<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/rss+xml" href="https://feeds.transistor.fm/threat-talks-your-gateway-to-cybersecurity-insights" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>Threat Talks - Your Gateway to Cybersecurity Insights</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/threat-talks-your-gateway-to-cybersecurity-insights</itunes:new-feed-url>
    <description>Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats.
 
We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals. 
 

Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and stay secure!</description>
    <copyright>Threat Talks</copyright>
    <podcast:guid>c5b8581f-606c-5c2f-907e-d87635f54d96</podcast:guid>
    <podcast:locked>yes</podcast:locked>
    <podcast:trailer pubdate="Sun, 14 Jan 2024 10:21:55 -0100" url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/4c94d505/ade5ad03.mp3" length="16798164" type="audio/mpeg" season="1">Threat Talks - Coming soon - Introduction</podcast:trailer>
    <language>en</language>
    <pubDate>Tue, 14 Apr 2026 07:00:07 +0000</pubDate>
    <lastBuildDate>Tue, 14 Apr 2026 07:02:50 +0000</lastBuildDate>
    <link>https://threat-talks.com/</link>
    <image>
      <url>https://img.transistorcdn.com/wqPeh6mA2wCORVwUDSv8RSIWcuUMzTZP0kjjqamexmc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xN2Q1/NGE1NjBhYWY0ZmY5/NzEyODA5OGU3NDdi/MmNmYi5qcGc.jpg</url>
      <title>Threat Talks - Your Gateway to Cybersecurity Insights</title>
      <link>https://threat-talks.com/</link>
    </image>
    <itunes:category text="News">
      <itunes:category text="Tech News"/>
    </itunes:category>
    <itunes:type>episodic</itunes:type>
    <itunes:author>Threat Talks</itunes:author>
    <itunes:image href="https://img.transistorcdn.com/wqPeh6mA2wCORVwUDSv8RSIWcuUMzTZP0kjjqamexmc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xN2Q1/NGE1NjBhYWY0ZmY5/NzEyODA5OGU3NDdi/MmNmYi5qcGc.jpg"/>
    <itunes:summary>Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats.
 
We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals. 
 

Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and stay secure!</itunes:summary>
    <itunes:subtitle>Threat Talks is your cybersecurity knowledge hub.</itunes:subtitle>
    <itunes:keywords></itunes:keywords>
    <itunes:owner>
      <itunes:name>Threat Talks</itunes:name>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>The EU is forcing the conversation</title>
      <itunes:title>The EU is forcing the conversation</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9af2294b-2f1a-46ec-ad90-76940b0b5add</guid>
      <link>https://threat-talks.com/the-eu-is-forcing-the-conversation/</link>
      <description>
        <![CDATA[<p>We always worried about lock-in. </p><p>But the real risk is getting locked out – of your cloud.</p><p>Your data may sit in Europe.</p><p>Your systems may run on trusted platforms.</p><p>But if access is restricted tomorrow – by a provider, a government, or a legal decision - what actually happens?</p><p><br>Can you still operate?</p><p>In this episode of <em>Threat Talks</em>, Lieuwe Jan Koning (co-founder and CTO at ON2IT Cybersecurity) speaks with Lokke Moerel <em>(Professor of Global ICT Law at Tilburg University and leading expert in EU cybersecurity regulation)</em> to break down what data sovereignty really means- beyond the illusion of control.</p><p>Because sovereignty doesn’t fail where you think it does.</p><p>It breaks in four places:</p><ul><li><strong>Storage</strong> - where your data lives</li><li><strong>Access</strong> - who can reach it (and revoke it)</li><li><strong>Operations</strong> - whether you can keep running without your provider</li><li><strong>Jurisdiction</strong> - which laws override your control</li></ul><p>Most organizations only solve the first - and that’s where the real risk starts: dependency on providers you don’t control.</p><p>As cloud and AI deepen that dependency, the question isn’t where your data sits, but who decides what happens to it tomorrow.</p><p>From sovereign cloud initiatives to European AI models like GPT-NL, this episode explores how regions are trying to regain control, and why relying entirely on big tech may not be sustainable.</p><p><strong> </strong></p><p><strong>Key Topics Covered</strong></p><ul><li>What data sovereignty really means beyond data location </li><li>How dependency on cloud providers impacts AI data governance </li><li>Why jurisdiction, access, and control matter more than compliance </li><li>What organizations must do to regain control over data and infrastructure</li></ul><p><strong>Resources</strong></p><ul><li>Threat Talks: https://threat-talks.com/ </li><li>ON2IT (Zero Trust as a Service): https://on2it.net/ </li><li>AMS-IX: <a href="https://www.ams-ix.net/ams">https://www.ams-ix.net/ams</a>    </li></ul><p>Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.</p><p> </p><p>🔔 Follow and Support our channel! 🔔</p><p><br> === </p><p><br>► YOUTUBE:    / @threattalks  </p><p>► SPOTIFY: https://open.spotify.com/show/1SXUyUE...</p><p>► APPLE: https://podcasts.apple.com/us/podcast...</p><p> </p><p>👕 Receive your Threat Talks T-shirt</p><p>https://threat-talks.com/</p><p> </p><p>🗺️ Explore the Hack's Route in Detail 🗺️</p><p>https://threat-talks.com</p><p> </p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>We always worried about lock-in. </p><p>But the real risk is getting locked out – of your cloud.</p><p>Your data may sit in Europe.</p><p>Your systems may run on trusted platforms.</p><p>But if access is restricted tomorrow – by a provider, a government, or a legal decision - what actually happens?</p><p><br>Can you still operate?</p><p>In this episode of <em>Threat Talks</em>, Lieuwe Jan Koning (co-founder and CTO at ON2IT Cybersecurity) speaks with Lokke Moerel <em>(Professor of Global ICT Law at Tilburg University and leading expert in EU cybersecurity regulation)</em> to break down what data sovereignty really means- beyond the illusion of control.</p><p>Because sovereignty doesn’t fail where you think it does.</p><p>It breaks in four places:</p><ul><li><strong>Storage</strong> - where your data lives</li><li><strong>Access</strong> - who can reach it (and revoke it)</li><li><strong>Operations</strong> - whether you can keep running without your provider</li><li><strong>Jurisdiction</strong> - which laws override your control</li></ul><p>Most organizations only solve the first - and that’s where the real risk starts: dependency on providers you don’t control.</p><p>As cloud and AI deepen that dependency, the question isn’t where your data sits, but who decides what happens to it tomorrow.</p><p>From sovereign cloud initiatives to European AI models like GPT-NL, this episode explores how regions are trying to regain control, and why relying entirely on big tech may not be sustainable.</p><p><strong> </strong></p><p><strong>Key Topics Covered</strong></p><ul><li>What data sovereignty really means beyond data location </li><li>How dependency on cloud providers impacts AI data governance </li><li>Why jurisdiction, access, and control matter more than compliance </li><li>What organizations must do to regain control over data and infrastructure</li></ul><p><strong>Resources</strong></p><ul><li>Threat Talks: https://threat-talks.com/ </li><li>ON2IT (Zero Trust as a Service): https://on2it.net/ </li><li>AMS-IX: <a href="https://www.ams-ix.net/ams">https://www.ams-ix.net/ams</a>    </li></ul><p>Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.</p><p> </p><p>🔔 Follow and Support our channel! 🔔</p><p><br> === </p><p><br>► YOUTUBE:    / @threattalks  </p><p>► SPOTIFY: https://open.spotify.com/show/1SXUyUE...</p><p>► APPLE: https://podcasts.apple.com/us/podcast...</p><p> </p><p>👕 Receive your Threat Talks T-shirt</p><p>https://threat-talks.com/</p><p> </p><p>🗺️ Explore the Hack's Route in Detail 🗺️</p><p>https://threat-talks.com</p><p> </p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Tue, 14 Apr 2026 07:00:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/e9280f5f/fdfff862.mp3" length="81029037" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/JYBs3JzqEJ4cMvbd6i3JsilR3T2jE66g8-FR4h0iofQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kMzA5/NTg5ZmY3M2E5ZWE2/MzdlNzc5MjczMmMy/NDA5ZC5wbmc.jpg"/>
      <itunes:duration>2024</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>We always worried about lock-in. </p><p>But the real risk is getting locked out – of your cloud.</p><p>Your data may sit in Europe.</p><p>Your systems may run on trusted platforms.</p><p>But if access is restricted tomorrow – by a provider, a government, or a legal decision - what actually happens?</p><p><br>Can you still operate?</p><p>In this episode of <em>Threat Talks</em>, Lieuwe Jan Koning (co-founder and CTO at ON2IT Cybersecurity) speaks with Lokke Moerel <em>(Professor of Global ICT Law at Tilburg University and leading expert in EU cybersecurity regulation)</em> to break down what data sovereignty really means- beyond the illusion of control.</p><p>Because sovereignty doesn’t fail where you think it does.</p><p>It breaks in four places:</p><ul><li><strong>Storage</strong> - where your data lives</li><li><strong>Access</strong> - who can reach it (and revoke it)</li><li><strong>Operations</strong> - whether you can keep running without your provider</li><li><strong>Jurisdiction</strong> - which laws override your control</li></ul><p>Most organizations only solve the first - and that’s where the real risk starts: dependency on providers you don’t control.</p><p>As cloud and AI deepen that dependency, the question isn’t where your data sits, but who decides what happens to it tomorrow.</p><p>From sovereign cloud initiatives to European AI models like GPT-NL, this episode explores how regions are trying to regain control, and why relying entirely on big tech may not be sustainable.</p><p><strong> </strong></p><p><strong>Key Topics Covered</strong></p><ul><li>What data sovereignty really means beyond data location </li><li>How dependency on cloud providers impacts AI data governance </li><li>Why jurisdiction, access, and control matter more than compliance </li><li>What organizations must do to regain control over data and infrastructure</li></ul><p><strong>Resources</strong></p><ul><li>Threat Talks: https://threat-talks.com/ </li><li>ON2IT (Zero Trust as a Service): https://on2it.net/ </li><li>AMS-IX: <a href="https://www.ams-ix.net/ams">https://www.ams-ix.net/ams</a>    </li></ul><p>Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.</p><p> </p><p>🔔 Follow and Support our channel! 🔔</p><p><br> === </p><p><br>► YOUTUBE:    / @threattalks  </p><p>► SPOTIFY: https://open.spotify.com/show/1SXUyUE...</p><p>► APPLE: https://podcasts.apple.com/us/podcast...</p><p> </p><p>👕 Receive your Threat Talks T-shirt</p><p>https://threat-talks.com/</p><p> </p><p>🗺️ Explore the Hack's Route in Detail 🗺️</p><p>https://threat-talks.com</p><p> </p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </itunes:summary>
