Discover
Threat Talks - Your Gateway to Cybersecurity Insights

Threat Talks - Your Gateway to Cybersecurity Insights
Author: Threat Talks
Subscribed: 19Played: 208Subscribe
Share
© Threat Talks
Description
Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats.
We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals.
Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and stay secure!
We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals.
Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and stay secure!
89 Episodes
Reverse
Quantum computing promises unprecedented computational power, but it also threatens the encryption standards we trust today.In this episode of Threat Talks, Jeroen Scheerder from ON2IT delves into post-quantum cryptography and answers key questions:What is Quantum Computing?Why does it challenge RSA and other encryption standards?What is Q-Day, and when will it happen?How can companies prepare for the post-quantum era?🎯 Key Takeaways🛡 Data minimization and post-quantum cryptographic algorithms are essential.📈 Start planning your migration strategy now.🚨 Don’t procrastinate – quantum computing is coming sooner than you think.💻 More Resources: Visit Threat-Talks.com to stay informed on quantum computing and its impact on cybersecurity.📢 Like, Subscribe & Share – Help us spread the word about preparing for the quantum age!=== ► YOUTUBE: https://youtube.com/@ThreatTalks► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520👕 Receive your Threat Talks T-shirthttps://threat-talks.com/post-quantum-threat-to-encryption/🗺️ Explore the Hack's Route in Detail 🗺️https://threat-talks.com/downloads/🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX
🔒 Are endpoint protection solutions enough to safeguard your organization?In this episode of Threat Talks – The Deep Dive, Rob Maas hosts Luca Cipriano, ON2IT’s Cyber Threat Specialist, to uncover the truth.Learn✅ The differences between AVs, EDRs, and XDRs✅ Common bypass techniques used by attackers✅ Why defense-in-depth and Zero Trust are must-haves for any cybersecurity strategy💡 Key InsightsEDRs are essential but not invincibleCombining smart tools with robust security practices is the winning strategy📩 Have questions or thoughts?Reach out at team@threat-talks.com!🎙️ Follow Threat Talks for weekly cybersecurity insights.=== ► YOUTUBE: https://youtube.com/@ThreatTalks► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520👕 Receive your Threat Talks T-shirthttps://threat-talks.com/breaking-the-defenses-edr-bypass/🗺️ Explore the Hack's Route in Detail 🗺️https://threat-talks.com/downloads/🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX
Ever wondered what it’s like to see cybersecurity through a hacker’s eyes? In this episode of Threat Talks, Lieuwe Jan Koning talks with Tom van der Wiele, ethical hacker and founder of Hacker Minded, about how cybercriminals operate and how businesses can defend themselves.
📌 What You’ll Learn:
The psychology and strategies of hackers• How AI enhances attacks and its implications for defenders
Common vulnerabilities organizations overlook
Why Zero Trust is critical for modern security
Building a proactive security culture in your organization
With over two decades of experience, Tom offers unique perspectives on staying one step ahead in the ever-evolving world of cybersecurity.
🎯 Don’t forget to like, share, and subscribe to stay informed on the latest cybersecurity insights. New episodes every Tuesday!
===
► YOUTUBE: https://youtube.com/@ThreatTalks
► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E
► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520
👕 Receive your Threat Talks T-shirt
https://threat-talks.com/inside-the-hackers-mind/
🗺️ Explore the Hack's Route in Detail 🗺️
https://threat-talks.com/downloads/
🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX
Cybersecurity shouldn’t always be about playing defense – it can also be about disrupting attackers before they succeed. In this Deep Dive, host Lieuwe Jan Koning and cybersecurity expert Rick Howard break down the Intrusion Kill Chain and the strategic shift it introduced in the world of cybersecurity. How does the Intrusion Kill Chain flip the script on cyberattacks?The 250 active adversary campaigns that security teams must trackHow MITRE ATT&CK and the Diamond Model strengthen modern defense strategiesWhy global governments and intelligence agencies aren’t doing more to share cyber threat intelligence Despite decades of talk about intelligence sharing, most information is still exchanged manually, often via spreadsheets. As Howard points out, a true global threat-sharing framework could give defenders the upper hand. Don’t miss this deep dive into adversary strategies and what they mean for the future of cybersecurity.👕 Receive your Threat Talks T-shirt via https://threat-talks.com/🗺️ Explore the Hack's Route in Detail 🗺️ via https://threat-talks.com🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX
Salt Typhoon: Inside the Coordinated Breach of Nine Telecom Providers
A sweeping cyberattack, known as Salt Typhoon, has exposed the vulnerabilities of nine major telcos, leaving sensitive communications and surveillance data in the hands of attackers. How did this happen, and what lessons can we learn?
