Threat Talks
From Hacker to Hero
Find Threat Talks onFrom Hacker to Hero What if the most determined hacker you’ll face in 2030 is already at work - as a 15-year-old gamer with a puzzle habit? In this episode of Threat Talks, host Lieuwe Jan Koning sits down with former FBI Supervisory Special Agent...
Inside the SalesLoft Breach
Find Threat Talks onInside the SalesLoft Breach SaaS was sold as safe — Inside the Salesloft Breach shows why it wasn’t.Hosts Rob Maas and Luca Cipriano expose how long-lived OAuth tokens and trusted integrations turned Salesforce, Salesloft, and Drift into silent...
The Secret Diplomats Fighting Cyber Wars
Find Threat Talks onThe Secret Diplomats Fighting Cyber Wars Every cyberattack headline hides a story of negotiation and restraint. In this episode of Threat Talks, Lieuwe Jan Koning talks with Ernst Noorman, Ambassador at Large for Cyber Affairs of the Kingdom of the...
Resilience Over Fragmentation
Find Threat Talks onResilience Over Fragmentation: The Risk You Can’t Ignore In this Threat Talks episode, Lieuwe Jan Koning sits with Professor Bart Jacobs to show—through simple, real stories—how scattered tools and ad-driven platforms take away control, and how...
AI, Play It Safe: Why CISOs Are Wrong to Ban AI
Find Threat Talks onAI, Play It Safe: Why CISOs Are Wrong to Ban AI AI is transforming the way we work and live. From boosting productivity to exposing sensitive data, the technology is reshaping both business and personal life. In this episode of Threat Talks, Lieuwe...
Splinternet Check: Zero Trust for a Fragmented Web
Find Threat Talks onSplinternet Check: Zero Trust for a Fragmented Web The internet has long been seen as open and borderless. But as it turns out, that idea may be decidedly western. From Europe to China to the Middle East, different rules, values, and controls are...
Agentic AI: Hype, Hope, or Real Risk?
Find Threat Talks onAgentic AI: Hype, Hope, or Real Risk? Andrew Grotto (founder and director of the Program on Geopolitics, Technology and Governance at Stanford University) puts it plainly: there's a 5% chance that within the next 10 years, AI could rule over...
Rethinking OT: It’s All Just Technology
Find Threat Talks onRethinking OT: It's All Just Technology PLCs with default passwords. Devices searchable online. Siloed asset inventories. These OT challenges are common, but they’re also fixable. In this episode of Threat Talks, host Lieuwe Jan Koning sits down...
OT’s Hidden Cyber Risks
Find Threat Talks onHack the Infrastructure OT’s Hidden Cyber Risks From ships and cities to hospitals and airports, Operational Technology (OT) keeps the world running. The problem? It was never designed with cybersecurity in mind. In this episode of Threat Talks,...
Inside Volt Typhoon: China’s Silent Cyber Threat
Find Threat Talks onInside Volt Typhoon China’s Silent Cyber Threat Volt Typhoon is a Chinese* state-sponsored threat actor that’s turned stealth into strategy, infiltrating Western critical infrastructure with little more than patience and native tools. In this...
Inside the Dark Web Economy
Listen this Threat Talk onUnmasking the Dark Web How hackers monetize your data Stolen credentials, hacked corporate systems, even illegal services: it’s all for sale, sometimes for as little as $10. In this episode of Threat Talks, host Lieuwe Jan Koning is...
Why SSL Decryption Matters
Listen this Threat Talk onDecrypting Cyber Threats The top three tips for implementing decryption With over 95% of web traffic now encrypted and 70% of cyberattacks leveraging encryption to evade detection, organizations that fail to decrypt their traffic are...
Deep Dives
WSUS RCE: Update Weaponized
Find Threat Talks onWSUS RCE: Update Weaponized Microsoft’s Windows Server Update Services (WSUS) is supposed to harden your environment by centralizing patching. Instead, a...
Bad Successor: The Service Account Flaw to Watch
Find Threat Talks onBad Successor: The Service Account Flaw to Watch Windows Server 2025 introduced DMSA - a “secure by design” upgrade meant to modernize service...
From Hacker to Hero
Find Threat Talks onFrom Hacker to Hero What if the most determined hacker you’ll face in 2030 is already at work - as a 15-year-old gamer with a puzzle habit? In this episode of...
The Npm Worm Outbreak
Find Threat Talks onThe Npm Worm Outbreak For the first time, the world’s biggest open-source ecosystem saw a worm that spread on its own.No botnet. No manual upload. Just...
The App Store Nightmare: The AI MCP Stores Trap
Find Threat Talks onThe App Store Nightmare: Why AI MCP Stores Are a Trap The app store nightmare is here - and you’re already in it. AI “helpers” (agents) powered by MCP (a...
Patch Smarter, Not Harder
Find Threat Talks onFrom Hacker to Hero McKean shows how teenagers pick up intrusion skills not from Hollywood tropes, but from game mods, online clans, challenge boards, and...
Public Key Infrastructure: Digital Trust Foundation
Find Threat Talks onPublic Key Infrastructure: The Foundation of Digital Trust PKI isn’t paperwork.It’s the switch that turns digital trust on—or off.Set it up right and you get...
Why Your Cyber Hygiene Matters?
Find Threat Talks onWhy Your Cyber Hygiene Matters? What happens when one person’s bad cyber hygiene puts an entire network at risk?The result can be devastating—unauthorized...
Zero Trust Step 5B: Maintain Controls
Find Threat Talks onZero Trust Step 5B: Maintaining Security Controls Breaches aren’t shocks; they’re late-stage symptoms of control decay. Drift turns “temporary” access into...
Defend Against Hacktivist Groups like APT Handala
Find Threat Talks onHow To Defend Against Hacktivist Groups like APT Handala Hacktivist groups like APT Handala aren’t driven by money. They’re fueled by politics, disruption,...
Promptlock – The First AI-Powered Malware
Find Threat Talks onPromptlock - The First AI-Powered Malware If malware used to be predictable, those days are gone.With AI in the driver’s seat, malware has become a...
Data Bouncing: How HTTP Headers Leak Data
Find Threat Talks onData Bouncing: How HTTP Headers Leak Data You harden endpoints. You filter egress. You deploy malware detectors. And still, data slips out. In this Threat...





