      <itunes:keywords>data sovereignty, AI data governance, cloud data sovereignty, digital sovereignty EU, cloud security risk, data sovereignty Europe, AI governance strategy, sovereign cloud, cloud dependency risk, US Cloud Act, jurisdictional sovereignty, operational sovereignty, Lokke Moerel</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e9280f5f/transcript.srt" type="application/x-subrip" rel="captions"/>
      <podcast:chapters url="https://share.transistor.fm/s/e9280f5f/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Europe vs China vs US: Who Controls Your Tech?</title>
      <itunes:title>Europe vs China vs US: Who Controls Your Tech?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">bebe1e05-5718-44bd-b81b-2f5dfb7c46a8</guid>
      <link>https://threat-talks.com/europe-vs-china-vs-us-who-controls-your-tech/</link>
      <description>
        <![CDATA[<p>You don’t control the technology your business runs on.</p><p>That’s an uncomfortable reality.</p><p> </p><p>But the truth is: your infrastructure runs on foreign technology.<br>Your data depends on external suppliers.</p><p>And if they fail – you feel it.</p><p><br>The EU has decided to step in. </p><p> <br>In this episode of <strong>Threat Talks</strong>, Lokke Moerel (Professor of Global ICT Law at Tilburg University and leading expert in EU cybersecurity regulation) breaks down how Europe’s new cybersecurity package is reshaping supply chain security.</p><p> </p><p>Because this is not just about audits.</p><p> </p><p>From Chinese components embedded in infrastructure to US-controlled cloud services, organizations are relying on suppliers that sit outside their control. And that creates a different kind of risk. Not just technical – but strategic.<br> <br>The EU is now responding with a structural shift:</p><ul><li>One certification approach across Europe </li><li>Clearer rules for suppliers in critical functions </li><li>Separation of technical security and geopolitical risk </li></ul><p>This changes how supply chain security works.</p><p>For CISOs and security leaders, the message is clear:<br>If your cybersecurity risk mitigation strategies don’t account for dependency on external suppliers, you’re exposed.</p><p><strong> </strong></p><p><strong>Timestamps</strong></p><p>00:00 – Your Vendor Passed the Audit—Why You’re Still Exposed<br>01:32 – The EU Cybersecurity Landscape: What’s Changing Now<br>04:06 – The Supply Chain Problem: Why Current Cybersecurity Risk Mitigation Strategies Fail<br>08:39 – What This Means: New Rules for Critical Suppliers and Infrastructure<br>17:13 – What Organizations Must Do Now to Strengthen Cybersecurity Risk Mitigation Strategies<br>20:34 – Geopolitics vs Security: Will Certain Suppliers Be Restricted?<br>25:07 – Innovation vs Regulation: Are We Heading for a Two-Speed Market?<br>28:36 – Practical Next Steps: How to Prepare Your Supply Chain Today<br>29:27 – Key Takeaways and Final Thoughts</p><p> </p><p><strong>Key Topics Covered</strong></p><ul><li>Why dependency on China and the US creates new supply chain risk </li><li>How the EU cybersecurity package reshapes supplier accountability </li><li>Why security and geopolitics are now treated separately </li><li>What organizations must do to strengthen cybersecurity risk mitigation strategies</li></ul><p><strong>Resources</strong></p><ul><li>Threat Talks: https://threat-talks.com/ </li><li>ON2IT (Zero Trust as a Service): https://on2it.net/ </li><li>AMS-IX: <a href="https://www.ams-ix.net/ams">https://www.ams-ix.net/ams</a></li><li>Threat Talks episode Bart Groothuis: <a href="https://www.youtube.com/watch?v=Vj5Z7RYMACY">https://www.youtube.com/watch?v=Vj5Z7RYMACY</a> </li><li>EU Cybersecurity package: <a href="https://ec.europa.eu/commission/presscorner/detail/en/ip_26_105">https://ec.europa.eu/commission/presscorner/detail/en/ip_26_105</a>    </li></ul><p><br>Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.</p><p> </p><p>🔔 Follow and Support our channel! 🔔</p><p><br> === </p><p><br>► YOUTUBE:    / @threattalks  </p><p>► SPOTIFY: https://open.spotify.com/show/1SXUyUE...</p><p>► APPLE: https://podcasts.apple.com/us/podcast...</p><p> </p><p>👕 Receive your Threat Talks T-shirt</p><p>https://threat-talks.com/</p><p> </p><p>🗺️ Explore the Hack's Route in Detail 🗺️</p><p>https://threat-talks.com</p><p> </p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>You don’t control the technology your business runs on.</p><p>That’s an uncomfortable reality.</p><p> </p><p>But the truth is: your infrastructure runs on foreign technology.<br>Your data depends on external suppliers.</p><p>And if they fail – you feel it.</p><p><br>The EU has decided to step in. </p><p> <br>In this episode of <strong>Threat Talks</strong>, Lokke Moerel (Professor of Global ICT Law at Tilburg University and leading expert in EU cybersecurity regulation) breaks down how Europe’s new cybersecurity package is reshaping supply chain security.</p><p> </p><p>Because this is not just about audits.</p><p> </p><p>From Chinese components embedded in infrastructure to US-controlled cloud services, organizations are relying on suppliers that sit outside their control. And that creates a different kind of risk. Not just technical – but strategic.<br> <br>The EU is now responding with a structural shift:</p><ul><li>One certification approach across Europe </li><li>Clearer rules for suppliers in critical functions </li><li>Separation of technical security and geopolitical risk </li></ul><p>This changes how supply chain security works.</p><p>For CISOs and security leaders, the message is clear:<br>If your cybersecurity risk mitigation strategies don’t account for dependency on external suppliers, you’re exposed.</p><p><strong> </strong></p><p><strong>Timestamps</strong></p><p>00:00 – Your Vendor Passed the Audit—Why You’re Still Exposed<br>01:32 – The EU Cybersecurity Landscape: What’s Changing Now<br>04:06 – The Supply Chain Problem: Why Current Cybersecurity Risk Mitigation Strategies Fail<br>08:39 – What This Means: New Rules for Critical Suppliers and Infrastructure<br>17:13 – What Organizations Must Do Now to Strengthen Cybersecurity Risk Mitigation Strategies<br>20:34 – Geopolitics vs Security: Will Certain Suppliers Be Restricted?<br>25:07 – Innovation vs Regulation: Are We Heading for a Two-Speed Market?<br>28:36 – Practical Next Steps: How to Prepare Your Supply Chain Today<br>29:27 – Key Takeaways and Final Thoughts</p><p> </p><p><strong>Key Topics Covered</strong></p><ul><li>Why dependency on China and the US creates new supply chain risk </li><li>How the EU cybersecurity package reshapes supplier accountability </li><li>Why security and geopolitics are now treated separately </li><li>What organizations must do to strengthen cybersecurity risk mitigation strategies</li></ul><p><strong>Resources</strong></p><ul><li>Threat Talks: https://threat-talks.com/ </li><li>ON2IT (Zero Trust as a Service): https://on2it.net/ </li><li>AMS-IX: <a href="https://www.ams-ix.net/ams">https://www.ams-ix.net/ams</a></li><li>Threat Talks episode Bart Groothuis: <a href="https://www.youtube.com/watch?v=Vj5Z7RYMACY">https://www.youtube.com/watch?v=Vj5Z7RYMACY</a> </li><li>EU Cybersecurity package: <a href="https://ec.europa.eu/commission/presscorner/detail/en/ip_26_105">https://ec.europa.eu/commission/presscorner/detail/en/ip_26_105</a>    </li></ul><p><br>Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.</p><p> </p><p>🔔 Follow and Support our channel! 🔔</p><p><br> === </p><p><br>► YOUTUBE:    / @threattalks  </p><p>► SPOTIFY: https://open.spotify.com/show/1SXUyUE...</p><p>► APPLE: https://podcasts.apple.com/us/podcast...</p><p> </p><p>👕 Receive your Threat Talks T-shirt</p><p>https://threat-talks.com/</p><p> </p><p>🗺️ Explore the Hack's Route in Detail 🗺️</p><p>https://threat-talks.com</p><p> </p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Tue, 07 Apr 2026 08:00:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/5ce59dee/8d89c380.mp3" length="79267200" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/IXslCnI3HPrZF_rwtulsPtP2p2dtVIxArUD5CtnM4Y8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82YWVi/NmFiMjRkMmU3MTIw/NjZmZmRkMzg1ZDY5/NDAxYS5wbmc.jpg"/>
