Threat Talks

Can’t deny DDoS in 2024?

Can’t deny DDoS in 2024?

Listen to The Threat Talks on:Your cybersecurity expertsPeter van Burgel CEO AMS-IXLieuwe Jan Koning Co-Founder and CTO ON2IT GroupLuca Cipriano Threat Intel Specialist ON2ITCan't deny DDoS in 2024? DDoS attacks are becoming increasingly more frequent, and there...

Deep Dives

Breaking the Defenses: EDR Bypass

Breaking the Defenses: EDR Bypass

Listen this Threat Talk onBreaking the Defenses: EDR Bypass 🎯 Are Your Endpoint Protection Solutions Truly Secure? In this episode of Threat Talks – The Deep Dive, Rob Maas sits...

Salt Typhoon: How Nine Telcos Were Compromised

Salt Typhoon: How Nine Telcos Were Compromised

Find Threat Talks onSalt Typhoon: How Nine Telcos Were Compromised Exposing the Vulnerabilities and Fallout In this episode, we cover: 📡 How known vulnerabilities in telco...

Dutch Law Enforcement Data Breach

Dutch Law Enforcement Data Breach

Dutch Law Enforcement Data Breach Imagine the phone numbers of police officers, DAs, and even critical key witnesses being hacked and leaked to the public. This isn’t the opening...

MGM Resorts Ransomware Attack

MGM Resorts Ransomware Attack

MGM Resorts ALPHV/BlackCat Ransomware Attack Cybercrime Meets Fake News MGM Resorts, one of the world’s largest casino operators, found itself in the spotlight for all the wrong...

UNIX CUPS Remote Code Execution

UNIX CUPS Remote Code Execution

UNIX CUPS Remote Code Execution The Fallacy of Default Trust "Hello! I'm a Printer! Please Let Me In, thank you!" – It may sound absurd, but this is how attackers can trick your...

XZ Utils Critical Backdoor (CVE- 2024-3094)

XZ Utils Critical Backdoor (CVE- 2024-3094)

XZ Utils Critical Backdoor The Fallacy of Secure Open Source Code How much time would you spend on executing the perfect hack? The user going by the name of ‘JIAT75’ spent almost...

Deep Dive – CrowdStrike auto-update disaster

Deep Dive – CrowdStrike auto-update disaster

CrowdStrike Auto-Update Disaster The Fallacy of automatic updates Last July’s CrowdStrike outage led to closed airports, inaccessible bank accounts and hospitals that were only...

Deep Dive – Binance Exchange Hack

Deep Dive – Binance Exchange Hack

Binance BNB Exchange Hack The Binance BNB Chain Attack – A Deep Dive Into Crypto Vulnerabilities Imagine creating millions in cryptocurrency without spending a cent. In this...

Deep Dive – Ballast System Hack

Deep Dive – Ballast System Hack

Ballast System Hack Ever been asked to hack a boat? When Luca Cipriano and Jeroen Scheerder were given the challenge, they took an unexpected approach—step one: build the boat...

Deep Dive – Securing AIS

Deep Dive – Securing AIS

Securing AIS AIS (Advanced Identification System) is an incredibly important tool in maritime navigation, allowing ships to transmit their location and data to other vessels and...

Deep Dive – HTTP/2 Rapid Reset Attack

Deep Dive – HTTP/2 Rapid Reset Attack

HTTPS/2 Rapid Reset DDoS method Flooding targeted servers and websites The HTTP/2 Rapid Reset attack is a powerful new DDoS method that exploits weaknesses in the HTTP/2...