by Marc van Waasbergen | Mar 5, 2024 | Threat Talks
The Authentication Apocalypse Your cybersecurity experts Lieuwe Jan Koning Co-Founder and CTO, ON2IT Luca Cipriano Threat Intel Specialist, ON2IT Harald Bosman Senior Endpoint Engineer, AMS-IX The Authentication Apocalypse Word of data breaches and stolen credentials...
by Marc van Waasbergen | Feb 27, 2024 | Deep Dive
Listen to The Threat Talks on: FortiOS SSLVPN buffer overflow Your cybersecurity experts Lieuwe Jan Koning Co-Founder and CTO ON2IT Group Luca Cipriano Threat Intel Specialist ON2IT Rob Maas Field CTO ON2IT FortiOS SSLVPN buffer overflow The FortiOS SSLVPN buffer...
by Marc van Waasbergen | Feb 20, 2024 | Deep Dive
Listen to The Threat Talks on: TunnelCrack VPN – Deep Dive Your cybersecurity experts Lieuwe Jan Koning Co-Founder and CTO ON2IT Luca Cipriano Threat Intel Specialist ON2IT TunnelCrack VPN vulnerability A deep dive into TunnelCrack, an advanced attack that...
by Marc van Waasbergen | Feb 13, 2024 | Deep Dive
Listen to The Threat Talks on: Citrix NetScaler – Deep dive Your cybersecurity experts Lieuwe Jan Koning Co-Founder and CTO ON2IT Luca Cipriano Threat Intel Specialist ON2IT Citrix Netscaler Exploring the critical cybersecurity threat posed by the Citrix...
by Marc van Waasbergen | Feb 6, 2024 | Threat Talks
Listen to The Threat Talks on: Does remote work? Your cybersecurity experts Rob Maas Field CTO ON2IT Lieuwe Jan Koning Co-Founder and CTO ON2IT Luca Cipriano Threat Intel Specialist ON2IT Does remote work? Allowing remote access, is required for almost all...