      <itunes:duration>1982</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>You don’t control the technology your business runs on.</p><p>That’s an uncomfortable reality.</p><p> </p><p>But the truth is: your infrastructure runs on foreign technology.<br>Your data depends on external suppliers.</p><p>And if they fail – you feel it.</p><p><br>The EU has decided to step in. </p><p> <br>In this episode of <strong>Threat Talks</strong>, Lokke Moerel (Professor of Global ICT Law at Tilburg University and leading expert in EU cybersecurity regulation) breaks down how Europe’s new cybersecurity package is reshaping supply chain security.</p><p> </p><p>Because this is not just about audits.</p><p> </p><p>From Chinese components embedded in infrastructure to US-controlled cloud services, organizations are relying on suppliers that sit outside their control. And that creates a different kind of risk. Not just technical – but strategic.<br> <br>The EU is now responding with a structural shift:</p><ul><li>One certification approach across Europe </li><li>Clearer rules for suppliers in critical functions </li><li>Separation of technical security and geopolitical risk </li></ul><p>This changes how supply chain security works.</p><p>For CISOs and security leaders, the message is clear:<br>If your cybersecurity risk mitigation strategies don’t account for dependency on external suppliers, you’re exposed.</p><p><strong> </strong></p><p><strong>Timestamps</strong></p><p>00:00 – Your Vendor Passed the Audit—Why You’re Still Exposed<br>01:32 – The EU Cybersecurity Landscape: What’s Changing Now<br>04:06 – The Supply Chain Problem: Why Current Cybersecurity Risk Mitigation Strategies Fail<br>08:39 – What This Means: New Rules for Critical Suppliers and Infrastructure<br>17:13 – What Organizations Must Do Now to Strengthen Cybersecurity Risk Mitigation Strategies<br>20:34 – Geopolitics vs Security: Will Certain Suppliers Be Restricted?<br>25:07 – Innovation vs Regulation: Are We Heading for a Two-Speed Market?<br>28:36 – Practical Next Steps: How to Prepare Your Supply Chain Today<br>29:27 – Key Takeaways and Final Thoughts</p><p> </p><p><strong>Key Topics Covered</strong></p><ul><li>Why dependency on China and the US creates new supply chain risk </li><li>How the EU cybersecurity package reshapes supplier accountability </li><li>Why security and geopolitics are now treated separately </li><li>What organizations must do to strengthen cybersecurity risk mitigation strategies</li></ul><p><strong>Resources</strong></p><ul><li>Threat Talks: https://threat-talks.com/ </li><li>ON2IT (Zero Trust as a Service): https://on2it.net/ </li><li>AMS-IX: <a href="https://www.ams-ix.net/ams">https://www.ams-ix.net/ams</a></li><li>Threat Talks episode Bart Groothuis: <a href="https://www.youtube.com/watch?v=Vj5Z7RYMACY">https://www.youtube.com/watch?v=Vj5Z7RYMACY</a> </li><li>EU Cybersecurity package: <a href="https://ec.europa.eu/commission/presscorner/detail/en/ip_26_105">https://ec.europa.eu/commission/presscorner/detail/en/ip_26_105</a>    </li></ul><p><br>Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.</p><p> </p><p>🔔 Follow and Support our channel! 🔔</p><p><br> === </p><p><br>► YOUTUBE:    / @threattalks  </p><p>► SPOTIFY: https://open.spotify.com/show/1SXUyUE...</p><p>► APPLE: https://podcasts.apple.com/us/podcast...</p><p> </p><p>👕 Receive your Threat Talks T-shirt</p><p>https://threat-talks.com/</p><p> </p><p>🗺️ Explore the Hack's Route in Detail 🗺️</p><p>https://threat-talks.com</p><p> </p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/5ce59dee/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Breached OT Kills. Zero Trust 2.0 Doesn’t</title>
      <itunes:title>Breached OT Kills. Zero Trust 2.0 Doesn’t</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b648d92f-381a-4b7e-b3b9-99af93a06dce</guid>
      <link>https://threat-talks.com/breached-ot-kills-zero-trust-2-9-doesnt/</link>
      <description>
        <![CDATA[<p>Not long ago, OT environments were isolated islands.</p><p>Control systems ran independently, accessible only through dedicated workstations requiring physical presence. The factory floor and the IT department might as well have been on different planets.</p><p> </p><p>That world is gone. </p><p> </p><p>Today’s OT environments are connected. Remote access from IT workspaces to control systems is routine. </p><p> </p><p>And this is just the start. </p><p>And it changes everything about how to secure them.</p><p>In this episode of Threat Talks, Lieuwe Jan Koning and Rob Maas break down what happens when OT vs IT security models collide – and why IT/OT convergence is forcing organizations to rethink how they protect industrial environments.</p><p>Patching is difficult, availability is critical, and legacy models like the Purdue model leave gaps attackers can move through.</p><p>So, what does work?<br>Zero Trust.</p><p><br>If your organization relies on industrial systems, this is the shift you need to understand.</p><p> </p><p><strong>Timestamps</strong></p><p>00:00 – OT vs IT Security Introduction and Key Differences</p><p>00:57 – IT OT Convergence Is Changing OT Security</p><p>04:49 – What OT vs IT Security Looks Like in Practice</p><p>10:13 – Why IT and OT Teams Struggle to Communicate</p><p>12:18 – How Zero Trust Applies to OT Environments</p><p>14:21 – How to Secure OT with Zero Trust and IT OT Convergence</p><p> </p><p><strong>Key Topics Covered</strong></p><ul><li>How OT vs IT security requires a different approach in practice</li><li>Why IT OT convergence is increasing risk across factory environments</li><li>How limitations like patching and availability shape OT security decisions</li><li>How Zero Trust segmentation can reduce risk without disrupting operations</li></ul><p><strong>Resources</strong></p><ul><li>Threat Talks: https://threat-talks.com/ </li><li>ON2IT (Zero Trust as a Service): https://on2it.net/ </li><li>AMS-IX: <a href="https://www.ams-ix.net/ams">https://www.ams-ix.net/ams</a></li><li>Threat Talks episode on Hack the Boat: <a href="https://www.youtube.com/watch?v=Xa0TJ3eRTCw">https://www.youtube.com/watch?v=Xa0TJ3eRTCw</a></li><li>Blog: Purdue vs Zero Trust in OT security <a href="https://on2it.net/nl/blog/purdue-vs-zero-trust-in-ot-security/">https://on2it.net/nl/blog/purdue-vs-zero-trust-in-ot-security/</a>   </li></ul><p>Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.</p><p> </p><p>🔔 Follow and Support our channel! 🔔</p><p><br> === </p><p><br>► YOUTUBE:    / @threattalks  </p><p>► SPOTIFY: https://open.spotify.com/show/1SXUyUE...</p><p>► APPLE: https://podcasts.apple.com/us/podcast...</p><p> </p><p>👕 Receive your Threat Talks T-shirt</p><p>https://threat-talks.com/</p><p> </p><p>🗺️ Explore the Hack's Route in Detail 🗺️</p><p>https://threat-talks.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Not long ago, OT environments were isolated islands.</p><p>Control systems ran independently, accessible only through dedicated workstations requiring physical presence. The factory floor and the IT department might as well have been on different planets.</p><p> </p><p>That world is gone. </p><p> </p><p>Today’s OT environments are connected. Remote access from IT workspaces to control systems is routine. </p><p> </p><p>And this is just the start. </p><p>And it changes everything about how to secure them.</p><p>In this episode of Threat Talks, Lieuwe Jan Koning and Rob Maas break down what happens when OT vs IT security models collide – and why IT/OT convergence is forcing organizations to rethink how they protect industrial environments.</p><p>Patching is difficult, availability is critical, and legacy models like the Purdue model leave gaps attackers can move through.</p><p>So, what does work?<br>Zero Trust.</p><p><br>If your organization relies on industrial systems, this is the shift you need to understand.</p><p> </p><p><strong>Timestamps</strong></p><p>00:00 – OT vs IT Security Introduction and Key Differences</p><p>00:57 – IT OT Convergence Is Changing OT Security</p><p>04:49 – What OT vs IT Security Looks Like in Practice</p><p>10:13 – Why IT and OT Teams Struggle to Communicate</p><p>12:18 – How Zero Trust Applies to OT Environments</p><p>14:21 – How to Secure OT with Zero Trust and IT OT Convergence</p><p> </p><p><strong>Key Topics Covered</strong></p><ul><li>How OT vs IT security requires a different approach in practice</li><li>Why IT OT convergence is increasing risk across factory environments</li><li>How limitations like patching and availability shape OT security decisions</li><li>How Zero Trust segmentation can reduce risk without disrupting operations</li></ul><p><strong>Resources</strong></p><ul><li>Threat Talks: https://threat-talks.com/ </li><li>ON2IT (Zero Trust as a Service): https://on2it.net/ </li><li>AMS-IX: <a href="https://www.ams-ix.net/ams">https://www.ams-ix.net/ams</a></li><li>Threat Talks episode on Hack the Boat: <a href="https://www.youtube.com/watch?v=Xa0TJ3eRTCw">https://www.youtube.com/watch?v=Xa0TJ3eRTCw</a></li><li>Blog: Purdue vs Zero Trust in OT security <a href="https://on2it.net/nl/blog/purdue-vs-zero-trust-in-ot-security/">https://on2it.net/nl/blog/purdue-vs-zero-trust-in-ot-security/</a>   </li></ul><p>Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.</p><p> </p><p>🔔 Follow and Support our channel! 🔔</p><p><br> === </p><p><br>► YOUTUBE:    / @threattalks  </p><p>► SPOTIFY: https://open.spotify.com/show/1SXUyUE...</p><p>► APPLE: https://podcasts.apple.com/us/podcast...</p><p> </p><p>👕 Receive your Threat Talks T-shirt</p><p>https://threat-talks.com/</p><p> </p><p>🗺️ Explore the Hack's Route in Detail 🗺️</p><p>https://threat-talks.com</p>]]>
      </content:encoded>
      <pubDate>Tue, 31 Mar 2026 08:00:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/755924f9/bb1dfd8c.mp3" length="40485785" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/LJMuOGRnnFk3HmGqk6EQkigfZFB455DZrTa54LrbZoY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81M2Q5/MDNhYjczNTM1ZDQz/Y2ZlZTRlNDk4MjFl/YmMyNy5wbmc.jpg"/>
      <itunes:duration>1011</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Not long ago, OT environments were isolated islands.</p><p>Control systems ran independently, accessible only through dedicated workstations requiring physical presence. The factory floor and the IT department might as well have been on different planets.</p><p> </p><p>That world is gone. </p><p> </p><p>Today’s OT environments are connected. Remote access from IT workspaces to control systems is routine. </p><p> </p><p>And this is just the start. </p><p>And it changes everything about how to secure them.</p><p>In this episode of Threat Talks, Lieuwe Jan Koning and Rob Maas break down what happens when OT vs IT security models collide – and why IT/OT convergence is forcing organizations to rethink how they protect industrial environments.</p><p>Patching is difficult, availability is critical, and legacy models like the Purdue model leave gaps attackers can move through.</p><p>So, what does work?<br>Zero Trust.</p><p><br>If your organization relies on industrial systems, this is the shift you need to understand.</p><p> </p><p><strong>Timestamps</strong></p><p>00:00 – OT vs IT Security Introduction and Key Differences</p><p>00:57 – IT OT Convergence Is Changing OT Security</p><p>04:49 – What OT vs IT Security Looks Like in Practice</p><p>10:13 – Why IT and OT Teams Struggle to Communicate</p><p>12:18 – How Zero Trust Applies to OT Environments</p><p>14:21 – How to Secure OT with Zero Trust and IT OT Convergence</p><p> </p><p><strong>Key Topics Covered</strong></p><ul><li>How OT vs IT security requires a different approach in practice</li><li>Why IT OT convergence is increasing risk across factory environments</li><li>How limitations like patching and availability shape OT security decisions</li><li>How Zero Trust segmentation can reduce risk without disrupting operations</li></ul><p><strong>Resources</strong></p><ul><li>Threat Talks: https://threat-talks.com/ </li><li>ON2IT (Zero Trust as a Service): https://on2it.net/ </li><li>AMS-IX: <a href="https://www.ams-ix.net/ams">https://www.ams-ix.net/ams</a></li><li>Threat Talks episode on Hack the Boat: <a href="https://www.youtube.com/watch?v=Xa0TJ3eRTCw">https://www.youtube.com/watch?v=Xa0TJ3eRTCw</a></li><li>Blog: Purdue vs Zero Trust in OT security <a href="https://on2it.net/nl/blog/purdue-vs-zero-trust-in-ot-security/">https://on2it.net/nl/blog/purdue-vs-zero-trust-in-ot-security/</a>   </li></ul><p>Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.</p><p> </p><p>🔔 Follow and Support our channel! 🔔</p><p><br> === </p><p><br>► YOUTUBE:    / @threattalks  </p><p>► SPOTIFY: https://open.spotify.com/show/1SXUyUE...</p><p>► APPLE: https://podcasts.apple.com/us/podcast...</p><p> </p><p>👕 Receive your Threat Talks T-shirt</p><p>https://threat-talks.com/</p><p> </p><p>🗺️ Explore the Hack's Route in Detail 🗺️</p><p>https://threat-talks.com</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/755924f9/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>React2Shell Explained</title>
