Podchaser Logo
Home
Threat Talks - Your Gateway to Cybersecurity Insights

Threat Talks

Threat Talks - Your Gateway to Cybersecurity Insights

A weekly News and Tech News podcast
Good podcast? Give it some love!
Threat Talks - Your Gateway to Cybersecurity Insights

Threat Talks

Threat Talks - Your Gateway to Cybersecurity Insights

Episodes
Threat Talks - Your Gateway to Cybersecurity Insights

Threat Talks

Threat Talks - Your Gateway to Cybersecurity Insights

A weekly News and Tech News podcast
Good podcast? Give it some love!
Rate Podcast

Episodes of Threat Talks

Mark All
Search Episodes...
Join host Lieuwe Jan Koning as he interviews John Kindervag, creator of Zero Trust, at the RSA conference. Explore the origins, principles, and impact of Zero Trust on modern cybersecurity. Download the NSTAC report discussed in the episode h
CVE-2024-1709 is a critical vulnerability in ScreenConnect that has been exploited in multiple healthcare-related breaches, highlighting significant security risks.Explore the Change Healthcare attack caused by compromised Citrix credentials a
How did Ireland's largest healthcare network, HSE, fall victim to a crippling ransomware attack? What security flaws were exploited, and how can you prevent similar threats? Join us in this Deep Dive of Threat Talks as we uncover the details
Discover the vulnerabilities of the DICOM protocol in healthcare and the significant risks it poses, including data breaches and manipulation. This deep dive covers practical solutions for protecting sensitive patient information and enhancing
In this episode of Threat Talks, we examine major cybersecurity risks in healthcare.We discuss how old systems like DICOM, still widely used, can lead to serious cyberattacks. How do recent breaches and outdated protocols threaten patient priv
Tune into this special episode of Threat Talks, as we dissect the critical CVE 2024 3400 vulnerability in Palo Alto Networks' GlobalProtect servers. Join our cybersecurity experts for a deep dive into the vulnerability's implications, our resp
Understanding Reflection Attacks: A Simple Yet Powerful DOS Method.👕 Request your own Threat Talks T'shirt: https://threat-talks.com/cant-deny-ddos-in-2024/Distributed Denial of Service (DDoS) Attacks ExplainedPicture this: a DDOS attack
Dive into the largest data breach of 2023, a devastating supply chain attack involving the MOVEit software, which impacted over 60 million individuals. Learn how the Klo Ransomware Group exploited a zero-day vulnerability through SQL injection
Join us for a deep dive episode of Threat Talks, focusing on Log4j, the critical logging library at the heart of Java development. Discover Log4j's flexibility in message configuration and how it enhances Java programming. Perfect for those lo
The SolarWinds incident, affecting 18,000 high-profile environments, including the US government and Fortune 500 companies, was attributed to the state-sponsored group Fancy Bear. This breach demonstrated the complexity and reach of supply cha
In this episode of Threat Talks, we explore the covert perils of supply chain attacks. Matthijs Zwart, CIO and CISO at Vitens, acknowledges the risk landscape surrounding supply chain attacks, but also suggests that the occasional incident can
This Threat Talks - deep dive - focuses on a recent SQL injection attack targeting Ivanti EPM software, a powerful endpoint management solution. Lieuwe Jan Koning, Luca Cipriano and Rob Maas explore the attack's mechanics, its implications for
In this deep dive of Threat Talks, we delve into the intricate realm of cybersecurity, spotlighting a newly uncovered vulnerability within Google's OAuth authentication system. Uncover a hidden feature in the Google multi-login API causing sig
Fancy Bear, also known by the Russian actor designation APT28, has been implicated in cyber attacks targeting Microsoft Outlook and other platforms, utilizing CVEs to exploit systems. This group, associated with Russian military intelligence,
Learn about AI-generated phishing attacks, the strengths and weaknesses of multi-factor authentication (MFA), and real-world cyber attack cases. Discover the balance between security and usability, the importance of user education, and the fut
Step into the digital fortress with our latest podcast episode on the FortiOS SSLVPN buffer overflow vulnerability. Our cybersecurity experts break down the complexities of this critical threat and guide you through robust protection strategies
We take a deep dive into TunnelCrack Cybersecurity Risk, an advanced attack that exploits VPN vulnerabilities. Discover the strategies attackers use, from evil twin attacks at your favorite café to sophisticated DNS manipulations. More importa
Delve deeper into cybersecurity's critical aspects with our thorough examination of the Citrix Netscaler Zero Day vulnerability. This analysis covers the vulnerability's technical nuances, highlighting its capacity for remote code execution an
Navigating the complexities of remote work and its security challenges? In this episode of Threat Talks, we delve deep into the pressing issues surrounding remote access and the vulnerabilities that come with it. Deep Dive into Citrix Netscale
This episode features Lieuwe Jan Koning and Luca Cipriano discussing the Mirai botnet, which has infected over 600,000 devices and disrupted major services worldwide. They explain its operations, impact, and the role of IoT devices, also coveri
DDoS attacks are becoming increasingly more frequent, and there doesn’t appear to be any signs of slowing down.If you’re looking for insights into the types of DDoS attacks that are being used, expert opinions on the best prevention and remed
Threat Talks was born from a collaboration between ON2IT, a global leader in Zero Trust cybersecurity, and AMS-IX, one of the world’s largest internet exchange providers. Leveraging our combined expertise and extensive networks, we offer a uni
Rate

Join Podchaser to...

  • Rate podcasts and episodes
  • Follow podcasts and creators
  • Create podcast and episode lists
  • & much more

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features