Threat Talks

Inside the Hackers Mind

Inside the Hackers Mind

Listen to this episode of Threat Talks onInside the Hackers Mind 👾 Ever wondered what it’s like to think like a hacker? In this Threat Talks episode, host Lieuwe Jan Koning is joined by ethical hacker Tom van de Wiele, founder of Hackerminded, for a deep dive into the...

ONCD: The Cyber Catalyst

ONCD: The Cyber Catalyst

Listen to this episode of Threat Talks onONCD: The Cyber Catalyst with Davis Hake How can governments shape the future of cybersecurity? In this compelling episode of Threat Talks, host Lieuwe Jan Koning sits down with returning guest Davis Hake, cybersecurity expert...

The State of Cybersecurity in the European Union

The State of Cybersecurity in the European Union

Listen to this episode of Threat Talks onThe State of Cybersecurity in the European Union Strengthening EU Cybersecurity: Insights from ENISA's Hans de Vries on Resilience and Collaboration In this insightful Threat Talk, Lieuwe Jan Koning is honored to be joined by...

Cyber Outlook 2025 – One Year of Threat Talks

Cyber Outlook 2025 – One Year of Threat Talks

Listen to this episode of Threat Talks onCyber Outlook 2025 2025: The Year of AI and Cybersecurity Evolution Welcome to the first episode of Threat Talks in 2025! Host Lieuwe Jan Koning is joined once again by Peter van Burgel, CEO of AMS-IX, to explore what this year...

2024: The Breaking Point

2024: The Breaking Point

Listen to this episode of Threat Talks on2024 - The Breaking Point One Year of Threat Talks As 2024 comes to a close, we’re celebrating a year of transformative conversations with a special edition of Threat Talks! Join Lieuwe Jan Koning and Peter van Burgel (CEO of...

Prevent, Pay or Insure

Prevent, Pay or Insure

Find this Threat Talk onPrevent, Pay or Insure? The road to cyber resilience Days before MGM’s computer systems were taken down in a cyberattack, fellow casino operator Caesars paid a $15 million ransom to attackers who infiltrated its systems. MGM chose not to pay...

Breaking the Illusion: Exposing Security Fallacies

Breaking the Illusion: Exposing Security Fallacies

Find this Threat Talk onExposing Security Fallacies Breaking the Illusion: Confronting Cybersecurity’s Biggest Fallacies Are we truly protecting ourselves from cyber threats, or are we blinded by outdated security practices? In this episode of Threat Talks, ON2IT’s...

Hack the Boat

Hack the Boat

Find Threat Talks onHack the Boat Explore the cutting-edge of maritime cybersecurity Imagine you're the captain of a massive ship, cruising through open waters at full speed. Suddenly, something feels off... Are you veering off course? But your monitors show...

Bridging the Gap: Security and Compliance

Bridging the Gap: Security and Compliance

Find Threat Talks onBridging the Gap What’s more important: compliance or cybersecurity? Explore the often-overlooked operational gap between compliance and actual security in episode #33 of Threat Talks. While many organizations focus on meeting compliance standards,...

The Evolution of Cyber Warfare

The Evolution of Cyber Warfare

Find Threat Talks onThe Evolution of Cyber Warfare Advanced Threat Intelligence helps you know your enemy. Explore the hidden world of cyber warfare and Advanced Persistent Threats (APT's) with Threat Intel Specialist Luca Cipriano and special guest Cyber Security...

Breaking the Bank

Breaking the Bank

Breaking the bank Financial sector cybersecurity threatsIn this episode, special guest and renowned cybersecurity expert Jayson E. Street shares his experiences on how he ethically "robs" banks to reveal security weaknesses. By exploiting human vulnerabilities rather...

Threat Talks on Tour – Cyber Guardians: Anti-DDoS Coalition

Threat Talks on Tour – Cyber Guardians: Anti-DDoS Coalition

Cyber Guardians: Anti-DDoS Coalition This special episode is a discussion on the importance of defending against DDoS attacks, particularly for businesses that rely on online tools and websites. The host, Lieuwe Jan Koning from ON2IT and special guests Remco Poortinga...

Deep Dives

Breaking the Defenses: EDR Bypass

Breaking the Defenses: EDR Bypass

Listen this Threat Talk onBreaking the Defenses: EDR Bypass 🎯 Are Your Endpoint Protection Solutions Truly Secure? In this episode of Threat Talks – The Deep Dive, Rob Maas sits...

Salt Typhoon: How Nine Telcos Were Compromised

Salt Typhoon: How Nine Telcos Were Compromised

Find Threat Talks onSalt Typhoon: How Nine Telcos Were Compromised Exposing the Vulnerabilities and Fallout In this episode, we cover: 📡 How known vulnerabilities in telco...

Dutch Law Enforcement Data Breach

Dutch Law Enforcement Data Breach

Dutch Law Enforcement Data Breach Imagine the phone numbers of police officers, DAs, and even critical key witnesses being hacked and leaked to the public. This isn’t the opening...

MGM Resorts Ransomware Attack

MGM Resorts Ransomware Attack

MGM Resorts ALPHV/BlackCat Ransomware Attack Cybercrime Meets Fake News MGM Resorts, one of the world’s largest casino operators, found itself in the spotlight for all the wrong...

UNIX CUPS Remote Code Execution

UNIX CUPS Remote Code Execution

UNIX CUPS Remote Code Execution The Fallacy of Default Trust "Hello! I'm a Printer! Please Let Me In, thank you!" – It may sound absurd, but this is how attackers can trick your...

XZ Utils Critical Backdoor (CVE- 2024-3094)

XZ Utils Critical Backdoor (CVE- 2024-3094)

XZ Utils Critical Backdoor The Fallacy of Secure Open Source Code How much time would you spend on executing the perfect hack? The user going by the name of ‘JIAT75’ spent almost...

Deep Dive – CrowdStrike auto-update disaster

Deep Dive – CrowdStrike auto-update disaster

CrowdStrike Auto-Update Disaster The Fallacy of automatic updates Last July’s CrowdStrike outage led to closed airports, inaccessible bank accounts and hospitals that were only...

Deep Dive – Binance Exchange Hack

Deep Dive – Binance Exchange Hack

Binance BNB Exchange Hack The Binance BNB Chain Attack – A Deep Dive Into Crypto Vulnerabilities Imagine creating millions in cryptocurrency without spending a cent. In this...

Deep Dive – Ballast System Hack

Deep Dive – Ballast System Hack

Ballast System Hack Ever been asked to hack a boat? When Luca Cipriano and Jeroen Scheerder were given the challenge, they took an unexpected approach—step one: build the boat...

Deep Dive – Securing AIS

Deep Dive – Securing AIS

Securing AIS AIS (Advanced Identification System) is an incredibly important tool in maritime navigation, allowing ships to transmit their location and data to other vessels and...

Deep Dive – HTTP/2 Rapid Reset Attack

Deep Dive – HTTP/2 Rapid Reset Attack

HTTPS/2 Rapid Reset DDoS method Flooding targeted servers and websites The HTTP/2 Rapid Reset attack is a powerful new DDoS method that exploits weaknesses in the HTTP/2...