      <itunes:title>React2Shell Explained</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">aef3c173-79ba-48a8-a1b7-467263e6f9c2</guid>
      <link>https://threat-talks.com/react2shell-explained/</link>
      <description>
        <![CDATA[<p>Log4j caught everyone off guard.</p><p> React2Shell might be doing the same right now.</p><p><strong>Across thousands of React apps, exposure is already baked in - accelerated by vibe coding and shipped without scrutiny.</strong></p><p><strong>In some cases, one request is all it takes.</strong></p><p><br>React2Shell turns that exposure into remote code execution in React and Next.js environments -triggered by a single HTTP POST request.</p><p>In this episode of Threat Talks, host Rob Maas and SOC analyst Yuri Wit break down how React2Shell works, why it’s more serious than it looks, and what makes it so easy to exploit.</p><p>The risk is significant, and what makes it worse is how little attention it’s getting.</p><p>As developers increasingly rely on AI-generated code, applications are being shipped faster - but not always with full visibility into how components behave. That creates blind spots attackers can take advantage of, especially when serialization and deserialization flaws are involved.</p><p>We cover how React2Shell works, how attackers exploit serialization and deserialization flaws, and what actions you need to take now to reduce risk.</p><p>If your organization runs React or Next.js applications, assume exposure until proven otherwise - especially if this hasn’t been on your radar yet.</p><p>React2Shell isn’t making Log4j headlines.</p><p><strong>That doesn’t mean the risk is smaller.<br></strong><br></p><p><strong>Timestamps</strong></p><p>00:00 – React2Shell Introduction and Log4j Comparison</p><p>00:28 – What Is React and How Vibe Coding Introduces Security Risks</p><p>02:48 – How the React2Shell Vulnerability Enables Remote Code Execution</p><p>05:49 – How Attackers Exploit React2Shell with a Single POST Request</p><p>07:28 – Impact of React2Shell RCE on Server Privileges and Access</p><p>08:18 – How to Mitigate React2Shell and the Next.js Vulnerability</p><p>11:18 – Incident Response for React2Shell Exploitation</p><p>13:25 – Ongoing React2Shell Risk and Why Many Apps Remain Vulnerable</p><p> </p><p><strong>Key Topics Covered</strong></p><ul><li>How the React2Shell and Next.js vulnerability expands the attack surface across modern web applications</li><li>Why vibe coding security risks are accelerating exposure without developers realizing it</li><li>Practical mitigation: patching, EDR detection, WAF limitations, and reducing attack surface</li></ul><p><strong>Resources</strong></p><ul><li>Threat Talks: https://threat-talks.com/ </li><li>ON2IT (Zero Trust as a Service): https://on2it.net/ </li><li>AMS-IX: <a href="https://www.ams-ix.net/ams">https://www.ams-ix.net/ams</a></li><li>Threat Talks episode on Log4j: <a href="https://www.youtube.com/watch?v=CiqNmJaak5I">https://www.youtube.com/watch?v=CiqNmJaak5I</a>   </li></ul><p>Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.</p><p> </p><p>🔔 Follow and Support our channel! 🔔</p><p><br> === </p><p><br>► YOUTUBE:    / @threattalks  </p><p>► SPOTIFY: https://open.spotify.com/show/1SXUyUE...</p><p>► APPLE: https://podcasts.apple.com/us/podcast...</p><p> </p><p>👕 Receive your Threat Talks T-shirt</p><p>https://threat-talks.com/</p><p> </p><p>🗺️ Explore the Hack's Route in Detail 🗺️</p><p>https://threat-talks.com</p><p> </p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Log4j caught everyone off guard.</p><p> React2Shell might be doing the same right now.</p><p><strong>Across thousands of React apps, exposure is already baked in - accelerated by vibe coding and shipped without scrutiny.</strong></p><p><strong>In some cases, one request is all it takes.</strong></p><p><br>React2Shell turns that exposure into remote code execution in React and Next.js environments -triggered by a single HTTP POST request.</p><p>In this episode of Threat Talks, host Rob Maas and SOC analyst Yuri Wit break down how React2Shell works, why it’s more serious than it looks, and what makes it so easy to exploit.</p><p>The risk is significant, and what makes it worse is how little attention it’s getting.</p><p>As developers increasingly rely on AI-generated code, applications are being shipped faster - but not always with full visibility into how components behave. That creates blind spots attackers can take advantage of, especially when serialization and deserialization flaws are involved.</p><p>We cover how React2Shell works, how attackers exploit serialization and deserialization flaws, and what actions you need to take now to reduce risk.</p><p>If your organization runs React or Next.js applications, assume exposure until proven otherwise - especially if this hasn’t been on your radar yet.</p><p>React2Shell isn’t making Log4j headlines.</p><p><strong>That doesn’t mean the risk is smaller.<br></strong><br></p><p><strong>Timestamps</strong></p><p>00:00 – React2Shell Introduction and Log4j Comparison</p><p>00:28 – What Is React and How Vibe Coding Introduces Security Risks</p><p>02:48 – How the React2Shell Vulnerability Enables Remote Code Execution</p><p>05:49 – How Attackers Exploit React2Shell with a Single POST Request</p><p>07:28 – Impact of React2Shell RCE on Server Privileges and Access</p><p>08:18 – How to Mitigate React2Shell and the Next.js Vulnerability</p><p>11:18 – Incident Response for React2Shell Exploitation</p><p>13:25 – Ongoing React2Shell Risk and Why Many Apps Remain Vulnerable</p><p> </p><p><strong>Key Topics Covered</strong></p><ul><li>How the React2Shell and Next.js vulnerability expands the attack surface across modern web applications</li><li>Why vibe coding security risks are accelerating exposure without developers realizing it</li><li>Practical mitigation: patching, EDR detection, WAF limitations, and reducing attack surface</li></ul><p><strong>Resources</strong></p><ul><li>Threat Talks: https://threat-talks.com/ </li><li>ON2IT (Zero Trust as a Service): https://on2it.net/ </li><li>AMS-IX: <a href="https://www.ams-ix.net/ams">https://www.ams-ix.net/ams</a></li><li>Threat Talks episode on Log4j: <a href="https://www.youtube.com/watch?v=CiqNmJaak5I">https://www.youtube.com/watch?v=CiqNmJaak5I</a>   </li></ul><p>Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.</p><p> </p><p>🔔 Follow and Support our channel! 🔔</p><p><br> === </p><p><br>► YOUTUBE:    / @threattalks  </p><p>► SPOTIFY: https://open.spotify.com/show/1SXUyUE...</p><p>► APPLE: https://podcasts.apple.com/us/podcast...</p><p> </p><p>👕 Receive your Threat Talks T-shirt</p><p>https://threat-talks.com/</p><p> </p><p>🗺️ Explore the Hack's Route in Detail 🗺️</p><p>https://threat-talks.com</p><p> </p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Tue, 24 Mar 2026 07:59:00 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/0c1bc2a6/f2bd1ae9.mp3" length="35541082" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/o2clr4i75xFHNmI8VK-m1E7riPyJG6jaNVVe0UcrGxQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kMGE1/NzdkZjVmODZmZDA1/N2Y2NWUyNGIwZjdj/NGIyYy5wbmc.jpg"/>
      <itunes:duration>888</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Log4j caught everyone off guard.</p><p> React2Shell might be doing the same right now.</p><p><strong>Across thousands of React apps, exposure is already baked in - accelerated by vibe coding and shipped without scrutiny.</strong></p><p><strong>In some cases, one request is all it takes.</strong></p><p><br>React2Shell turns that exposure into remote code execution in React and Next.js environments -triggered by a single HTTP POST request.</p><p>In this episode of Threat Talks, host Rob Maas and SOC analyst Yuri Wit break down how React2Shell works, why it’s more serious than it looks, and what makes it so easy to exploit.</p><p>The risk is significant, and what makes it worse is how little attention it’s getting.</p><p>As developers increasingly rely on AI-generated code, applications are being shipped faster - but not always with full visibility into how components behave. That creates blind spots attackers can take advantage of, especially when serialization and deserialization flaws are involved.</p><p>We cover how React2Shell works, how attackers exploit serialization and deserialization flaws, and what actions you need to take now to reduce risk.</p><p>If your organization runs React or Next.js applications, assume exposure until proven otherwise - especially if this hasn’t been on your radar yet.</p><p>React2Shell isn’t making Log4j headlines.</p><p><strong>That doesn’t mean the risk is smaller.<br></strong><br></p><p><strong>Timestamps</strong></p><p>00:00 – React2Shell Introduction and Log4j Comparison</p><p>00:28 – What Is React and How Vibe Coding Introduces Security Risks</p><p>02:48 – How the React2Shell Vulnerability Enables Remote Code Execution</p><p>05:49 – How Attackers Exploit React2Shell with a Single POST Request</p><p>07:28 – Impact of React2Shell RCE on Server Privileges and Access</p><p>08:18 – How to Mitigate React2Shell and the Next.js Vulnerability</p><p>11:18 – Incident Response for React2Shell Exploitation</p><p>13:25 – Ongoing React2Shell Risk and Why Many Apps Remain Vulnerable</p><p> </p><p><strong>Key Topics Covered</strong></p><ul><li>How the React2Shell and Next.js vulnerability expands the attack surface across modern web applications</li><li>Why vibe coding security risks are accelerating exposure without developers realizing it</li><li>Practical mitigation: patching, EDR detection, WAF limitations, and reducing attack surface</li></ul><p><strong>Resources</strong></p><ul><li>Threat Talks: https://threat-talks.com/ </li><li>ON2IT (Zero Trust as a Service): https://on2it.net/ </li><li>AMS-IX: <a href="https://www.ams-ix.net/ams">https://www.ams-ix.net/ams</a></li><li>Threat Talks episode on Log4j: <a href="https://www.youtube.com/watch?v=CiqNmJaak5I">https://www.youtube.com/watch?v=CiqNmJaak5I</a>   </li></ul><p>Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.</p><p> </p><p>🔔 Follow and Support our channel! 🔔</p><p><br> === </p><p><br>► YOUTUBE:    / @threattalks  </p><p>► SPOTIFY: https://open.spotify.com/show/1SXUyUE...</p><p>► APPLE: https://podcasts.apple.com/us/podcast...</p><p> </p><p>👕 Receive your Threat Talks T-shirt</p><p>https://threat-talks.com/</p><p> </p><p>🗺️ Explore the Hack's Route in Detail 🗺️</p><p>https://threat-talks.com</p><p> </p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/0c1bc2a6/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Zero Trust in the AI Era</title>