In this Threat Talks Deep Dive, host Lieuwe Jan Koning teams up with ON2IT’s Rob Maas (Field CTO) and Jeroen Scheerder (Security Researcher) to dissect every aspect of this high-profile breach.
🔍 What you’ll learn:
How attackers exploited known vulnerabilities in Exchange servers, VPNs, and firewalls to infiltrate systems.
The risks associated with lawful interception systems and the exposure of call detail records (CDRs).
Why legacy infrastructure remains a significant cybersecurity challenge for telecom providers.
Actionable steps organizations can take to enhance defenses, including segmentation, behavioral monitoring, and Zero Trust frameworks.
This episode dives into the attack’s technical anatomy, discusses its implications for both governments and private organizations, and explores how individuals can secure their communications in an era of increasing surveillance.
Join us to understand how Salt Typhoon unfolded—and what it means for the future of telecom security.
🔔 Follow and Support our channel! 🔔
===
► YOUTUBE: https://youtube.com/@ThreatTalks
► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E
► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520
👕 Receive your Threat Talks T-shirt
https://threat-talks.com/salt-typhoon-how-nine-telcos-were-compromised/
🗺️ Explore the Hack's Route in Detail 🗺️
https://threat-talks.com/downloads/
🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX
ONCD: The Cyber Catalyst with Davis Hake
How can governments lead the charge in global cybersecurity efforts? In this compelling episode of Threat Talks, host Lieuwe Jan Koning sits down with returning guest Davis Hake, cybersecurity expert and advisor, to explore the critical role governments play in the cyber landscape.
👾 The ONCD’s mission and its role in U.S. cybersecurity.
👾 Lessons from the Biden administration’s approach to combating ransomware and cybercrime.
👾 Why global collaboration is key to countering modern threats.
Watch now to uncover how governments and businesses can work together to secure the digital future.
🔔 Follow and Support our channel! 🔔
===
► YOUTUBE: https://youtube.com/@ThreatTalks
► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E
► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520
👕 Receive your Threat Talks T-shirt 👕
https://threat-talks.com/oncd-the-cyber-catalyst/
🗺️ Explore 2024's Hack's Routes in Detail 🗺️
https://threat-talks.com/downloads/
🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX
The State of Cybersecurity in the European Union
Cyber threats know no borders, and in the European Union, harmonizing cybersecurity efforts across 27 member states is no small feat. In this episode of Threat Talks, host Lieuwe Jan Koning speaks with Hans de Vries, Chief Cybersecurity and Operational Officer at ENISA, about the critical work being done to secure Europe’s digital future.
📌 Topics covered
How ENISA supports EU member states in managing cyber incidents and crisis responses.
The implementation of the NIS2 directive and upcoming Cyber Resilience Act.
The role of trust and collaboration in cross-border cybersecurity.
Why public-private partnerships are key to tackling cybersecurity challenges.
🎥 Watch now to explore how Europe is building a safer digital environment for its citizens and businesses.
👉 Don’t forget to like, subscribe, and share to help us spread the word!
2025: The Year of AI and Cybersecurity Evolution
Kick off 2025 with the latest insights from Threat Talks! In this episode, host Lieuwe Jan Koning sits down with Peter van Burgel, CEO of AMS-IX, to discuss how AI and cybersecurity are reshaping the landscape this year.
🚀 What’s inside this episode?
🔹 A sneak peek into AI advancements: Could we see virtual CEOs?
🔹 The rise of Zero Trust supply chain strategies.
🔹 Navigating the skills gap in an evolving digital world.
🔹 AI in cybersecurity: Opportunities, risks, and where to focus.
