Threat Talks
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
Deep Dives
Threat Talks on Tour: DDoS Mitigations
Threat Talks on Tour: DDoS Mitigations Ever wondered why DDoS attacks aren't making headlines anymore? Is it because they've vanished, or are we simply better at defending...
Deep Dive – Vultur, Android Malware
Listen to Threat TalksYour cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO ON2IT GroupLuca Cipriano Threat Intel Specialist ON2ITRob Maas Field CTO ON2ITVultur Android...
Deep Dive – Bangladesh Bank SWIFT attack
Find Threat Talks on:Your cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO ON2IT GroupLuca Cipriano Threat Intel Specialist ON2ITRob Maas Field CTO ON2ITBangladesh Bank:...
Deep Dive – ScreenConnect: Authentication Bypass (CVE-2024-1709)
Find Threat Talks on:Your cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO ON2IT GroupLuca Cipriano Threat Intel Specialist ON2ITRob Maas Field CTO ON2ITScreenConnect:...
Deep Dive – Ireland’s HSE Ransomware Attack
Listen to The Threat Talks on:Your cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO ON2IT GroupLuca Cipriano Threat Intel Specialist ON2ITRob Maas Field CTO...
Deep Dive – DICOM: The hidden risks of Legacy Protocols
Listen to The Threat Talks on:Your cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO ON2IT GroupJan van Boesschoten Innovation Manager at AMS-IXSina Yazdanmehr Founder...
Deep Dive – The most simple DDoS attack: Reflection attack
Listen to Threat Talks onYour cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO ON2IT GroupLuca Cipriano Threat Intel Specialist ON2ITRob Maas Field CTO ON2ITReflection...
Deep Dive – MOVEit: The danger of delegating data to third-party software
Listen to The Threat Talks on:Your cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO ON2IT GroupLuca Cipriano Threat Intel Specialist ON2ITRob Maas Field CTO ON2ITMOVEit:...
Deep Dive – Log4j: The danger of software dependencies
Listen to The Threat Talks on:Your cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO ON2IT GroupLuca Cipriano Threat Intel Specialist ON2ITRob Maas Field CTO ON2ITLog4j:...
Deep Dive – SolarWinds: The danger of third-party software
Listen to The Threat Talks on:Your cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO ON2IT GroupLuca Cipriano Threat Intel Specialist ON2ITRob Maas Field CTO...
Deep Dive – Ivanti EPM
Your cybersecurity expertsLieuwe Jan Koning Co-Founder ana CTO, ON2IT GroupLuca Cipriano Threat Intel Specialist, ON2ITRob Maas Field CTO, ON2ITIvanti EPM - SQL injection attack...
Deep Dive – Google OAuth bypass
Your cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO, ON2ITLuca Cipriano Threat Intel Specialist, ON2ITRob Maas Field CTO, ON2ITGoogle OAuth Bypass A vulnerability in...