      <itunes:title>Zero Trust in the AI Era</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">86c6ea73-e244-4adc-9ad0-b14676db65b0</guid>
      <link>https://share.transistor.fm/s/82ea1c32</link>
      <description>
        <![CDATA[<p>AI can fake your voice.<br>Deepfakes can move millions of dollars in minutes.<strong><br> And attackers no longer need to break trust - they can simulate it.<br></strong><br></p><p>Security teams are entering an era where <strong>nothing can be trusted at face value.</strong></p><p><br>In part two of our Zero Trust series with Dr. Zero Trust, Chase Cunningham, he and Lieuwe Jan Koning (Co-Founder and CTO at ON2IT Cybersecurity) explore what the future of Zero Trust looks like in an AI-driven world. </p><p>How do you verify identity when voices and faces can be faked?<br>How do organizations defend against scams that scale to millions of targets?<br>And what happens when AI starts attacking AI?</p><p>They discuss real-world examples including deepfake fraud, “cyber-kidnapping” scams, prompt injection attacks, and the growing role of AI policy engines in defending modern systems.</p><p>One key takeaway: AI is accelerating a global trust crisis.</p><p>And this is what makes Zero Trust <strong>matters more than ever.<br></strong><br></p><p>Simple Zero Trust principles like verification, passphrases, strict payment procedures, and continuous validation become essential safeguards for every organization.</p><p>Because in an environment where <strong>anything can be simulated</strong>, trust must always be verified.</p><p><strong>Missed part one?</strong><br> Watch <em>“From Revolution to Reality”: https://www.youtube.com/watch?v=6reox4sqaUc&amp;t<br></em><br></p><p><strong>Timestamps</strong></p><p>00:00 - Introduction: AI Security Threats and the Future of Zero Trust<br>01:07 - How Long Will Zero Trust Last? The Future of Zero Trust Strategy<br>01:54 - The Future of Zero Trust in an AI-Driven World<br>04:24 - Deepfakes, Fraud, and the Zero Trust Response to AI Security Threats<br>16:10 - AI Security Threats: Prompt Injection, AI Agents, and the Next Arms Race<br>21:55 - Final Thoughts on AI Security Threats and the Future of Zero Trust</p><p> </p><p><strong>Key Topics Covered</strong></p><ul><li>How <strong>AI security threats</strong> like deepfakes are changing identity verification</li><li>Why the <strong>future of Zero Trust</strong> depends on continuous verification</li><li>How AI-driven attacks scale fraud and social engineering</li><li>Why AI policy engines may become the next defensive layer in cybersecurity</li></ul><p><strong>Resources</strong></p><ul><li>Threat Talks: <a href="https://threat-talks.com">https://threat-talks.com</a></li><li>ON2IT (Zero Trust as a Service): <a href="https://on2it.net">https://on2it.net</a></li><li>AMS-IX: <a href="https://www.ams-ix.net/ams">https://www.ams-ix.net/ams</a></li><li>Threat Talks playlist on AI and Cyber Trends: <a href="https://www.youtube.com/playlist?list=PLF5mXtEG4t5w_lz1wznTlcCuxFcsLDHox">https://www.youtube.com/playlist?list=PLF5mXtEG4t5w_lz1wznTlcCuxFcsLDHox</a>  </li></ul><p><br>Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.</p><p> </p><p>🔔 Follow and Support our channel! 🔔</p><p><br> === </p><p><br>► YOUTUBE:    / @threattalks  </p><p>► SPOTIFY: https://open.spotify.com/show/1SXUyUE...</p><p>► APPLE: https://podcasts.apple.com/us/podcast...</p><p> </p><p>👕 Receive your Threat Talks T-shirt</p><p>https://threat-talks.com/</p><p> </p><p>🗺️ Explore the Hack's Route in Detail 🗺️</p><p>https://threat-talks.com</p><p> </p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>AI can fake your voice.<br>Deepfakes can move millions of dollars in minutes.<strong><br> And attackers no longer need to break trust - they can simulate it.<br></strong><br></p><p>Security teams are entering an era where <strong>nothing can be trusted at face value.</strong></p><p><br>In part two of our Zero Trust series with Dr. Zero Trust, Chase Cunningham, he and Lieuwe Jan Koning (Co-Founder and CTO at ON2IT Cybersecurity) explore what the future of Zero Trust looks like in an AI-driven world. </p><p>How do you verify identity when voices and faces can be faked?<br>How do organizations defend against scams that scale to millions of targets?<br>And what happens when AI starts attacking AI?</p><p>They discuss real-world examples including deepfake fraud, “cyber-kidnapping” scams, prompt injection attacks, and the growing role of AI policy engines in defending modern systems.</p><p>One key takeaway: AI is accelerating a global trust crisis.</p><p>And this is what makes Zero Trust <strong>matters more than ever.<br></strong><br></p><p>Simple Zero Trust principles like verification, passphrases, strict payment procedures, and continuous validation become essential safeguards for every organization.</p><p>Because in an environment where <strong>anything can be simulated</strong>, trust must always be verified.</p><p><strong>Missed part one?</strong><br> Watch <em>“From Revolution to Reality”: https://www.youtube.com/watch?v=6reox4sqaUc&amp;t<br></em><br></p><p><strong>Timestamps</strong></p><p>00:00 - Introduction: AI Security Threats and the Future of Zero Trust<br>01:07 - How Long Will Zero Trust Last? The Future of Zero Trust Strategy<br>01:54 - The Future of Zero Trust in an AI-Driven World<br>04:24 - Deepfakes, Fraud, and the Zero Trust Response to AI Security Threats<br>16:10 - AI Security Threats: Prompt Injection, AI Agents, and the Next Arms Race<br>21:55 - Final Thoughts on AI Security Threats and the Future of Zero Trust</p><p> </p><p><strong>Key Topics Covered</strong></p><ul><li>How <strong>AI security threats</strong> like deepfakes are changing identity verification</li><li>Why the <strong>future of Zero Trust</strong> depends on continuous verification</li><li>How AI-driven attacks scale fraud and social engineering</li><li>Why AI policy engines may become the next defensive layer in cybersecurity</li></ul><p><strong>Resources</strong></p><ul><li>Threat Talks: <a href="https://threat-talks.com">https://threat-talks.com</a></li><li>ON2IT (Zero Trust as a Service): <a href="https://on2it.net">https://on2it.net</a></li><li>AMS-IX: <a href="https://www.ams-ix.net/ams">https://www.ams-ix.net/ams</a></li><li>Threat Talks playlist on AI and Cyber Trends: <a href="https://www.youtube.com/playlist?list=PLF5mXtEG4t5w_lz1wznTlcCuxFcsLDHox">https://www.youtube.com/playlist?list=PLF5mXtEG4t5w_lz1wznTlcCuxFcsLDHox</a>  </li></ul><p><br>Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.</p><p> </p><p>🔔 Follow and Support our channel! 🔔</p><p><br> === </p><p><br>► YOUTUBE:    / @threattalks  </p><p>► SPOTIFY: https://open.spotify.com/show/1SXUyUE...</p><p>► APPLE: https://podcasts.apple.com/us/podcast...</p><p> </p><p>👕 Receive your Threat Talks T-shirt</p><p>https://threat-talks.com/</p><p> </p><p>🗺️ Explore the Hack's Route in Detail 🗺️</p><p>https://threat-talks.com</p><p> </p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Tue, 17 Mar 2026 07:59:00 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/82ea1c32/589993a6.mp3" length="55015853" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ItK6emn8DgUTxBOWZ2R6YbkXOJygSSg5P--G0dLVT2I/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iMzcx/ZTg2NGI0NGQ5ZDQ3/NTcyMDY0ZDUwYjI1/YzE0YS5wbmc.jpg"/>
      <itunes:duration>1374</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>AI can fake your voice.<br>Deepfakes can move millions of dollars in minutes.<strong><br> And attackers no longer need to break trust - they can simulate it.<br></strong><br></p><p>Security teams are entering an era where <strong>nothing can be trusted at face value.</strong></p><p><br>In part two of our Zero Trust series with Dr. Zero Trust, Chase Cunningham, he and Lieuwe Jan Koning (Co-Founder and CTO at ON2IT Cybersecurity) explore what the future of Zero Trust looks like in an AI-driven world. </p><p>How do you verify identity when voices and faces can be faked?<br>How do organizations defend against scams that scale to millions of targets?<br>And what happens when AI starts attacking AI?</p><p>They discuss real-world examples including deepfake fraud, “cyber-kidnapping” scams, prompt injection attacks, and the growing role of AI policy engines in defending modern systems.</p><p>One key takeaway: AI is accelerating a global trust crisis.</p><p>And this is what makes Zero Trust <strong>matters more than ever.<br></strong><br></p><p>Simple Zero Trust principles like verification, passphrases, strict payment procedures, and continuous validation become essential safeguards for every organization.</p><p>Because in an environment where <strong>anything can be simulated</strong>, trust must always be verified.</p><p><strong>Missed part one?