🔹 Power consumption and sustainability in AI’s rapid growth.
AMS-IX's role as a critical part of internet infrastructure and its cybersecurity responsibilities highlight the importance of collaboration and awareness in today’s complex geopolitical climate.
Follow and Support our channel! 🔔
===
► YOUTUBE: https://youtube.com/@ThreatTalks
► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E
► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520
👕 Receive your Threat Talks T-shirt
https://threat-talks.com/cyber-outlook-2025-one-year-of-threat-talks/
🗺️ Explore all 2024's Hack's in Detail 🗺️
https://threat-talks.com/downloads/
🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX
🎥 Threat Talks - One Year of Insights with Peter van Burgel, CEO of AMS-IX
As 2024 comes to a close, we’re celebrating a year of transformative conversations with a special edition of Threat Talks! Join Lieuwe Jan Koning and Peter van Burgel, CEO of AMS-IX, as they reflect on the past year’s most significant developments in cybersecurity and the lessons learned.
In this Threat Talk, we:
👾 Look back at the major trends and threats of 2024.
👾 Discuss how organizations adapted to an ever-changing security landscape.
👾 Highlight key moments from Threat Talks throughout the year.
Whether you're a cybersecurity enthusiast, a tech professional, or simply curious about how to safeguard the digital future, this episode is packed with insights you won't want to miss!
🔔 Don’t forget to like, subscribe, and hit the notification bell to stay updated with future episodes of Threat Talks.
👉Best way to support the channel: give us a like!
🎧 Available on all major podcast platforms.
► YOUTUBE: https://youtube.com/@ThreatTalks
► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E
► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520
👕 Receive your Threat Talks T-shirt 👕
https://threat-talks.com/2024-the-breaking-point/
🗺️ Explore all 2024's infographics 🗺️
https://threat-talks.com/downloads/
🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX
Imagine the names, job functions, email addresses and phone numbers of police officers, DAs, and even critical key witnesses being hacked and leaked to the public. This isn’t the opening to some spy novel – it’s what actually happened when the Dutch Law Enforcement suffered a serious data breach in September of this year.
Initially reported as a breach ‘only’ involving personal data of 65.000 law enforcement employees, it later became clear that much more data was leaked - and not just data from law enforcement personnel.
In this Deep Dive, host Lieuwe Jan Koning, Security Expert Jeroen Scheerder and Field CTO Rob Maas take an in-depth look at how this breach unfolded, the poor security track record of the software that was used and what the Dutch Law Enforcement could’ve done better when it comes to handling the publicity of a data breach.
👉Best way to support the channel: give us a like!
🎧 Available on all major podcast platforms.
► YOUTUBE: https://youtube.com/@ThreatTalks
► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E
► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520
👕 Receive your Threat Talks T-shirt 👕
https://threat-talks.com/prevent-pay-or-insure/
🗺️ Explore the Hack's Route in Detail 🗺️
https://on2it.s3.us-east-1.amazonaws.com/Threat-Talks-Prevent-Pay-or-Insure.pdf
🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX
🌎 Conti Attack on Costa Rica: When Ransomware Halts a Nation 🌎
What happens when a ransomware group attacks an entire country? In this Threat Talk, we dive deep into the Conti ransomware attack that crippled the Costa Rican government. From healthcare systems shutting down to unpaid government salaries and even tax collection grinding to a halt—this unprecedented cyberattack became a national emergency with global implications.
Join Lieuwe Jan Koning as he unpacks the timeline, impact, and lessons learned from this catastrophic event. Discover the vulnerabilities that allowed this to happen, the strategies used by Conti, and how governments and organizations worldwide can prepare for such sophisticated cyber threats.
💡 What You’ll Learn in This Episode
✔️ The inner workings of the Conti ransomware group
✔️ How critical infrastructure became a target
✔️ The economic and societal ripple effects of a national cyberattack
✔️ Best practices for defending against ransomware threats
🔒 Who Should Watch?
↠ Cybersecurity experts
↠ IT professionals
↠ Government leaders
↠ Business executives
↠ Anyone passionate about protecting digital assets and critical systems
🚀 Don’t miss this in-depth analysis of one of the most talked-about ransomware attacks in recent history! Subscribe now to Threat Talks for more cutting-edge discussions on cybersecurity, threat intelligence, and digital defense strategies.
