by Arjun Shailly | Dec 30, 2025 | Deep Dive
Looking Back at 2025 Find Threat Talks on Looking Back at 2025: Cybersecurity at a Turning Point Detection didn’t fail in 2025.It reached its limits – and many teams only realized it after the fact. The threat landscape didn’t suddenly become more...
by Arjun Shailly | Dec 19, 2025 | Deep Dive
BGP Vortex: Internet Kill Switch? Find Threat Talks on BGP Vortex: Internet Kill Switch? BGP is designed to keep the internet connected by constantly recalculating routes between networks. BGP Vortex flips that strength into a weakness. Instead of hijacking traffic or...
by Arjun Shailly | Dec 16, 2025 | Deep Dive
WSUS RCE: Update Weaponized Find Threat Talks on WSUS RCE: Update Weaponized Microsoft’s Windows Server Update Services (WSUS) is supposed to harden your environment by centralizing patching. Instead, a single flaw turned it into one of the cleanest...
by Arjun Shailly | Dec 9, 2025 | Deep Dive
Bad Successor: The Service Account Flaw to Watch Find Threat Talks on Bad Successor: The Service Account Flaw to Watch Windows Server 2025 introduced DMSA – a “secure by design” upgrade meant to modernize service accounts.Instead, it opened one of the cleanest...
by Arjun Shailly | Dec 4, 2025 | Deep Dive, Threat Talks
From Hacker to Hero Find Threat Talks on From Hacker to Hero What if the most determined hacker you’ll face in 2030 is already at work – as a 15-year-old gamer with a puzzle habit? In this episode of Threat Talks, host Lieuwe Jan Koning sits down with former FBI...
by Sam Helmink | Nov 25, 2025 | Deep Dive
The Npm Worm Outbreak Find Threat Talks on The Npm Worm Outbreak For the first time, the world’s biggest open-source ecosystem saw a worm that spread on its own.No botnet. No manual upload. Just automation – and trust – turned against developers....