</strong><br> Watch <em>“From Revolution to Reality”: https://www.youtube.com/watch?v=6reox4sqaUc&amp;t<br></em><br></p><p><strong>Timestamps</strong></p><p>00:00 - Introduction: AI Security Threats and the Future of Zero Trust<br>01:07 - How Long Will Zero Trust Last? The Future of Zero Trust Strategy<br>01:54 - The Future of Zero Trust in an AI-Driven World<br>04:24 - Deepfakes, Fraud, and the Zero Trust Response to AI Security Threats<br>16:10 - AI Security Threats: Prompt Injection, AI Agents, and the Next Arms Race<br>21:55 - Final Thoughts on AI Security Threats and the Future of Zero Trust</p><p> </p><p><strong>Key Topics Covered</strong></p><ul><li>How <strong>AI security threats</strong> like deepfakes are changing identity verification</li><li>Why the <strong>future of Zero Trust</strong> depends on continuous verification</li><li>How AI-driven attacks scale fraud and social engineering</li><li>Why AI policy engines may become the next defensive layer in cybersecurity</li></ul><p><strong>Resources</strong></p><ul><li>Threat Talks: <a href="https://threat-talks.com">https://threat-talks.com</a></li><li>ON2IT (Zero Trust as a Service): <a href="https://on2it.net">https://on2it.net</a></li><li>AMS-IX: <a href="https://www.ams-ix.net/ams">https://www.ams-ix.net/ams</a></li><li>Threat Talks playlist on AI and Cyber Trends: <a href="https://www.youtube.com/playlist?list=PLF5mXtEG4t5w_lz1wznTlcCuxFcsLDHox">https://www.youtube.com/playlist?list=PLF5mXtEG4t5w_lz1wznTlcCuxFcsLDHox</a>  </li></ul><p><br>Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.</p><p> </p><p>🔔 Follow and Support our channel! 🔔</p><p><br> === </p><p><br>► YOUTUBE:    / @threattalks  </p><p>► SPOTIFY: https://open.spotify.com/show/1SXUyUE...</p><p>► APPLE: https://podcasts.apple.com/us/podcast...</p><p> </p><p>👕 Receive your Threat Talks T-shirt</p><p>https://threat-talks.com/</p><p> </p><p>🗺️ Explore the Hack's Route in Detail 🗺️</p><p>https://threat-talks.com</p><p> </p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/82ea1c32/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Zero Trust: From Revolution to Reality</title>
      <itunes:title>Zero Trust: From Revolution to Reality</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6f595e15-1e04-40fe-81c2-00d0bf48f821</guid>
      <link>https://threat-talks.com/zero-trust-from-revolution-to-reality/</link>
      <description>
        <![CDATA[<p>Zero Trust is easy to say. Hard to execute.</p><p>Most organizations try to build it themselves.</p><p>Most underestimate the complexity.<br>Most get stuck in architecture diagrams instead of protecting what actually matters: data.</p><p><br>If execution determines success – should you really be doing it alone?</p><p><br>In this episode of <strong>Threat Talks</strong>, <strong>Lieuwe Jan Koning</strong>, Co-Founder and CTO at ON2IT Cybersecurity, sits down with <strong>Dr. Chase Cunningham</strong>, architect of the Zero Trust Extended (ZTX) framework, to break down what Zero Trust <em>really</em> requires in practice – not in theory.</p><p>Zero Trust isn’t a product. It’s not a checkbox.</p><p>It’s a decision about what you protect first – and how seriously you take execution.</p><p>If your job is to protect critical data without drowning in complexity, this episode will recalibrate your approach.</p><p><br>Because in the end, Zero Trust doesn’t fail on strategy.<br>It fails on execution.</p><p><strong>Timestamps</strong></p><p>00:00 – Introduction to Zero Trust Data Protection</p><p>00:50 – How Zero Trust Started at Forrester</p><p>03:19 – The ZTX Framework and Structuring Zero Trust</p><p>05:05 – Data at the Core of Zero Trust Data Protection</p><p>08:22 – Success Factors for Effective Zero Trust Data Protection</p><p>13:06 – Why Most Organizations Should Not DIY Zero Trust</p><p>15:36 – Breaches, Misconfiguration, and Market Reality</p><p>18:07 – How COVID Accelerated Zero Trust Adoption</p><p>19:25 – Closing Thoughts on Zero Trust Fundamentals</p><p> </p><p><strong>Key Topics Covered</strong></p><ul><li>Where Zero Trust actually started – and how it evolved beyond network segmentation</li><li>The shift from perimeter thinking to data-first protection</li><li>Why most internal Zero Trust programs stall</li><li>The operational discipline required to make Zero Trust work</li></ul><p><strong>Resources</strong></p><ul><li>Threat Talks: https://threat-talks.com/</li><li>ON2IT (Zero Trust as a Service): https://on2it.net/ </li><li>AMS-IX: <a href="https://www.ams-ix.net/ams">https://www.ams-ix.net/ams</a></li><li>Threat Talks playlist on Zero Trust:   <a href="https://www.youtube.com/playlist?list=PLF5mXtEG4t5wigSRB3fpyFfMYp3l1Ux2g">https://www.youtube.com/playlist?list=PLF5mXtEG4t5wigSRB3fpyFfMYp3l1Ux2g</a></li><li>Zero Trust Dictionary: <a href="https://on2it.net/resources/zero-trust-dictionary/">https://on2it.net/resources/zero-trust-dictionary/</a></li></ul><p><br> Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Zero Trust is easy to say. Hard to execute.</p><p>Most organizations try to build it themselves.</p><p>Most underestimate the complexity.<br>Most get stuck in architecture diagrams instead of protecting what actually matters: data.</p><p><br>If execution determines success – should you really be doing it alone?</p><p><br>In this episode of <strong>Threat Talks</strong>, <strong>Lieuwe Jan Koning</strong>, Co-Founder and CTO at ON2IT Cybersecurity, sits down with <strong>Dr. Chase Cunningham</strong>, architect of the Zero Trust Extended (ZTX) framework, to break down what Zero Trust <em>really</em> requires in practice – not in theory.</p><p>Zero Trust isn’t a product. It’s not a checkbox.</p><p>It’s a decision about what you protect first – and how seriously you take execution.</p><p>If your job is to protect critical data without drowning in complexity, this episode will recalibrate your approach.</p><p><br>Because in the end, Zero Trust doesn’t fail on strategy.<br>It fails on execution.</p><p><strong>Timestamps</strong></p><p>00:00 – Introduction to Zero Trust Data Protection</p><p>00:50 – How Zero Trust Started at Forrester</p><p>03:19 – The ZTX Framework and Structuring Zero Trust</p><p>05:05 – Data at the Core of Zero Trust Data Protection</p><p>08:22 – Success Factors for Effective Zero Trust Data Protection</p><p>13:06 – Why Most Organizations Should Not DIY Zero Trust</p><p>15:36 – Breaches, Misconfiguration, and Market Reality</p><p>18:07 – How COVID Accelerated Zero Trust Adoption</p><p>19:25 – Closing Thoughts on Zero Trust Fundamentals</p><p> </p><p><strong>Key Topics Covered</strong></p><ul><li>Where Zero Trust actually started – and how it evolved beyond network segmentation</li><li>The shift from perimeter thinking to data-first protection</li><li>Why most internal Zero Trust programs stall</li><li>The operational discipline required to make Zero Trust work</li></ul><p><strong>Resources</strong></p><ul><li>Threat Talks: https://threat-talks.com/</li><li>ON2IT (Zero Trust as a Service): https://on2it.net/ </li><li>AMS-IX: <a href="https://www.ams-ix.net/ams">https://www.ams-ix.net/ams</a></li><li>Threat Talks playlist on Zero Trust:   <a href="https://www.youtube.com/playlist?list=PLF5mXtEG4t5wigSRB3fpyFfMYp3l1Ux2g">https://www.youtube.com/playlist?list=PLF5mXtEG4t5wigSRB3fpyFfMYp3l1Ux2g</a></li><li>Zero Trust Dictionary: <a href="https://on2it.net/resources/zero-trust-dictionary/">https://on2it.net/resources/zero-trust-dictionary/</a></li></ul><p><br> Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Mar 2026 08:00:00 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/de5ace0e/435a32ce.mp3" length="48961626" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/gE2IaHF-ypFpmf1WxAdXAcZ7MVuYnO6H_0GMrxRCgrQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lNmJm/ZGMzZDMxZTk2MDQx/MDYxNDAyOTJkNTc0/YTBjYS5wbmc.jpg"/>
      <itunes:duration>1221</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Zero Trust is easy to say. Hard to execute.</p><p>Most organizations try to build it themselves.</p><p>Most underestimate the complexity.<br>Most get stuck in architecture diagrams instead of protecting what actually matters: data.</p><p><br>If execution determines success – should you really be doing it alone?</p><p><br>In this episode of <strong>Threat Talks</strong>, <strong>Lieuwe Jan Koning</strong>, Co-Founder and CTO at ON2IT Cybersecurity, sits down with <strong>Dr. Chase Cunningham</strong>, architect of the Zero Trust Extended (ZTX) framework, to break down what Zero Trust <em>really</em> requires in practice – not in theory.</p><p>Zero Trust isn’t a product. It’s not a checkbox.</p><p>It’s a decision about what you protect first – and how seriously you take execution.</p><p>If your job is to protect critical data without drowning in complexity, this episode will recalibrate your approach.</p><p><br>Because in the end, Zero Trust doesn’t fail on strategy.<br>It fails on execution.</p><p><strong>Timestamps</strong></p><p>00:00 – Introduction to Zero Trust Data Protection</p><p>00:50 – How Zero Trust Started at Forrester</p><p>03:19 – The ZTX Framework and Structuring Zero Trust</p><p>05:05 – Data at the Core of Zero Trust Data Protection</p><p>08:22 – Success Factors for Effective Zero Trust Data Protection</p><p>13:06 – Why Most Organizations Should Not DIY Zero Trust</p><p>15:36 – Breaches, Misconfiguration, and Market Reality</p><p>18:07 – How COVID Accelerated Zero Trust Adoption</p><p>19:25 – Closing Thoughts on Zero Trust Fundamentals</p><p> </p><p><strong>Key Topics Covered</strong></p><ul><li>Where Zero Trust actually started – and how it evolved beyond network segmentation</li><li>The shift from perimeter thinking to data-first protection</li><li>Why most internal Zero Trust programs stall</li><li>The operational discipline required to make Zero Trust work</li></ul><p><strong>Resources</strong></p><ul><li>Threat Talks: https://threat-talks.com/</li><li>ON2IT (Zero Trust as a Service): https://on2it.net/ </li><li>AMS-IX: <a href="https://www.ams-ix.net/ams">https://www.ams-ix.net/ams</a></li><li>Threat Talks playlist on Zero Trust:   <a href="https://www.youtube.com/playlist?list=PLF5mXtEG4t5wigSRB3fpyFfMYp3l1Ux2g">https://www.youtube.com/playlist?list=PLF5mXtEG4t5wigSRB3fpyFfMYp3l1Ux2g</a></li><li>Zero Trust Dictionary: <a href="https://on2it.net/resources/zero-trust-dictionary/">https://on2it.net/resources/zero-trust-dictionary/</a></li></ul><p><br> Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.</p>]]>