👉 Support the channel: give us a like!
🎧 Available on all major podcast platforms.
► YOUTUBE: https://youtube.com/@ThreatTalks
► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E
► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520
🎙 Threat Talks: Unpacking the MGM Resorts ALPHV/BlackCat Ransomware Attack 🕵️♂️
In this Threat Talk, we dive deep into a cybersecurity incident in 2023: the MGM Resorts ransomware attack by ALPHV/BlackCat and Scattered Spider. From sophisticated social engineering tactics to deploying a shadow identity provider for persistence, this attack demonstrates the capabilities of collaborating ransomware groups.
Join cybersecurity experts Lieuwe Jan Koning, Luca Cipriano
(Threat Intel Specialist), and Rob Maas (Field CTO) as they break down:
🔒 How attackers exploited MGM’s Okta environment.
🎯 The role of phishing and advanced persistence techniques.
🚨 Lessons learned and actionable steps to prevent such attacks.
Key Insights
➡ Why Zero Trust and network segmentation are critical.
➡ The dilemma of paying ransoms vs. operational downtime.
➡ Practical steps to improve your organization’s ransomware defense strategy.
If you’re a cybersecurity professional or just curious about the latest in cyber threats, this episode is a must-watch. Stay informed, stay secure! 💻
👉 Support the channel: don’t forget to LIKE, COMMENT, and SUBSCRIBE :).
🎧 Available on all major podcast platforms.
► YOUTUBE: https://youtube.com/@ThreatTalks
► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E
► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520
👕 Receive your Threat Talks T-shirt 👕
https://threat-talks.com/prevent-pay-or-insure/
🗺️ Explore the Hack's Route in Detail 🗺️
https://on2it.s3.us-east-1.amazonaws.com/Threat-Talks-Prevent-Pay-or-Insure.pdf
🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX
💰Prevent, Pay or Insure? 💰
Days before MGM’s computer systems were taken down in a cyberattack, fellow casino operator Caesars paid a $15 million ransom to attackers who infiltrated its systems.
MGM chose not to pay and dealt with different costs because of it - did the two casino giants wind up paying similar amounts down the line? And what role does cybersecurity insurance play in these scenarios?
In this episode of Threat Talks, host Lieuwe Jan Koning and special guest David Hake (co-founder of Resilience, professor of Cyber Risk Management at UC Berkeley and advisor at Venable LLP) discuss these cyberattacks on MGM and Caesars, exploring how organizations can better prepare for and respond to ransomware incidents.
Dialing in to the conversation, Threat Intel Specialist Luca Cipriano offers a preview of our Deep Dives into three critical threats relevant to these attacks, providing valuable technical insights.
The by now age-old dilemma remains: should companies pay ransom or refuse? But beyond that, how can they focus on prevention? And where does cybersecurity insurance fit into
the equation?
If businesses insure their personnel, facilities, and revenue, isn’t it time to also insure their cybersecurity?
🔔 Follow and Support our channel! 🔔
===
► YOUTUBE: https://youtube.com/@ThreatTalks
► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E
► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520
👕 Receive your Threat Talks T-shirt 👕 https://threat-talks.com/prevent-pay-or-insure/
🗺️ Explore the Hack's Route in Detail 🗺️https://on2it.s3.us-east-1.amazonaws.com/Threat-Talks-Prevent-Pay-or-Insure.pdf
🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX
"Hello! I'm a Printer! Please Let Me In!"
“Hello! I’m a printer! Please let me enter, thank you!” – It may sound absurd, but this is how attackers can trick your Linux systems through the cups-browsed service..
In this latest Threat Talk, Lieuwe-Jan Koning reveals, with ON2IT’s Rob Maas and Luca Cipriano how a seemingly harmless printer can turn into a hacker’s gateway to your network.
With open ports and weak default configurations, your Linux environment could be more exposed than you think.
🔒 Tune in to learn how these vulnerabilities can be exploited and, more importantly, what steps you can take to secure your systems. Don’t wait until it’s too late!
