Threat Talks

Recent Episodes

Deep Dive – Binance Exchange Hack

Deep Dive – Binance Exchange Hack

Explore the Binance BNB Smartchain hack in this deep dive into crypto vulnerabilities. Learn how attackers exploited blockchain flaws to print crypto assets. A must-listen on DeFi security!

Deep Dive – Ballast System Hack

Deep Dive – Ballast System Hack

Explore how Luca Cipriano and Jeroen Scheerder built and hacked a model boat’s ballast system in Threat Talks, diving into cybersecurity challenges on the high seas. Find out if they succeeded!

Deep Dive – Securing AIS

Deep Dive – Securing AIS

Explore AIS vulnerabilities in maritime security. Learn how spoofing risks impact ships and military tensions, and discover solutions in our Threat Talks Deep Dive on securing AIS.

Hack the Boat

Hack the Boat

Explore cyber threats in the maritime industry with Threat Talks. Dive into how modern ships face hacking risks and learn about cutting-edge cybersecurity solutions at Damen Shipyards.

Deep Dive – HTTP/2 Rapid Reset Attack

Deep Dive – HTTP/2 Rapid Reset Attack

The HTTP/2 Rapid Reset attack, a powerful DDoS method, exploits vulnerabilities in the HTTP/2 protocol to overwhelm servers. Experts dive into how attackers use this and ways to mitigate it.

Deep Dive – Capital One Data Breach

Deep Dive – Capital One Data Breach

Explore how a misconfigured web app firewall led to the Capital One data breach, exposing 100M+ credit apps. Learn key lessons with experts in this in-depth Threat Talks episode.

Cybersecurity Infographics

The evolution of cyber warfare infographic
Remote work Infographic

JOIN THE CYBERSECURITY CONVERSATION

Subscribe to Threat Talks for in-depth explorations of recent cybersecurity threats and trends, with exclusive insights and expert perspectives.

Listen to Threat Talks - Cybersecurity Podcast on YouTube
Listen to Threat Talks - Cybersecurity Podcast on Spotify
Listen to Threat Talks - Cybersecurity Podcast on Apple Podcasts
Listen to Threat Talks - Cybersecurity Podcast on Amazon Music

presented by

on2it and aMS-ix