by Arjun Shailly | Aug 19, 2025 | Deep Dive
Russia’s Seashell Blizzard: Stealth Attacks to Wipers Find Threat Talks on Russia’s Seashell Blizzard: Stealth Attacks to Wipers They’ve been called Sandworm, APT 44, Iron Viking, and Electrum. But whatever the name, Seashell Blizzard is one of the most disruptive...
by Arjun Shailly | Aug 12, 2025 | Deep Dive
SignalGate: Wrong Contact, Classified Chat Leak Find Threat Talks on SignalGate: Wrong Contact, Classified Chat Leak When a group of U.S. government and military officials chose Signal to share classified information, they assumed it was a secure choice. But one...
by Arjun Shailly | Jul 15, 2025 | Deep Dive
Zero Trust Step 4B: How to Secure Admin Access Find Threat Talks on Zero Trust Step 4B: How to Secure Admin Access Admins hold the key to the proverbial kingdom – and this makes them a top target for attackers. In part B of our deep dive into step four of Zero Trust...
by Arjun Shailly | Jul 15, 2025 | Deep Dive
Mastering Step Four of Zero Trust: Policy Creation Find Threat Talks on Mastering Step Four of Zero Trust: Policy Creation Now that you’ve defined your protect surfaces, mapped your transaction flows and built your Zero Trust architecture, it’s time for step four of...
by Arjun Shailly | Jul 15, 2025 | Deep Dive
Blockchain in a Post-Quantum World Find Threat Talks on Blockchain in a Post-Quantum World What does quantum computing mean for blockchain? And how should platforms respond before Q-day becomes reality? In this episode of Threat Talks, ON2IT Field CTO Rob Maas is...
by Arjun Shailly | Jul 2, 2025 | Deep Dive
Windows Recall: Convenience or Catastrophe? Find Threat Talks on Windows Recall: Convenience or Catastrophe? Imagine a tool that records everything you do on your computer and keeps it all stored in a searchable database. That’s what Windows Recall is designed to do,...