📊 Bonus Resource: We’ve created an in-depth infographic breaking down these hacks in detailed illustrations—an invaluable tool for all security information professionals!
https://on2it.s3.us-east-1.amazonaws.com/Infographic-security-fallacies.pdf
🔔 Hit that subscribe button and show your support! 🔔
===
► YOUTUBE: https://youtube.com/@ThreatTalks
► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E
► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520
👕 Receive your Threat Talks T-shirt
https://threat-talks.com/breaking-the-illusion-exposing-security-fallacies/
🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX
#CUPS #cybersecurityexperts #printers #threattalks eatTalks #techsafety #securitymatters #threatintelligence #cybersecurityexperts #unix
⏰ How much time would you spend on executing the perfect hack? ⏰
The user going by the name of ‘JIAT75’ spent almost three years infiltrating and contributing to a GitHub repo for one singular reason – access to release manager rights for the next XZ Utils update.
In this episode of Threat Talks, host Lieuwe Jan Koning is joined by Thomas Manolis, Information Security Officer at AMS-IX, and Jeroen Scheerder, Security Specialist at ON2IT, to discuss this meticulously executed breach in the open-source community.
Using clever social engineering tactics, Jia Tan (JIAT75) built a credible reputation within said community, gaining trust and access to introduce malicious code undetected. The breach was only discovered by chance when Andres Freund, an engineer at Microsoft, traced unusual system latency back to XZ Utils and uncovered the backdoor.
What exactly happened?
How lucky did we get with Freund discovering the backdoor? And how do we know that something like this hasn’t happened before?
🔔 Follow to Support our channel! 🔔
► YOUTUBE: https://youtube.com/@ThreatTalks
► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E
► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520
🗾 Explore the XZ Utils Critical Backdoor Details 🗾
https://on2it.s3.us-east-1.amazonaws.com/Infographic-security-fallacies.pdf
Our exclusive infographic maps out the step-by-step tactics hackers use to exploit these vulnerabilities. Perfect for IT teams and Information Security Officers, it’s designed to help you stay one step ahead.
👕 Get your own Threat Talks T-shirt
https://threat-talks.com/breaking-the-illusion-exposing-security-fallacies/
🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX
===
#ThreatTalks #ON2IT #Cybersecurity #Fallacies #CrowdStrike #SecurityMatters
☠️ CrowdStrike: 8.5 million blue screens of death ☠️
Did you know that last July’s CrowdStrike outage led to closed airports, inaccessible bank accounts and hospitals that were only delivering emergency care that did not require any computers?
In this Threat Talk, Lieuwe Jan Koning is joined by Rob Maas and Jeroen Scheerder as they discuss the CrowdStrike outage and, more importantly, what could have been done to prevent such an impactful event from happening in the first place.
What exactly are the inherent risks of automatic updates? And can they be set up in such a way that what happened with CrowdStrike won’t happen again?
🔔 Follow and Support our channel! 🔔
===
► YOUTUBE: https://youtube.com/@ThreatTalks
► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E
► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520
👕 Get your own Threat Talks T-shirt
https://threat-talks.com/breaking-the-illusion-exposing-security-fallacies/
🗾 Explore the CrowdStrike Outage's Details 🗾Our exclusive infographic maps out the step-by-step tactics hackers use to exploit these vulnerabilities. Perfect for IT teams and Information Security Officers, it’s designed to help you stay one step ahead.
https://on2it.s3.us-east-1.amazonaws.com/Infographic-security-fallacies.pdf
🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX
🔍 Breaking the Illusion: Confronting Cybersecurity’s Biggest Fallacies 🔍
Think you know the route a hacker might take? Think
again! In this eye-opening Threat Talk, Lieuwe Jan Koning dives into the critical fallacies of cybersecurity with top experts Fleur van Leusden, CISO and host of CISO Praat, and Jeroen Scheerder.
✨ Fleur unpacks one of the industry’s biggest blind spots: the heavy reliance on user awareness as a defense mechanism. While user education has its place, she argues it’s not enough to withstand today’s sophisticated threats. Instead, Fleur and Jeroen explore the essential need for technical controls and resilient systems that go beyond awareness alone.