      </itunes:summary>
      <itunes:keywords>Dr Zero Trust, Chase Cunningham</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/de5ace0e/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>China is Already Inside your infrastructure</title>
      <itunes:title>China is Already Inside your infrastructure</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">cffdffc7-2709-4fd5-983a-1a87fdef0a08</guid>
      <link>https://threat-talks.com/china-is-already-inside-your-infrastructure/</link>
      <description>
        <![CDATA[<p>China is Already Inside your infrastructure. </p><p>And the EU is done ignoring it.</p><p>In this exclusive first discussion of the upcoming EU Cybersecurity Act revision, <strong>Bart Groothuis, MEP,</strong> joins <strong>Lieuwe-Jan Koning, CTO and Co-Founder,</strong> to explain why vendor dependency is now a board-level security risk.</p><p>Groothuis breaks down how the revised EU Cybersecurity Act will shift Europe from soft guidance to hard enforcement - introducing formal “high-risk vendor” treatment inside critical infrastructure.</p><p>This isn’t about secret backdoors.</p><p>It’s about who controls the next update.<br>Who enters your data center.<br>And who can one day - switch off the grid.</p><p>The revision brings <strong>non-technical risk</strong> - state influence, intelligence laws, geopolitical leverage - directly into cyber certification decisions. That means <strong>supply chain risk</strong> is no longer theoretical. It’s regulatory.</p><p><br>And the impact goes far beyond telecom.<br>Energy. Cloud. Transport. Enterprise IT.</p><p>If your infrastructure depends on a vendor tied to a high-risk state, this conversation matters.</p><p><strong>Timestamps </strong><br>00:00 Opening &amp; guest intro: MEP Bart Roos - rapporteur on EU legislation<br>01:23 What the CSA revision targets - certification, telecoms, cloud<br>09:11 Non-technical risk: intelligence laws, vendor-state ties, 5G implications<br>15:10 What’s new in the Security Act Revision, 4G vs 5G - why virtualisation changes the security model</p><p>17:17 Energy, inverters, and real-world dependency risks - blackouts<br>21:53 What organisations &amp; buyers should do now (roadmaps, phasing out risk)<br>25:53 Final call to action &amp; closing</p><p><strong>Key Topics Covered</strong><br> • Why the EU Cybersecurity Act revision treats non-technical vendor risk as policy, not just code review.<br> • The difference between technical vulnerabilities and vendor/state dependencies (intelligence laws, personnel access).<br> • 5G’s virtualised architecture: “winner takes all” risks and the limits of code audits.<br> • Practical next steps for CISOs: vendor inventory, risk-based roadmaps, procurement levers and phasing strategies.</p><p><strong>Related ON2IT content &amp; explicitly referenced resources</strong><br> ON2IT website: <a href="https://on2it.net/">https://on2it.net/</a><br> Threat Talks website: <a href="https://threat-talks.com/">https://threat-talks.com/</a><br> European Commission - Cybersecurity Act overview: <a href="https://digital-strategy.ec.europa.eu/en/policies/cybersecurity-act">https://digital-strategy.ec.europa.eu/en/policies/cybersecurity-act</a><br> Proposal for a Regulation for the EU Cybersecurity Act: <a href="https://digital-strategy.ec.europa.eu/en/library/proposal-regulation-eu-cybersecurity-act">https://digital-strategy.ec.europa.eu/en/library/proposal-regulation-eu-cybersecurity-act</a> </p><p>Subscribe and turn on notifications to stay ahead of emerging cyber policy, supply chain risk, and critical infrastructure security across IT and OT.<br>► YOUTUBE: /@threattalks<br>► Spotify / Apple Podcasts: </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>China is Already Inside your infrastructure. </p><p>And the EU is done ignoring it.</p><p>In this exclusive first discussion of the upcoming EU Cybersecurity Act revision, <strong>Bart Groothuis, MEP,</strong> joins <strong>Lieuwe-Jan Koning, CTO and Co-Founder,</strong> to explain why vendor dependency is now a board-level security risk.</p><p>Groothuis breaks down how the revised EU Cybersecurity Act will shift Europe from soft guidance to hard enforcement - introducing formal “high-risk vendor” treatment inside critical infrastructure.</p><p>This isn’t about secret backdoors.</p><p>It’s about who controls the next update.<br>Who enters your data center.<br>And who can one day - switch off the grid.</p><p>The revision brings <strong>non-technical risk</strong> - state influence, intelligence laws, geopolitical leverage - directly into cyber certification decisions. That means <strong>supply chain risk</strong> is no longer theoretical. It’s regulatory.</p><p><br>And the impact goes far beyond telecom.<br>Energy. Cloud. Transport. Enterprise IT.</p><p>If your infrastructure depends on a vendor tied to a high-risk state, this conversation matters.</p><p><strong>Timestamps </strong><br>00:00 Opening &amp; guest intro: MEP Bart Roos - rapporteur on EU legislation<br>01:23 What the CSA revision targets - certification, telecoms, cloud<br>09:11 Non-technical risk: intelligence laws, vendor-state ties, 5G implications<br>15:10 What’s new in the Security Act Revision, 4G vs 5G - why virtualisation changes the security model</p><p>17:17 Energy, inverters, and real-world dependency risks - blackouts<br>21:53 What organisations &amp; buyers should do now (roadmaps, phasing out risk)<br>25:53 Final call to action &amp; closing</p><p><strong>Key Topics Covered</strong><br> • Why the EU Cybersecurity Act revision treats non-technical vendor risk as policy, not just code review.<br> • The difference between technical vulnerabilities and vendor/state dependencies (intelligence laws, personnel access).<br> • 5G’s virtualised architecture: “winner takes all” risks and the limits of code audits.<br> • Practical next steps for CISOs: vendor inventory, risk-based roadmaps, procurement levers and phasing strategies.</p><p><strong>Related ON2IT content &amp; explicitly referenced resources</strong><br> ON2IT website: <a href="https://on2it.net/">https://on2it.net/</a><br> Threat Talks website: <a href="https://threat-talks.com/">https://threat-talks.com/</a><br> European Commission - Cybersecurity Act overview: <a href="https://digital-strategy.ec.europa.eu/en/policies/cybersecurity-act">https://digital-strategy.ec.europa.eu/en/policies/cybersecurity-act</a><br> Proposal for a Regulation for the EU Cybersecurity Act: <a href="https://digital-strategy.ec.europa.eu/en/library/proposal-regulation-eu-cybersecurity-act">https://digital-strategy.ec.europa.eu/en/library/proposal-regulation-eu-cybersecurity-act</a> </p><p>Subscribe and turn on notifications to stay ahead of emerging cyber policy, supply chain risk, and critical infrastructure security across IT and OT.<br>► YOUTUBE: /@threattalks<br>► Spotify / Apple Podcasts: </p>]]>
      </content:encoded>
      <pubDate>Tue, 03 Mar 2026 08:00:00 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/d2e7ebcc/d2fb64da.mp3" length="71374080" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/SXVI25-oDb1kulEY8bS0-pCRNnsLVP1hYJsE5YSPp7c/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83YjQx/YWQwOGVhZDRhYTlk/MTI3ZTY2MWZhN2Ni/ZTI1Ni5wbmc.jpg"/>
      <itunes:duration>1785</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>China is Already Inside your infrastructure. </p><p>And the EU is done ignoring it.</p><p>In this exclusive first discussion of the upcoming EU Cybersecurity Act revision, <strong>Bart Groothuis, MEP,</strong> joins <strong>Lieuwe-Jan Koning, CTO and Co-Founder,</strong> to explain why vendor dependency is now a board-level security risk.</p><p>Groothuis breaks down how the revised EU Cybersecurity Act will shift Europe from soft guidance to hard enforcement - introducing formal “high-risk vendor” treatment inside critical infrastructure.</p><p>This isn’t about secret backdoors.</p><p>It’s about who controls the next update.<br>Who enters your data center.<br>And who can one day - switch off the grid.</p><p>The revision brings <strong>non-technical risk</strong> - state influence, intelligence laws, geopolitical leverage - directly into cyber certification decisions. That means <strong>supply chain risk</strong> is no longer theoretical. It’s regulatory.</p><p><br>And the impact goes far beyond telecom.<br>Energy. Cloud. Transport. Enterprise IT.</p><p>If your infrastructure depends on a vendor tied to a high-risk state, this conversation matters.</p><p><strong>Timestamps </strong><br>00:00 Opening &amp; guest intro: MEP Bart Roos - rapporteur on EU legislation<br>01:23 What the CSA revision targets - certification, telecoms, cloud<br>09:11 Non-technical risk: intelligence laws, vendor-state ties, 5G implications<br>15:10 What’s new in the Security Act Revision, 4G vs 5G - why virtualisation changes the security model</p><p>17:17 Energy, inverters, and real-world dependency risks - blackouts<br>21:53 What organisations &amp; buyers should do now (roadmaps, phasing out risk)<br>25:53 Final call to action &amp; closing</p><p><strong>Key Topics Covered</strong><br> • Why the EU Cybersecurity Act revision treats non-technical vendor risk as policy, not just code review.<br> • The difference between technical vulnerabilities and vendor/state dependencies (intelligence laws, personnel access).<br> • 5G’s virtualised architecture: “winner takes all” risks and the limits of code audits.<br> • Practical next steps for CISOs: vendor inventory, risk-based roadmaps, procurement levers and phasing strategies.</p><p><strong>Related ON2IT content &amp; explicitly referenced resources</strong><br> ON2IT website: <a href="https://on2it.net/">https://on2it.net/</a><br> Threat Talks website: <a href="https://threat-talks.com/">https://threat-talks.com/</a><br> European Commission - Cybersecurity Act overview: <a href="https://digital-strategy.ec.europa.eu/en/policies/cybersecurity-act">https://digital-strategy.ec.europa.eu/en/policies/cybersecurity-act</a><br> Proposal for a Regulation for the EU Cybersecurity Act: <a href="https://digital-strategy.ec.europa.eu/en/library/proposal-regulation-eu-cybersecurity-act">https://digital-strategy.ec.europa.eu/en/library/proposal-regulation-eu-cybersecurity-act</a> </p><p>Subscribe and turn on notifications to stay ahead of emerging cyber policy, supply chain risk, and critical infrastructure security across IT and OT.<br>► YOUTUBE: /@threattalks<br>► Spotify / Apple Podcasts: </p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d2e7ebcc/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>OpenClaw and The Dark Side of Agentic AI</title>
