cups-browseโฆ
โฐ How much time would you spend on executing the perfect hack? โฐ ย
The user going by the name of โJIAT75โ spent almost three years infiltrating and contributing to a GitHub repo for one singular reasโฆ
โ ๏ธ CrowdStrike: 8.5 million blue screens of death โ ๏ธ
Did you know that last Julyโs CrowdStrike outage led to closed airports, inaccessible bank accounts and hospitals that were only delivering emergeโฆ
๐ Breaking the Illusion: Confronting Cybersecurityโs Biggest Fallacies ๐
Think you know the route a hacker might take? Think again! In this eye-opening Threat Talk, Lieuwe Jan Koning dives into the cโฆ
Imagine creating millions in cryptocurrencyโฆwithout spending a cent. ๐ธ
๐ Explore the Binance BNB Chain Attack, where attackers used cross-chain bridges to create crypto assets out of thin air.
๐พ Diโฆ
๐๐ฏ๐๐ซ ๐๐๐๐ง ๐๐ฌ๐ค๐๐ ๐ญ๐จ ๐ก๐๐๐ค ๐ ๐๐จ๐๐ญ? When Luca Cipriano and Jeroen Scheerder were given the challenge, they took an unexpected approachโstep one: build the boat themselves. It was a scale model, but theโฆ
AIS (Advanced Identification System) is a key tool in maritime navigation.
It helps ships transmit their location and data to other vessels and satellites, preventing collisions and supporting rescโฆ
๐๐๐๐ค ๐ญ๐ก๐ ๐๐จ๐๐ญ: ๐๐ฒ๐๐๐ซ๐ฌ๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ ๐จ๐ง ๐ญ๐ก๐ ๐๐ข๐ ๐ก ๐๐๐๐ฌ ๐ Imagine you're the captain of a massive ship, cruising through open waters at full speed. Suddenly, something feels off... Are you veering off courseโฆ
๐ Donโt drown in HTTP/2 Rapid Reset attacks! ๐
The HTTP/2 Rapid Reset attack is a powerful new DDoS method that exploits weaknesses in the HTTP/2 protocol. By overwhelming web servers with rapid resโฆ
๐ Do Your Configurations Keep You Safe? ๐
ย
How does a major financial institution like Capital One
suffer a data breach that exposes over 100 million credit applications?
In August 2019, a former Amโฆ
๐จ When Cybersecurity Experts Get Hacked ๐จ How does a company specializing in Identity and Access Management like OKTA suffer a data breach? In this case, a service account password was inadvertentlโฆ
๐ Is Your "Secure" File Transfer Tool Really Secure? ๐
If youโre depending on certifications alone to keep your data safe (spoiler: you shouldnโt be!), this episode is a must-watch.
In this Deep Diveโฆ
Compliance doesn't always mean security. In this episode of Threat Talks, we dive deep into the critical operational gap between being compliant and being secure. Host Lieuwe Jan Koning, along withโฆ
๐๐ฌ ๐ญ๐ก๐ ๐๐๐ง๐ ๐๐๐ ๐ฅ๐ ๐๐๐ ๐ญ๐ก๐ ๐๐๐ฌ๐จ๐ง ๐๐จ๐ฎ๐ซ๐ง๐ ๐จ๐ ๐๐ฒ๐๐๐ซ-๐๐ญ๐ญ๐๐๐ค๐ฌ? ๐ถ๏ธ
ย
Just as Bourne eluded the most advanced surveillance and security systems in the world, the Sand Eagle APT made headlines ๐ฐ for its abiliโฆ
Ethan Hunt is known for doing the impossible. ๐ What if he and his team spoke Russian ๐ท๐บ and on the onset of the invasion of Ukraine, they brought down control of 5.800 wind turbines in Germany ๐ฉ๐ช? โฆ
How do James Bondโs spy skills compare to modern cyber espionage?
The Nexus Barracuda Hack was performed by highly skilled, Chinese cyber attackers, who exploited a zero-day vulnerability in Barracuโฆ
Explore the hidden world of cyber warfare and advanced persistent threats (APTs) in this episode of Threat Talks.
Join cybersecurity experts Lieuwe Jan Koning, Luca Cipriano and special guest Martijโฆ
Explore the rising threat of DDoS attacks on European elections in this special episode of Threat Talks.
Join Lieuwe Jan Koning and cybersecurity experts Octavia de Weerdt and Frank Dupker as they dโฆ
Join Lieuwe Jan Koning on this special Threat Talks as he explores the evolving landscape of DDoS attacks with Junior Corazza and Miguel Regalado Querol.
Discover if these cyber threats are truly diโฆ