🔥 Rethink conventional strategies, dissect the recent CrowdStrike auto-update disaster, the XZ Utils backdoor (CVE-2024-3094), and a UNIX CUPS vulnerability 🖨️—revealing why proactive, layered defenses are the only way forward.
Don’t miss this essential discussion on the true foundations of cybersecurity! 🛠️🔒
===
🗺️ Explore the Hack's Route in Detail 🗺️
Our exclusive infographic maps out the step-by-step tactics hackers. Perfect for IT teams and Information Security Officers.
https://on2it.s3.us-east-1.amazonaws.com/Infographic-security-fallacies.pdf
👕 Receive your Threat Talks T-shirt
https://threat-talks.com/breaking-the-illusion-exposing-security-fallacies/
#ThreatTalks #ON2IT #Cybersecurity #Fallacies #CrowdStrike #UNIXCUPS #XZUtils #SecurityMatters
Imagine creating millions in cryptocurrency…without spending a cent. 💸
🔍 Explore the Binance BNB Chain Attack, where attackers used cross-chain bridges to create crypto assets out of thin air.
👾 Dive into the exploit’s details, from blockchain’s cryptographic structures to vulnerabilities in cross-chain transfers. With breakdowns of Merkle trees and validation flaws, this discussion reveals how even minor misconfigurations can lead to massive security gaps.
🔍 Curious about blockchain risks and crypto asset security? Want to gain insight into safeguarding assets in a digital-first world? >> Check this episode!
===
📈 Download the infographic
https://on2it.s3.amazonaws.com/Infographic-breaking-the-bank.pdf
👕 Request your own Threat Talks T-shirt
https://threat-talks.com/breaking-the-bank/
🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX.
𝐄𝐯𝐞𝐫 𝐛𝐞𝐞𝐧 𝐚𝐬𝐤𝐞𝐝 𝐭𝐨 𝐡𝐚𝐜𝐤 𝐚 𝐛𝐨𝐚𝐭?
When Luca Cipriano and Jeroen Scheerder were given the challenge, they took an unexpected approach—step one: build the boat themselves.
It was a scale model, but they made sure it closely mirrored a real boat’s systems. With help from Damen Shipyards engineers, they even included a working ballast system.
Of course the next step was to hack said ballast system.
In this Threat Talks episode, Lieuwe Jan Koning chats with Luca and Jeroen about building the boat, why they did it, the fun they had along the way and whether or not their plan worked. They also dive into how they hacked the ballast system and how such an attack could’ve been prevented.
𝐃𝐨𝐧’𝐭 𝐦𝐢𝐬𝐬 𝐨𝐮𝐭!
🔔 𝘚𝘶𝘣𝘴𝘤𝘳𝘪𝘣𝘦 🔔 and stay tuned for fascinating deep dives into the world of cybersecurity.
===
-- 🌎 -- threat-talks.com
-- 📈 -- Threat Talks infographics
-- 👕 -- Receive your own Threat Talks T-shirt
🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX
AIS (Advanced Identification System) is a key tool in maritime navigation.
It helps ships transmit their location and data to other vessels and satellites, preventing collisions and supporting rescue operations. 🛟
It’s a crucial technology for navigating 🗺️ the unpredictable oceans 🌊 —but it’s not without its vulnerabilities.
🏴☠️ Pirates can use AIS to track high-value ships, and hackers can manipulate the system. Picture this: your ship is safely docked, but hackers make it appear as if it’s entering dangerous, hostile waters. This tactic, known as spoofing, doesn’t just mess with a ship’s navigation—it can send out false reports to military or civilian observers, creating chaos and confusion.
Just imagine the stakes in a situation with rising military tension – if it suddenly seems like your warships are showing up in enemy harbors, the risk of conflict skyrockets, to say the least. 🔥
In this Deep Dive, host Lieuwe Jan Koning, along with guests Rob Maas and Jeroen Scheerder, explore the potential dangers of AIS hacking and what steps can be taken to make this vital system more secure and trustworthy for the future.
===
📈 Find our infographics and 👕 receive your own Threat Talks T-shirt: https://threat-talks.com
🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX