Threat Talks
Recent Episodes
UNIX CUPS Remote Code Execution
Discover how attackers exploit UNIX CUPS vulnerabilities to infiltrate Linux systems by posing as trusted printers. Experts reveal how to secure your network from these hidden threats.
XZ Utils Critical Backdoor (CVE- 2024-3094)
Explore the XZ Utils backdoor breach on Threat Talks. Discover how a hacker spent years gaining access to insert malicious code into open-source software. A must-hear on software security!
Deep Dive – CrowdStrike auto-update disaster
Explore the cybersecurity disaster caused by a CrowdStrike Falcon update that led to 8.5 million ‘blue screens of death,’ shutting down critical systems in banks, hospitals, and airports worldwide. In this episode of Threat Talk, host Lieuwe Jan Koning and experts Rob Maas and Jeroen Scheerder uncover how a QA misconfiguration led to catastrophic failures, highlighting the risks of automatic updates in cybersecurity. Learn how minor oversights in critical systems can lead to massive operational disruptions.
Breaking the Illusion: Exposing Security Fallacies
Uncover the biggest cybersecurity fallacies in this Threat Talk. Experts reveal why end-user awareness isn’t enough, advocating for stronger technical controls. A must-hear on modern cyber threats!
Deep Dive – Binance Exchange Hack
Explore the Binance BNB Smartchain hack in this deep dive into crypto vulnerabilities. Learn how attackers exploited blockchain flaws to print crypto assets. A must-listen on DeFi security!
Deep Dive – Ballast System Hack
Explore how Luca Cipriano and Jeroen Scheerder built and hacked a model boat’s ballast system in Threat Talks, diving into cybersecurity challenges on the high seas. Find out if they succeeded!
Cybersecurity Infographics
JOIN THE CYBERSECURITY CONVERSATION
Subscribe to Threat Talks for in-depth explorations of recent cybersecurity threats and trends, with exclusive insights and expert perspectives.