Threat Talks

Recent Episodes

Why Your Cyber Hygiene Matters?

Why Your Cyber Hygiene Matters?

Find Threat Talks onWhy Your Cyber Hygiene Matters? What happens when one person’s bad cyber hygiene puts an entire network at risk?The result can be devastating—unauthorized access, data theft, and a ripple effect that endangers not just one user, but every connected...

Resilience Over Fragmentation

Resilience Over Fragmentation

Find Threat Talks onResilience Over Fragmentation: The Risk You Can’t Ignore In this Threat Talks episode, Lieuwe Jan Koning sits with Professor Bart Jacobs to show—through simple, real stories—how scattered tools and ad-driven platforms take away control, and how...

Zero Trust Step 5B: Maintain Controls

Zero Trust Step 5B: Maintain Controls

Find Threat Talks onZero Trust Step 5B: Maintaining Security Controls Breaches aren’t shocks; they’re late-stage symptoms of control decay. Drift turns “temporary” access into standing exposure and quietly erodes assurance. In this Threat Talks episode, Lieuwe Jan...

Defend Against Hacktivist Groups like APT Handala

Defend Against Hacktivist Groups like APT Handala

Find Threat Talks onHow To Defend Against Hacktivist Groups like APT Handala Hacktivist groups like APT Handala aren’t driven by money. They’re fueled by politics, disruption, and the desire to make headlines. In this episode of Threat Talks, host Lieuwe Jan Koning...

Promptlock – The First AI-Powered Malware

Promptlock – The First AI-Powered Malware

Find Threat Talks onPromptlock - The First AI-Powered Malware If malware used to be predictable, those days are gone.With AI in the driver’s seat, malware has become a shape-shifter. Promptlock is the first documented case where AI was active inside the breach. It...

Data Bouncing: How HTTP Headers Leak Data

Data Bouncing: How HTTP Headers Leak Data

Find Threat Talks onData Bouncing: How HTTP Headers Leak Data You harden endpoints. You filter egress. You deploy malware detectors. And still, data slips out. In this Threat Talks Deep Dive, our host sits down with Luca Cipriano—CTI and Red Team Program Lead—to...

Cybersecurity Infographics

Infographic Threat Talks - Prevent, Pay or Insure
Threat Talks - Infographic Security Fallacies
The evolution of cyber warfare infographic

JOIN THE CYBERSECURITY CONVERSATION

Subscribe to Threat Talks for in-depth explorations of recent cybersecurity threats and trends, with exclusive insights and expert perspectives.

Listen to Threat Talks - Cybersecurity Podcast on YouTube
Listen to Threat Talks - Cybersecurity Podcast on Spotify
Listen to Threat Talks - Cybersecurity Podcast on Apple Podcasts
Listen to Threat Talks - Cybersecurity Podcast on Amazon Music

presented by

on2it and aMS-ix