From Hacker to Hero

From Hacker to Hero

From Hacker to Hero Find Threat Talks on From Hacker to Hero What if the most determined hacker you’ll face in 2030 is already at work – as a 15-year-old gamer with a puzzle habit? In this episode of Threat Talks, host Lieuwe Jan Koning sits down with former FBI...
Inside the SalesLoft Breach

Inside the SalesLoft Breach

Inside the SalesLoft Breach Find Threat Talks on Inside the SalesLoft Breach SaaS was sold as safe — Inside the Salesloft Breach shows why it wasn’t.Hosts Rob Maas and Luca Cipriano expose how long-lived OAuth tokens and trusted integrations turned Salesforce,...
The App Store Nightmare: The AI MCP Stores Trap

The App Store Nightmare: The AI MCP Stores Trap

The App Store Nightmare: The AI MCP Stores Trap Find Threat Talks on The App Store Nightmare: Why AI MCP Stores Are a Trap The app store nightmare is here – and you’re already in it. AI “helpers” (agents) powered by MCP (a system that lets AI use other tools)...
Public Key Infrastructure: Digital Trust Foundation

Public Key Infrastructure: Digital Trust Foundation

Public Key Infrastructure: Digital Trust Foundation Find Threat Talks on Public Key Infrastructure: The Foundation of Digital Trust PKI isn’t paperwork.It’s the switch that turns digital trust on—or off.Set it up right and you get clean SSL decryption, hardened admin...
Why Your Cyber Hygiene Matters?

Why Your Cyber Hygiene Matters?

Find Threat Talks on Why Your Cyber Hygiene Matters? What happens when one person’s bad cyber hygiene puts an entire network at risk?The result can be devastating—unauthorized access, data theft, and a ripple effect that endangers not just one user, but every...