Threat Talks
Does remote work?
Listen to The Threat Talks on:Your cybersecurity expertsRob Maas Field CTO ON2ITLieuwe Jan Koning Co-Founder and CTO ON2ITLuca Cipriano Threat Intel Specialist ON2ITDoes remote work? Allowing remote access, is required for almost all enterprises. But enablling remote...
Can’t deny DDoS in 2024?
Listen to The Threat Talks on:Your cybersecurity expertsPeter van Burgel CEO AMS-IXLieuwe Jan Koning Co-Founder and CTO ON2IT GroupLuca Cipriano Threat Intel Specialist ON2ITCan't deny DDoS in 2024? DDoS attacks are becoming increasingly more frequent, and there...
Deep Dives
Threat Talks on Tour: DDoS Mitigations
Threat Talks on Tour: DDoS Mitigations Ever wondered why DDoS attacks aren't making headlines anymore? Is it because they've vanished, or are we simply better at defending...
Deep Dive – Vultur, Android Malware
Listen to Threat TalksYour cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO ON2IT GroupLuca Cipriano Threat Intel Specialist ON2ITRob Maas Field CTO ON2ITVultur Android...
Deep Dive – Bangladesh Bank SWIFT attack
Find Threat Talks on:Your cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO ON2IT GroupLuca Cipriano Threat Intel Specialist ON2ITRob Maas Field CTO ON2ITBangladesh Bank:...
Deep Dive – ScreenConnect: Authentication Bypass (CVE-2024-1709)
Find Threat Talks on:Your cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO ON2IT GroupLuca Cipriano Threat Intel Specialist ON2ITRob Maas Field CTO ON2ITScreenConnect:...
Deep Dive – Ireland’s HSE Ransomware Attack
Listen to The Threat Talks on:Your cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO ON2IT GroupLuca Cipriano Threat Intel Specialist ON2ITRob Maas Field CTO...
Deep Dive – DICOM: The hidden risks of Legacy Protocols
Listen to The Threat Talks on:Your cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO ON2IT GroupJan van Boesschoten Innovation Manager at AMS-IXSina Yazdanmehr Founder...
Deep Dive – The most simple DDoS attack: Reflection attack
Listen to Threat Talks onYour cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO ON2IT GroupLuca Cipriano Threat Intel Specialist ON2ITRob Maas Field CTO ON2ITReflection...
Deep Dive – MOVEit: The danger of delegating data to third-party software
Listen to The Threat Talks on:Your cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO ON2IT GroupLuca Cipriano Threat Intel Specialist ON2ITRob Maas Field CTO ON2ITMOVEit:...
Deep Dive – Log4j: The danger of software dependencies
Listen to The Threat Talks on:Your cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO ON2IT GroupLuca Cipriano Threat Intel Specialist ON2ITRob Maas Field CTO ON2ITLog4j:...
Deep Dive – SolarWinds: The danger of third-party software
Listen to The Threat Talks on:Your cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO ON2IT GroupLuca Cipriano Threat Intel Specialist ON2ITRob Maas Field CTO...
Deep Dive – Ivanti EPM
Your cybersecurity expertsLieuwe Jan Koning Co-Founder ana CTO, ON2IT GroupLuca Cipriano Threat Intel Specialist, ON2ITRob Maas Field CTO, ON2ITIvanti EPM - SQL injection attack...
Deep Dive – Google OAuth bypass
Your cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO, ON2ITLuca Cipriano Threat Intel Specialist, ON2ITRob Maas Field CTO, ON2ITGoogle OAuth Bypass A vulnerability in...