Threat Talks

Recent Episodes

UNIX CUPS Remote Code Execution

UNIX CUPS Remote Code Execution

Discover how attackers exploit UNIX CUPS vulnerabilities to infiltrate Linux systems by posing as trusted printers. Experts reveal how to secure your network from these hidden threats.

XZ Utils Critical Backdoor (CVE- 2024-3094)

XZ Utils Critical Backdoor (CVE- 2024-3094)

Explore the XZ Utils backdoor breach on Threat Talks. Discover how a hacker spent years gaining access to insert malicious code into open-source software. A must-hear on software security!

Deep Dive – CrowdStrike auto-update disaster

Deep Dive – CrowdStrike auto-update disaster

Explore the cybersecurity disaster caused by a CrowdStrike Falcon update that led to 8.5 million ‘blue screens of death,’ shutting down critical systems in banks, hospitals, and airports worldwide. In this episode of Threat Talk, host Lieuwe Jan Koning and experts Rob Maas and Jeroen Scheerder uncover how a QA misconfiguration led to catastrophic failures, highlighting the risks of automatic updates in cybersecurity. Learn how minor oversights in critical systems can lead to massive operational disruptions.

Breaking the Illusion: Exposing Security Fallacies

Breaking the Illusion: Exposing Security Fallacies

Uncover the biggest cybersecurity fallacies in this Threat Talk. Experts reveal why end-user awareness isn’t enough, advocating for stronger technical controls. A must-hear on modern cyber threats!

Deep Dive – Binance Exchange Hack

Deep Dive – Binance Exchange Hack

Explore the Binance BNB Smartchain hack in this deep dive into crypto vulnerabilities. Learn how attackers exploited blockchain flaws to print crypto assets. A must-listen on DeFi security!

Deep Dive – Ballast System Hack

Deep Dive – Ballast System Hack

Explore how Luca Cipriano and Jeroen Scheerder built and hacked a model boat’s ballast system in Threat Talks, diving into cybersecurity challenges on the high seas. Find out if they succeeded!

Cybersecurity Infographics

Threat Talks - Infographic Security Fallacies
The evolution of cyber warfare infographic

JOIN THE CYBERSECURITY CONVERSATION

Subscribe to Threat Talks for in-depth explorations of recent cybersecurity threats and trends, with exclusive insights and expert perspectives.

Listen to Threat Talks - Cybersecurity Podcast on YouTube
Listen to Threat Talks - Cybersecurity Podcast on Spotify
Listen to Threat Talks - Cybersecurity Podcast on Apple Podcasts
Listen to Threat Talks - Cybersecurity Podcast on Amazon Music

presented by

on2it and aMS-ix