Threat Talks

Does remote work?

Does remote work?

Listen to The Threat Talks on:Your cybersecurity expertsRob Maas Field CTO ON2ITLieuwe Jan Koning Co-Founder and CTO ON2ITLuca Cipriano Threat Intel Specialist ON2ITDoes remote work? Allowing remote access, is required for almost all enterprises. But enablling remote...

Can’t deny DDoS in 2024?

Can’t deny DDoS in 2024?

Listen to The Threat Talks on:Your cybersecurity expertsPeter van Burgel CEO AMS-IXLieuwe Jan Koning Co-Founder and CTO ON2IT GroupLuca Cipriano Threat Intel Specialist ON2ITCan't deny DDoS in 2024? DDoS attacks are becoming increasingly more frequent, and there...

Deep Dives

Threat Talks on Tour: DDoS Mitigations

Threat Talks on Tour: DDoS Mitigations

Threat Talks on Tour: DDoS Mitigations Ever wondered why DDoS attacks aren't making headlines anymore? Is it because they've vanished, or are we simply better at defending...

Deep Dive – Vultur, Android Malware

Deep Dive – Vultur, Android Malware

Listen to Threat TalksYour cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO ON2IT GroupLuca Cipriano Threat Intel Specialist ON2ITRob Maas Field CTO ON2ITVultur Android...

Deep Dive – Bangladesh Bank SWIFT attack

Deep Dive – Bangladesh Bank SWIFT attack

Find Threat Talks on:Your cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO ON2IT GroupLuca Cipriano Threat Intel Specialist ON2ITRob Maas Field CTO ON2ITBangladesh Bank:...

Deep Dive – Ivanti EPM

Deep Dive – Ivanti EPM

Your cybersecurity expertsLieuwe Jan Koning Co-Founder ana CTO, ON2IT GroupLuca Cipriano Threat Intel Specialist, ON2ITRob Maas Field CTO, ON2ITIvanti EPM - SQL injection attack...

Deep Dive – Google OAuth bypass

Deep Dive – Google OAuth bypass

Your cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO, ON2ITLuca Cipriano Threat Intel Specialist, ON2ITRob Maas Field CTO, ON2ITGoogle OAuth Bypass  A vulnerability in...