Threat Talks
Hack the Boat
Find Threat Talks onHack the Boat Explore the cutting-edge of maritime cybersecurity Imagine you're the captain of a massive ship, cruising through open waters at full speed. Suddenly, something feels off... Are you veering off course? But your monitors show...
Bridging the Gap: Security and Compliance
Find Threat Talks onBridging the Gap What’s more important: compliance or cybersecurity? Explore the often-overlooked operational gap between compliance and actual security in episode #33 of Threat Talks. While many organizations focus on meeting compliance standards,...
The Evolution of Cyber Warfare
Find Threat Talks onThe Evolution of Cyber Warfare Advanced Threat Intelligence helps you know your enemy. Explore the hidden world of cyber warfare and Advanced Persistent Threats (APT's) with Threat Intel Specialist Luca Cipriano and special guest Cyber Security...
Breaking the Bank
Breaking the bank Financial sector cybersecurity threatsIn this episode, special guest and renowned cybersecurity expert Jayson E. Street shares his experiences on how he ethically "robs" banks to reveal security weaknesses. By exploiting human vulnerabilities rather...
Threat Talks on Tour – Cyber Guardians: Anti-DDoS Coalition
Cyber Guardians: Anti-DDoS Coalition This special episode is a discussion on the importance of defending against DDoS attacks, particularly for businesses that rely on online tools and websites. The host, Lieuwe Jan Koning from ON2IT and special guests Remco Poortinga...
Zero Trust with John Kindervag – Threat Talks on tour: Part 2
Threat Talks on Tour - Live from the RSA | Part 2 Zero Trust with John Kindervag Lieuwe Jan Koning, speaking from the RSA Conference in San Francisco, welcomes John Kindervag to delve into the concept of Zero Trust in cybersecurity. This episode is a sequel to...
Zero Trust with John Kindervag – Threat Talks on tour: Live from the RSA
Threat Talks on Tour - Live from the RSA | Part 1 Zero Trust with John Kindervag In this special episode of Threat Talks, host Lieuwe Jan Koning interviews John Kindervag, the creator of Zero Trust, at the RSA conference in San Francisco. They delve into the...
Healthcare: Responsibilities, regulations and legacies
Listen to The Threat Talks on:Your cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO, ON2ITRob Maas Field CTO, ON2ITSina Yazdanmehr Founder and Managing Director, Aplite GmbHHealthcare: Responsibilities, regulations and legacies The episode discusses the...
Unraveling CVE-2024-3400: a comprehensive analysis of the vulnerability
Listen to The Threat Talks on:Your cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO ON2IT GroupLuca Cipriano Threat Intel Specialist ON2ITRob Maas Field CTO ON2ITUnraveling CVE-2024-3400 A Comprehensive Analysis of the Vulnerability In this special episode of...
Supply Chain: Business as usual?
Listen to The Threat Talks on:Your cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO ON2ITLuca Cipriano Threat Intel Specialist ON2ITMatthijs Zwart CIO and CISO Vitens Supply chain: Business as usual? As reliance on third-party and open-source software grows,...
The Authentication Apocalypse
Your cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO, ON2ITLuca Cipriano Threat Intel Specialist, ON2ITHarald Bosman Senior Endpoint Engineer, AMS-IXThe Authentication Apocalypse Word of data breaches and stolen credentials reaches the news almost every...
Does remote work?
Listen to The Threat Talks on:Your cybersecurity expertsRob Maas Field CTO ON2ITLieuwe Jan Koning Co-Founder and CTO ON2ITLuca Cipriano Threat Intel Specialist ON2ITDoes remote work? Allowing remote access, is required for almost all enterprises. But enablling remote...
Deep Dives
Deep Dive – Binance Exchange Hack
Binance BNB Exchange Hack The Binance BNB Chain Attack – A Deep Dive Into Crypto Vulnerabilities Imagine creating millions in cryptocurrency without spending a cent. In this...
Deep Dive – Ballast System Hack
Ballast System Hack Ever been asked to hack a boat? When Luca Cipriano and Jeroen Scheerder were given the challenge, they took an unexpected approach—step one: build the boat...
Deep Dive – Securing AIS
Securing AIS AIS (Advanced Identification System) is an incredibly important tool in maritime navigation, allowing ships to transmit their location and data to other vessels and...
Deep Dive – HTTP/2 Rapid Reset Attack
HTTPS/2 Rapid Reset DDoS method Flooding targeted servers and websites The HTTP/2 Rapid Reset attack is a powerful new DDoS method that exploits weaknesses in the HTTP/2...
Deep Dive – Capital One Data Breach
Capital One Data Breach Compliance-induced false sense of security Capital One—a leader in finance—learned the hard way that even compliant systems can fail if they’re not...
Deep Dive – OKTA Data Breach
OKTA Data Breach Even security providers aren’t immune How does a company specializing in Identity and Access Management like OKTA suffer a data breach? In this case, a service...
Deep Dive – Accellion File Transfer Appliance
Find Threat Talks onAccellion File Transfer Appliance (FTA) Breach How compliance creates operational blind spots You’ve diligently chosen a file transfer tool that is widely...
Deep Dive – APT Sand Eagle
Find Threat Talks onAdvanced Persistent Threat Sand Eagle ‘Sand Eagle’ made headlines 📰 for its ability to infiltrate some of the most secure devices on the market—iPhones 📱 used...
Deep Dive – Russia GRU Viasat Hack
Find Threat Talks onRussia GRU Viasat Hack Ethan Hunt is known for doing the impossible. Mostly by blowing things up with his team. What if he and his team spoke Russian and on...
Deep Dive – China Barracuda Nexus Hack
Find Threat Talks onChina Nexus Barracuda Hack 🚨 In today’s world, cyber threats are as real and sophisticated as a James Bond movie. Do we stand a chance defending ourselves...
Threat Talks Special: DDoS Attacks on European Elections
DDoS Attacks on European Elections How prepared is Europe for a wave of cyberattacks during elections? The European elections saw a 30% increase in DDoS attacks, targeting...
Threat Talks on Tour: DDoS Mitigations
Threat Talks on Tour: DDoS Mitigations Ever wondered why DDoS attacks aren't making headlines anymore? Is it because they've vanished, or are we simply better at defending...