Threat Talks
Inside Volt Typhoon: China’s Silent Cyber Threat
Find Threat Talks onInside Volt Typhoon China’s Silent Cyber Threat Volt Typhoon is a Chinese* state-sponsored threat actor that’s turned stealth into strategy, infiltrating Western critical infrastructure with little more than patience and native tools. In this...
Inside the Dark Web Economy
Listen this Threat Talk onUnmasking the Dark Web How hackers monetize your data Stolen credentials, hacked corporate systems, even illegal services: it’s all for sale, sometimes for as little as $10. In this episode of Threat Talks, host Lieuwe Jan Koning is...
Why SSL Decryption Matters
Listen this Threat Talk onDecrypting Cyber Threats The top three tips for implementing decryption With over 95% of web traffic now encrypted and 70% of cyberattacks leveraging encryption to evade detection, organizations that fail to decrypt their traffic are...
Precision Time Protocol
Listen this Threat Talk onPrecision Time Protocol Why time synchronization matters more than you think Time synchronization is a critical yet often overlooked component of cybersecurity. In this Deep Dive episode, host Rob Maas (Field CTO at ON2IT) is joined by...
Reboot of Strategy – Back to first principles with Rick Howard
Listen this Threat Talk onReboot of Strategy Back to first principles with Rick Howard I think, therefore I am, is René Descartes’ first principle. But how does that relate to cybersecurity? In this episode of Threat Talks, host Lieuwe Jan Koning is joined by Rick...
The Rising Threat of Deepfakes
Listen this Threat Talk onThe Rising Threat of Deepfakes Can you still trust what you see? Deepfakes aren’t just for entertainment anymore: they’re now an increasingly powerful tool for cybercriminals. With AI advancing rapidly, attackers can clone voices, fake...
Inside the Hackers Mind
Listen to this episode of Threat Talks onInside the Hackers Mind 👾 Ever wondered what it’s like to think like a hacker? In this Threat Talks episode, host Lieuwe Jan Koning is joined by ethical hacker Tom van de Wiele, founder of Hackerminded, for a deep dive into the...
ONCD: The Cyber Catalyst
Listen to this episode of Threat Talks onONCD: The Cyber Catalyst with Davis Hake How can governments shape the future of cybersecurity? In this compelling episode of Threat Talks, host Lieuwe Jan Koning sits down with returning guest Davis Hake, cybersecurity expert...
The State of Cybersecurity in the European Union
Listen to this episode of Threat Talks onThe State of Cybersecurity in the European Union Strengthening EU Cybersecurity: Insights from ENISA's Hans de Vries on Resilience and Collaboration In this insightful Threat Talk, Lieuwe Jan Koning is honored to be joined by...
Cyber Outlook 2025 – One Year of Threat Talks
Listen to this episode of Threat Talks onCyber Outlook 2025 2025: The Year of AI and Cybersecurity Evolution Welcome to the first episode of Threat Talks in 2025! Host Lieuwe Jan Koning is joined once again by Peter van Burgel, CEO of AMS-IX, to explore what this year...
2024: The Breaking Point
Listen to this episode of Threat Talks on2024 - The Breaking Point One Year of Threat Talks As 2024 comes to a close, we’re celebrating a year of transformative conversations with a special edition of Threat Talks! Join Lieuwe Jan Koning and Peter van Burgel (CEO of...
Prevent, Pay or Insure
Find this Threat Talk onPrevent, Pay or Insure? The road to cyber resilience Days before MGM’s computer systems were taken down in a cyberattack, fellow casino operator Caesars paid a $15 million ransom to attackers who infiltrated its systems. MGM chose not to pay...
Deep Dives
Inside Volt Typhoon: China’s Silent Cyber Threat
Find Threat Talks onInside Volt Typhoon China’s Silent Cyber Threat Volt Typhoon is a Chinese* state-sponsored threat actor that’s turned stealth into strategy, infiltrating...
Cybercrime-as-a-Service: The Disney+ of the Dark Web
Listen this Threat Talk onDark Markets: The Disney+ of Cybercrime Exploring Dark Markets with Michele Campobasso Cybercriminals can now ‘subscribe’ to hacking tools,...
Intrusion Kill Chain with Rick Howard
Listen this Threat Talk onIntrusion Kill Chain with Rick Howard Turning the Tables on Attackers In this episode, host Lieuwe Jan Koning is once again joined by Rick...
The Rising Threat of Deepfakes
Listen this Threat Talk onThe Rising Threat of Deepfakes Can you still trust what you see? Deepfakes aren’t just for entertainment anymore: they’re now an increasingly powerful...
Post-Quantum Threat to Encryption: Are You Ready?
Listen this Threat Talk onPost-Quantum Threat to Encryption 🚀 The Quantum Age Is Near: Are You Ready? 🔒 Quantum computing is no longer a distant dream. With Q-Day expected within...
Breaking the Defenses: EDR Bypass
Listen this Threat Talk onBreaking the Defenses: EDR Bypass 🎯 Are Your Endpoint Protection Solutions Truly Secure? In this episode of Threat Talks – The Deep Dive, Rob Maas sits...
Salt Typhoon: How Nine Telcos Were Compromised
Find Threat Talks onSalt Typhoon: How Nine Telcos Were Compromised Exposing the Vulnerabilities and Fallout In this episode, we cover: 📡 How known vulnerabilities in telco...
Dutch Law Enforcement Data Breach
Dutch Law Enforcement Data Breach Imagine the phone numbers of police officers, DAs, and even critical key witnesses being hacked and leaked to the public. This isn’t the opening...
Conti Ransomware Attack on Costa Rican Government
Conti Attack on Costa Rica When Ransomware Halts a Nation In a devastating demonstration of the impact of a ransomware attack, the Conti group launched an attack against Costa...
MGM Resorts Ransomware Attack
MGM Resorts ALPHV/BlackCat Ransomware Attack Cybercrime Meets Fake News MGM Resorts, one of the world’s largest casino operators, found itself in the spotlight for all the wrong...
UNIX CUPS Remote Code Execution
UNIX CUPS Remote Code Execution The Fallacy of Default Trust "Hello! I'm a Printer! Please Let Me In, thank you!" – It may sound absurd, but this is how attackers can trick your...
XZ Utils Critical Backdoor (CVE- 2024-3094)
XZ Utils Critical Backdoor The Fallacy of Secure Open Source Code How much time would you spend on executing the perfect hack? The user going by the name of ‘JIAT75’ spent almost...