Supply Chain: Business as usual?

Supply Chain: Business as usual?

Listen to The Threat Talks on: Supply Chain: Business as usual? Your cybersecurity experts Lieuwe Jan Koning Co-Founder and CTO ON2IT Luca Cipriano Threat Intel Specialist ON2IT Matthijs Zwart CIO and CISO Vitens  Supply chain: Business as usual?  As reliance on...
Deep Dive – Ivanti EPM

Deep Dive – Ivanti EPM

Deep Dive – Ivanti EPM Your cybersecurity experts Lieuwe Jan Koning Co-Founder ana CTO, ON2IT Group Luca Cipriano Threat Intel Specialist, ON2IT Rob Maas Field CTO, ON2IT Ivanti EPM – SQL injection attack The discovery of a critical SQL injection...
Deep Dive – Google OAuth bypass

Deep Dive – Google OAuth bypass

Deep Dive – Google OAuth bypass Your cybersecurity experts Lieuwe Jan Koning Co-Founder and CTO, ON2IT Luca Cipriano Threat Intel Specialist, ON2IT Rob Maas Field CTO, ON2IT Google OAuth Bypass  A vulnerability in Google’s OAuth system has revealed a loophole in...
Deep Dive – Outlook vulnerability

Deep Dive – Outlook vulnerability

Listen to The Threat Talks on: Deep Dive – Outlook vulnerability Your Presentors Lieuwe Jan Koning Co-Founder and CTO ON2IT Group Luca Cipriano Threat Intel Specialist ON2IT Rob Maas Field CTO ON2IT Outlook vulnerability  The discovery of a vulnerability within...