1. EachPod
EachPod
Threat Talks - Your Gateway to Cybersecurity Insights - Podcast

Threat Talks - Your Gateway to Cybersecurity Insights

Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats.

We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals.

Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and stay secure!

Tech News News
Update frequency
every 7 days
Average duration
29 minutes
Episodes
87
Years Active
2024 - 2025
Share to:
Deep Dive - Vultur, Android Malware

Deep Dive - Vultur, Android Malware

Have you ever wondered how a simple game app could lead to your bank account being emptied?

In this deep dive of Threat Talks, Lieuwe Jan Koning dives into the sinister world of Vultur Android malwa…

00:24:45  |   Tue 16 Jul 2024
Deep Dive - Bangladesh Bank SWIFT attack

Deep Dive - Bangladesh Bank SWIFT attack

Let's uncover how cybercriminals almost stole a billion dollars through sophisticated spear phishing and malware tactics.

Dive into the Bangladesh Bank SWIFT attack with Lieuwe Jan Koning, Rob Maas …

00:25:12  |   Tue 09 Jul 2024
Breaking the bank - Threat Talks

Breaking the bank - Threat Talks

Cybersecurity expert Jayson E. Street shares insights on how he legally "robs" banks to expose vulnerabilities.

By exploiting human vulnerabilities rather than advanced technology, Jayson demonstrate…

00:50:41  |   Tue 02 Jul 2024
Threat Talks on Tour - Cyber Guardians: Anti-DDoS Coalition

Threat Talks on Tour - Cyber Guardians: Anti-DDoS Coalition

This episode of Threat Talks delves into the world of DDoS attacks with special guests Remco Poortinga from SURF and Martijn Peijer from the Dutch Tax Office.

Discover how easy it is to launch these…

00:28:21  |   Tue 25 Jun 2024
Zero Trust with John Kindervag – Threat Talks on tour | Part 2

Zero Trust with John Kindervag – Threat Talks on tour | Part 2

Discover how Zero Trust can effectively protect against cyber threats and hear firsthand experiences from industry leaders!

Lieuwe Jan Koning and cybersecurity expert John Kindervag dive into the co…

00:31:40  |   Tue 18 Jun 2024
Zero Trust with John Kindervag - Threat Talks on tour: Live from the RSA | Part 1

Zero Trust with John Kindervag - Threat Talks on tour: Live from the RSA | Part 1

Join host Lieuwe Jan Koning as he interviews John Kindervag, creator of Zero Trust, at the RSA conference.

Explore the origins, principles, and impact of Zero Trust on modern cybersecurity.

Downloa…

00:30:58  |   Tue 11 Jun 2024
Deep Dive - ScreenConnect: Authentication Bypass

Deep Dive - ScreenConnect: Authentication Bypass

CVE-2024-1709 is a critical vulnerability in ScreenConnect that has been exploited in multiple healthcare-related breaches, highlighting significant security risks.

Explore the Change Healthcare atta…

00:15:43  |   Tue 04 Jun 2024
Deep Dive - Ireland's HSE Ransomware Attack

Deep Dive - Ireland's HSE Ransomware Attack

How did Ireland's largest healthcare network, HSE, fall victim to a crippling ransomware attack?

What security flaws were exploited, and how can you prevent similar threats?

Join us in this Deep Di…

00:26:22  |   Tue 28 May 2024
Deep Dive - DICOM: The hidden risks of Legacy Protocols

Deep Dive - DICOM: The hidden risks of Legacy Protocols

Discover the vulnerabilities of the DICOM protocol in healthcare and the significant risks it poses, including data breaches and manipulation.

This deep dive covers practical solutions for protectin…

00:20:01  |   Tue 21 May 2024
Healthcare: Responsibilities, regulations and legacies - Threat Talks

Healthcare: Responsibilities, regulations and legacies - Threat Talks

In this episode of Threat Talks, we examine major cybersecurity risks in healthcare.

