Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats.
We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals.
Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and stay secure!
Have you ever wondered how a simple game app could lead to your bank account being emptied?
In this deep dive of Threat Talks, Lieuwe Jan Koning dives into the sinister world of Vultur Android malwa…
Let's uncover how cybercriminals almost stole a billion dollars through sophisticated spear phishing and malware tactics.
Dive into the Bangladesh Bank SWIFT attack with Lieuwe Jan Koning, Rob Maas …
Cybersecurity expert Jayson E. Street shares insights on how he legally "robs" banks to expose vulnerabilities.
By exploiting human vulnerabilities rather than advanced technology, Jayson demonstrate…
This episode of Threat Talks delves into the world of DDoS attacks with special guests Remco Poortinga from SURF and Martijn Peijer from the Dutch Tax Office.
Discover how easy it is to launch these…
Discover how Zero Trust can effectively protect against cyber threats and hear firsthand experiences from industry leaders!
Lieuwe Jan Koning and cybersecurity expert John Kindervag dive into the co…
Join host Lieuwe Jan Koning as he interviews John Kindervag, creator of Zero Trust, at the RSA conference.
Explore the origins, principles, and impact of Zero Trust on modern cybersecurity.
Downloa…
CVE-2024-1709 is a critical vulnerability in ScreenConnect that has been exploited in multiple healthcare-related breaches, highlighting significant security risks.
Explore the Change Healthcare atta…
How did Ireland's largest healthcare network, HSE, fall victim to a crippling ransomware attack?
What security flaws were exploited, and how can you prevent similar threats?
Join us in this Deep Di…
Discover the vulnerabilities of the DICOM protocol in healthcare and the significant risks it poses, including data breaches and manipulation.
This deep dive covers practical solutions for protectin…
In this episode of Threat Talks, we examine major cybersecurity risks in healthcare.
We discuss how old systems like DICOM, still widely used, can lead to serious cyberattacks. How do recent breaches…
Tune into this special episode of Threat Talks, as we dissect the critical CVE 2024 3400 vulnerability in Palo Alto Networks' GlobalProtect servers.
Join our cybersecurity experts for a deep dive in…
Understanding Reflection Attacks: A Simple Yet Powerful DOS Method.
👕 Request your own Threat Talks T'shirt: https://threat-talks.com/cant-deny-ddos-in-2024/ Distributed Denial of Service (DDoS) At…
Dive into the largest data breach of 2023, a devastating supply chain attack involving the MOVEit software, which impacted over 60 million individuals.
Learn how the Klo Ransomware Group exploited a…
Join us for a deep dive episode of Threat Talks, focusing on Log4j, the critical logging library at the heart of Java development.
Discover Log4j's flexibility in message configuration and how it en…
The SolarWinds incident, affecting 18,000 high-profile environments, including the US government and Fortune 500 companies, was attributed to the state-sponsored group Fancy Bear.
This breach demons…
In this episode of Threat Talks, we explore the covert perils of supply chain attacks. Matthijs Zwart, CIO and CISO at Vitens, acknowledges the risk landscape surrounding supply chain attacks, but al…
This Threat Talks - deep dive - focuses on a recent SQL injection attack targeting Ivanti EPM software, a powerful endpoint management solution.
Lieuwe Jan Koning, Luca Cipriano and Rob Maas explore…
In this deep dive of Threat Talks, we delve into the intricate realm of cybersecurity, spotlighting a newly uncovered vulnerability within Google's OAuth authentication system.
Uncover a hidden feat…
Fancy Bear, also known by the Russian actor designation APT28, has been implicated in cyber attacks targeting Microsoft Outlook and other platforms, utilizing CVEs to exploit systems.
This group, as…
Learn about AI-generated phishing attacks, the strengths and weaknesses of multi-factor authentication (MFA), and real-world cyber attack cases.
Discover the balance between security and usability, …