From Hacker to Hero

From Hacker to Hero

From Hacker to Hero Find Threat Talks on From Hacker to Hero What if the most determined hacker you’ll face in 2030 is already at work – as a 15-year-old gamer with a puzzle habit? In this episode of Threat Talks, host Lieuwe Jan Koning sits down with former FBI...
The Npm Worm Outbreak

The Npm Worm Outbreak

The Npm Worm Outbreak Find Threat Talks on The Npm Worm Outbreak   For the first time, the world’s biggest open-source ecosystem saw a worm that spread on its own.No botnet. No manual upload. Just automation – and trust – turned against developers....
The App Store Nightmare: The AI MCP Stores Trap

The App Store Nightmare: The AI MCP Stores Trap

The App Store Nightmare: The AI MCP Stores Trap Find Threat Talks on The App Store Nightmare: Why AI MCP Stores Are a Trap The app store nightmare is here – and you’re already in it. AI “helpers” (agents) powered by MCP (a system that lets AI use other tools)...
Patch Smarter, Not Harder

Patch Smarter, Not Harder

Patch Smarter, Not Harder Find Threat Talks on Patch Smarter, Not Harder Alarm bell: “Patch Smarter, Not Harder”. Hosts Lieuwe Jan Koning and Rob Maas show why patch management without Zero Trust is a risk amplifier in modern cybersecurity. They reveal a playbook that...
Public Key Infrastructure: Digital Trust Foundation

Public Key Infrastructure: Digital Trust Foundation

Public Key Infrastructure: Digital Trust Foundation Find Threat Talks on Public Key Infrastructure: The Foundation of Digital Trust PKI isn’t paperwork.It’s the switch that turns digital trust on—or off.Set it up right and you get clean SSL decryption, hardened admin...
Why Your Cyber Hygiene Matters?

Why Your Cyber Hygiene Matters?

Find Threat Talks on Why Your Cyber Hygiene Matters? What happens when one person’s bad cyber hygiene puts an entire network at risk?The result can be devastating—unauthorized access, data theft, and a ripple effect that endangers not just one user, but every...