Looking Back at 2025

Looking Back at 2025

Looking Back at 2025 Find Threat Talks on Looking Back at 2025: Cybersecurity at a Turning Point Detection didn’t fail in 2025.It reached its limits – and many teams only realized it after the fact. The threat landscape didn’t suddenly become more...
BGP Vortex: Internet Kill Switch?

BGP Vortex: Internet Kill Switch?

BGP Vortex: Internet Kill Switch? Find Threat Talks on BGP Vortex: Internet Kill Switch? BGP is designed to keep the internet connected by constantly recalculating routes between networks. BGP Vortex flips that strength into a weakness. Instead of hijacking traffic or...
WSUS RCE: Update Weaponized

WSUS RCE: Update Weaponized

WSUS RCE: Update Weaponized Find Threat Talks on WSUS RCE: Update Weaponized Microsoft’s Windows Server Update Services (WSUS) is supposed to harden your environment by centralizing patching. Instead, a single flaw turned it into one of the cleanest...
Bad Successor: The Service Account Flaw to Watch

Bad Successor: The Service Account Flaw to Watch

Bad Successor: The Service Account Flaw to Watch Find Threat Talks on Bad Successor: The Service Account Flaw to Watch Windows Server 2025 introduced DMSA – a “secure by design” upgrade meant to modernize service accounts.Instead, it opened one of the cleanest...
From Hacker to Hero

From Hacker to Hero

From Hacker to Hero Find Threat Talks on From Hacker to Hero What if the most determined hacker you’ll face in 2030 is already at work – as a 15-year-old gamer with a puzzle habit? In this episode of Threat Talks, host Lieuwe Jan Koning sits down with former FBI...
The Npm Worm Outbreak

The Npm Worm Outbreak

The Npm Worm Outbreak Find Threat Talks on The Npm Worm Outbreak   For the first time, the world’s biggest open-source ecosystem saw a worm that spread on its own.No botnet. No manual upload. Just automation – and trust – turned against developers....