We discuss how old systems like DICOM, still widely used, can lead to serious cyberattacks. How do recent breaches…

00:43:27  |   Tue 14 May 2024
Palo Alto Networks CVE-2024-3400: a comprehensive analysis of the vulnerability

Palo Alto Networks CVE-2024-3400: a comprehensive analysis of the vulnerability

Tune into this special episode of Threat Talks, as we dissect the critical CVE 2024 3400 vulnerability in Palo Alto Networks' GlobalProtect servers.

Join our cybersecurity experts for a deep dive in…

00:40:03  |   Tue 07 May 2024
Deep Dive - Reflection Attack - The most simple dos attack

Deep Dive - Reflection Attack - The most simple dos attack

Understanding Reflection Attacks: A Simple Yet Powerful DOS Method.

👕 Request your own Threat Talks T'shirt: https://threat-talks.com/cant-deny-ddos-in-2024/ Distributed Denial of Service (DDoS) At…

00:11:55  |   Tue 30 Apr 2024
Deep Dive - MOVEit: The danger of delegating data to third-party software

Deep Dive - MOVEit: The danger of delegating data to third-party software

Dive into the largest data breach of 2023, a devastating supply chain attack involving the MOVEit software, which impacted over 60 million individuals.

Learn how the Klo Ransomware Group exploited a…

00:14:56  |   Tue 23 Apr 2024
Deep Dive - Log4j: The danger of software dependencies

Deep Dive - Log4j: The danger of software dependencies

Join us for a deep dive episode of Threat Talks, focusing on Log4j, the critical logging library at the heart of Java development.

Discover Log4j's flexibility in message configuration and how it en…

00:19:02  |   Tue 16 Apr 2024
Deep Dive - SolarWinds: The danger of third-party software

Deep Dive - SolarWinds: The danger of third-party software

The SolarWinds incident, affecting 18,000 high-profile environments, including the US government and Fortune 500 companies, was attributed to the state-sponsored group Fancy Bear.

This breach demons…

00:21:56  |   Tue 09 Apr 2024
Supply chain: business as usual? - Threat Talks

Supply chain: business as usual? - Threat Talks

In this episode of Threat Talks, we explore the covert perils of supply chain attacks. Matthijs Zwart, CIO and CISO at Vitens, acknowledges the risk landscape surrounding supply chain attacks, but al…

00:42:53  |   Tue 02 Apr 2024
Deep Dive - Ivanti EPM

Deep Dive - Ivanti EPM

This Threat Talks - deep dive - focuses on a recent SQL injection attack targeting Ivanti EPM software, a powerful endpoint management solution.

Lieuwe Jan Koning, Luca Cipriano and Rob Maas explore…

00:13:30  |   Tue 26 Mar 2024
Deep Dive – Google OAuth bypass

Deep Dive – Google OAuth bypass

In this deep dive of Threat Talks, we delve into the intricate realm of cybersecurity, spotlighting a newly uncovered vulnerability within Google's OAuth authentication system.

Uncover a hidden feat…

00:16:40  |   Tue 19 Mar 2024
Deep Dive – Outlook vulnerability

Deep Dive – Outlook vulnerability

Fancy Bear, also known by the Russian actor designation APT28, has been implicated in cyber attacks targeting Microsoft Outlook and other platforms, utilizing CVEs to exploit systems.

This group, as…

00:17:47  |   Tue 12 Mar 2024
The Authentication Apocalypse - Threat Talks

The Authentication Apocalypse - Threat Talks

Learn about AI-generated phishing attacks, the strengths and weaknesses of multi-factor authentication (MFA), and real-world cyber attack cases.

Discover the balance between security and usability, …

00:37:11  |   Tue 05 Mar 2024
Disclaimer: The podcast and artwork embedded on this page are the property of Threat Talks. This content is not affiliated with or endorsed by eachpod.com.