Threat Talks

Zero Trust with John Kindervag – Threat Talks on tour: Part 2

Zero Trust with John Kindervag – Threat Talks on tour: Part 2

Threat Talks on Tour - Live from the RSA | Part 2 Zero Trust with John Kindervag   Lieuwe Jan Koning, speaking from the RSA Conference in San Francisco, welcomes John Kindervag to delve into the concept of Zero Trust in cybersecurity. This episode is a sequel to...

Healthcare: Responsibilities, regulations and legacies

Healthcare: Responsibilities, regulations and legacies

Listen to The Threat Talks on:Your cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO, ON2ITRob Maas Field CTO, ON2ITSina Yazdanmehr Founder and Managing Director, Aplite GmbHHealthcare: Responsibilities, regulations and legacies The episode discusses the...

Supply Chain: Business as usual?

Supply Chain: Business as usual?

Listen to The Threat Talks on:Your cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO ON2ITLuca Cipriano Threat Intel Specialist ON2ITMatthijs Zwart CIO and CISO Vitens Supply chain: Business as usual?  As reliance on third-party and open-source software grows,...

The Authentication Apocalypse

The Authentication Apocalypse

Your cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO, ON2ITLuca Cipriano Threat Intel Specialist, ON2ITHarald Bosman Senior Endpoint Engineer, AMS-IXThe Authentication Apocalypse Word of data breaches and stolen credentials reaches the news almost every...

Does remote work?

Does remote work?

Listen to The Threat Talks on:Your cybersecurity expertsRob Maas Field CTO ON2ITLieuwe Jan Koning Co-Founder and CTO ON2ITLuca Cipriano Threat Intel Specialist ON2ITDoes remote work? Allowing remote access, is required for almost all enterprises. But enablling remote...

Can’t deny DDoS in 2024?

Can’t deny DDoS in 2024?

Listen to The Threat Talks on:Your cybersecurity expertsPeter van Burgel CEO AMS-IXLieuwe Jan Koning Co-Founder and CTO ON2IT GroupLuca Cipriano Threat Intel Specialist ON2ITCan't deny DDoS in 2024? DDoS attacks are becoming increasingly more frequent, and there...

Deep Dives

Intrusion Kill Chain with Rick Howard

Intrusion Kill Chain with Rick Howard

Listen this Threat Talk onIntrusion Kill Chain with Rick Howard Turning the Tables on Attackers   In this episode, host Lieuwe Jan Koning is once again joined by Rick...

The Rising Threat of Deepfakes

The Rising Threat of Deepfakes

Listen this Threat Talk onThe Rising Threat of Deepfakes Can you still trust what you see? Deepfakes aren’t just for entertainment anymore: they’re now an increasingly powerful...

Breaking the Defenses: EDR Bypass

Breaking the Defenses: EDR Bypass

Listen this Threat Talk onBreaking the Defenses: EDR Bypass 🎯 Are Your Endpoint Protection Solutions Truly Secure? In this episode of Threat Talks – The Deep Dive, Rob Maas sits...

Dutch Law Enforcement Data Breach

Dutch Law Enforcement Data Breach

Dutch Law Enforcement Data Breach Imagine the phone numbers of police officers, DAs, and even critical key witnesses being hacked and leaked to the public. This isn’t the opening...

MGM Resorts Ransomware Attack

MGM Resorts Ransomware Attack

MGM Resorts ALPHV/BlackCat Ransomware Attack Cybercrime Meets Fake News MGM Resorts, one of the world’s largest casino operators, found itself in the spotlight for all the wrong...

UNIX CUPS Remote Code Execution

UNIX CUPS Remote Code Execution

UNIX CUPS Remote Code Execution The Fallacy of Default Trust "Hello! I'm a Printer! Please Let Me In, thank you!" – It may sound absurd, but this is how attackers can trick your...

XZ Utils Critical Backdoor (CVE- 2024-3094)

XZ Utils Critical Backdoor (CVE- 2024-3094)

XZ Utils Critical Backdoor The Fallacy of Secure Open Source Code How much time would you spend on executing the perfect hack? The user going by the name of ‘JIAT75’ spent almost...

Deep Dive – CrowdStrike auto-update disaster

Deep Dive – CrowdStrike auto-update disaster

CrowdStrike Auto-Update Disaster The Fallacy of automatic updates Last July’s CrowdStrike outage led to closed airports, inaccessible bank accounts and hospitals that were only...

Deep Dive – Binance Exchange Hack

Deep Dive – Binance Exchange Hack

Binance BNB Exchange Hack The Binance BNB Chain Attack – A Deep Dive Into Crypto Vulnerabilities Imagine creating millions in cryptocurrency without spending a cent. In this...