Deep Dive – Accellion File Transfer Appliance

Deep Dive – Accellion File Transfer Appliance

Deep Dive – Accellion File Transfer Appliance Find Threat Talks on Accellion File Transfer Appliance (FTA) Breach How compliance creates operational blind spots You’ve diligently chosen a file transfer tool that is widely trusted, certified and compliant with...
Deep Dive – APT Sand Eagle

Deep Dive – APT Sand Eagle

Deep Dive – APT Sand Eagle Find Threat Talks on Advanced Persistent Threat Sand Eagle ‘Sand Eagle’ made headlines 📰 for its ability to infiltrate some of the most secure devices on the market—iPhones 📱 used by high-profile Russian officials. Dive Deep into the...
Deep Dive – Russia GRU Viasat Hack

Deep Dive – Russia GRU Viasat Hack

Deep Dive – Russia GRU Viasat Hack Find Threat Talks on Russia GRU Viasat Hack Ethan Hunt is known for doing the impossible. Mostly by blowing things up with his team. What if he and his team spoke Russian and on the onset of the invasion of Ukraine, they...
Deep Dive – China Barracuda Nexus Hack

Deep Dive – China Barracuda Nexus Hack

Deep Dive – China Barracuda Nexus Hack Find Threat Talks on China Nexus Barracuda Hack 🚨 In today’s world, cyber threats are as real and sophisticated as a James Bond movie. Do we stand a chance defending ourselves against modern day cyber espionage? In episode...
Threat Talks on Tour: DDoS Mitigations

Threat Talks on Tour: DDoS Mitigations

Threat Talks on Tour: DDoS Mitigations Ever wondered why DDoS attacks aren’t making headlines anymore? Is it because they’ve vanished, or are we simply better at defending against them? In this episode of Threat Talks, we explore the current state of DDoS...