      <itunes:title>OpenClaw and The Dark Side of Agentic AI</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5bf91bfa-6293-46fe-9ae4-3c2cda657cd4</guid>
      <link>https://threat-talks.com/openclaw-and-the-dark-side-of-agentic-ai/</link>
      <description>
        <![CDATA[<p>Your biggest threat this year isn’t malware. It’s your own AI assistant.</p><p>OpenClaw connects an LLM directly to your terminal, browser, email, and chat.<br> It runs with your permissions.<br> It executes tasks without hesitation.</p><p>Days after launch, researchers found a One-Click RCE.</p><p>Cisco called it a security nightmare.</p><p>Gartner called it an unacceptable risk.</p><p>OpenClaw (formerly known as Clawdbot and Moltbot) represents a new phase of agentic AI: autonomous assistants operating inside your environment with almost no guardrails.</p><p>The headlines around OpenClaw have been clear: it’s a serious threat. But how should we handle agentic AIs like OpenClaw moving forward?</p><p>In this Threat Talks episode, Field CTO Rob Maas and SOC analyst Yuri Wit break down what OpenClaw actually does, where AI agent security breaks, and whether or not you should deploy OpenClaw.</p><p>OpenClaw is powerful. It’s useful.</p><p>It’s also proof that many of us are not ready for AI agents with this level of autonomy. </p><p>Before you let an AI agent into your systems, understand what happens when it runs unchecked.</p><p><strong>Timestamps</strong></p><p><strong>Key Topics Covered</strong></p><p>·         How OpenClaw works and why agentic AI changes the security model</p><p>·         The One-Click RCE and what it reveals about AI agent security</p><p>·         Malicious skills, default allow design, and autonomous privilege abuse</p><p>·         Realistic mitigation strategies including sandboxing and controlled environments</p><p><strong>Resources</strong></p><p>·         Threat Talks: https://threat-talks.com/ </p><p>·         ON2IT (Zero Trust as a Service): https://on2it.net/ </p><p>·         AMS-IX: <a href="https://www.ams-ix.net/ams">https://www.ams-ix.net/ams</a></p><p><br> Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.</p><p><br><a href="https://share.transistor.fm/s/6893ecf9/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
 </p><p>🔔 Follow and Support our channel! 🔔</p><p> === </p><p><br> ► YOUTUBE:    / @threattalks  </p><p>► SPOTIFY: https://open.spotify.com/show/1SXUyUE...</p><p>► APPLE: https://podcasts.apple.com/us/podcast...</p><p> </p><p>👕 Receive your Threat Talks T-shirt</p><p>https://threat-talks.com/</p><p> </p><p>🗺️ Explore the Hack's Route in Detail 🗺️</p><p>https://threat-talks.com</p><p> </p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Your biggest threat this year isn’t malware. It’s your own AI assistant.</p><p>OpenClaw connects an LLM directly to your terminal, browser, email, and chat.<br> It runs with your permissions.<br> It executes tasks without hesitation.</p><p>Days after launch, researchers found a One-Click RCE.</p><p>Cisco called it a security nightmare.</p><p>Gartner called it an unacceptable risk.</p><p>OpenClaw (formerly known as Clawdbot and Moltbot) represents a new phase of agentic AI: autonomous assistants operating inside your environment with almost no guardrails.</p><p>The headlines around OpenClaw have been clear: it’s a serious threat. But how should we handle agentic AIs like OpenClaw moving forward?</p><p>In this Threat Talks episode, Field CTO Rob Maas and SOC analyst Yuri Wit break down what OpenClaw actually does, where AI agent security breaks, and whether or not you should deploy OpenClaw.</p><p>OpenClaw is powerful. It’s useful.</p><p>It’s also proof that many of us are not ready for AI agents with this level of autonomy. </p><p>Before you let an AI agent into your systems, understand what happens when it runs unchecked.</p><p><strong>Timestamps</strong></p><p><strong>Key Topics Covered</strong></p><p>·         How OpenClaw works and why agentic AI changes the security model</p><p>·         The One-Click RCE and what it reveals about AI agent security</p><p>·         Malicious skills, default allow design, and autonomous privilege abuse</p><p>·         Realistic mitigation strategies including sandboxing and controlled environments</p><p><strong>Resources</strong></p><p>·         Threat Talks: https://threat-talks.com/ </p><p>·         ON2IT (Zero Trust as a Service): https://on2it.net/ </p><p>·         AMS-IX: <a href="https://www.ams-ix.net/ams">https://www.ams-ix.net/ams</a></p><p><br> Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.</p><p><br><a href="https://share.transistor.fm/s/6893ecf9/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
 </p><p>🔔 Follow and Support our channel! 🔔</p><p> === </p><p><br> ► YOUTUBE:    / @threattalks  </p><p>► SPOTIFY: https://open.spotify.com/show/1SXUyUE...</p><p>► APPLE: https://podcasts.apple.com/us/podcast...</p><p> </p><p>👕 Receive your Threat Talks T-shirt</p><p>https://threat-talks.com/</p><p> </p><p>🗺️ Explore the Hack's Route in Detail 🗺️</p><p>https://threat-talks.com</p><p> </p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Tue, 24 Feb 2026 07:59:00 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/6893ecf9/ac8b368d.mp3" length="47894206" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/qmKYWcVgzvf9eOA_pacHai4Ap84IPKRaWmDIFiu-OLk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xODM5/MTk3NmJiN2U3NmYw/YTdmNjFmNzUwNjZj/ZWUzZS5wbmc.jpg"/>
      <itunes:duration>1196</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Your biggest threat this year isn’t malware. It’s your own AI assistant.</p><p>OpenClaw connects an LLM directly to your terminal, browser, email, and chat.<br> It runs with your permissions.<br> It executes tasks without hesitation.</p><p>Days after launch, researchers found a One-Click RCE.</p><p>Cisco called it a security nightmare.</p><p>Gartner called it an unacceptable risk.</p><p>OpenClaw (formerly known as Clawdbot and Moltbot) represents a new phase of agentic AI: autonomous assistants operating inside your environment with almost no guardrails.</p><p>The headlines around OpenClaw have been clear: it’s a serious threat. But how should we handle agentic AIs like OpenClaw moving forward?</p><p>In this Threat Talks episode, Field CTO Rob Maas and SOC analyst Yuri Wit break down what OpenClaw actually does, where AI agent security breaks, and whether or not you should deploy OpenClaw.</p><p>OpenClaw is powerful. It’s useful.</p><p>It’s also proof that many of us are not ready for AI agents with this level of autonomy. </p><p>Before you let an AI agent into your systems, understand what happens when it runs unchecked.</p><p><strong>Timestamps</strong></p><p><strong>Key Topics Covered</strong></p><p>·         How OpenClaw works and why agentic AI changes the security model</p><p>·         The One-Click RCE and what it reveals about AI agent security</p><p>·         Malicious skills, default allow design, and autonomous privilege abuse</p><p>·         Realistic mitigation strategies including sandboxing and controlled environments</p><p><strong>Resources</strong></p><p>·         Threat Talks: https://threat-talks.com/ </p><p>·         ON2IT (Zero Trust as a Service): https://on2it.net/ </p><p>·         AMS-IX: <a href="https://www.ams-ix.net/ams">https://www.ams-ix.net/ams</a></p><p><br> Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.</p><p><br><a href="https://share.transistor.fm/s/6893ecf9/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
 </p><p>🔔 Follow and Support our channel! 🔔</p><p> === </p><p><br> ► YOUTUBE:    / @threattalks  </p><p>► SPOTIFY: https://open.spotify.com/show/1SXUyUE...</p><p>► APPLE: https://podcasts.apple.com/us/podcast...</p><p> </p><p>👕 Receive your Threat Talks T-shirt</p><p>https://threat-talks.com/</p><p> </p><p>🗺️ Explore the Hack's Route in Detail 🗺️</p><p>https://threat-talks.com</p><p> </p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </itunes:summary>
      <itunes:keywords>OpenClaw, Threat Talks, ON2IT</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6893ecf9/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Inside the MongoBleed Memory Leak</title>
      <itunes:title>Inside the MongoBleed Memory Leak</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">01847306-f920-45f6-b610-e71868a36eb2</guid>
      <link>https://threat-talks.com/inside-the-mongobleed-memory-leak/</link>
      <description>
        <![CDATA[<p>Imagine your memory just became the attack surface.<br>That’s MongoBleed. Or as others know it: <strong>CVE-2025-14847</strong>. No passwords to crack, no complex exploit chain. </p><p>Just normal protocol behavior, repeated at scale.</p><p>Each request leaks a little more MongoDB memory until something valuable shows up, even in environments that already follow network segmentation best practices.</p><p>Rob Maas (Field CTO, ON2IT) hosts Luca Cipriano (CTI &amp; Red Team Program Lead) to dissect <strong>MongoBleed</strong>, an unauthenticated memory leak vulnerability in MongoDB, in this episode of <strong>Threat Talks</strong>.</p><p>They break down how MongoBleed exploits MongoDB’s wire protocol before authentication and why repetition matters more than a single request. </p><p>MongoDB is everywhere: cloud platforms, scalable applications, and data-heavy environments where availability matters more than friction. If MongoDB is part of your environment, or you want to understand how this vulnerability is exploited in practice, the full breakdown is worth your time.</p><p><strong>Timestamps</strong></p><p> </p><p><strong>Key Topics Covered</strong></p><p>·         How malformed compressed messages manipulate MongoDB memory allocation</p><p>·         Why BSON string parsing can expose unintended data</p><p>·         How repeated burst requests turn small leaks into valuable information</p><p>·         Why MongoDB deployments are attractive targets in the cloud</p><p><strong>Resources</strong></p><p>·         Threat Talks: https://threat-talks.com/ </p><p>·         ON2IT (Zero Trust as a Service): https://on2it.net/ </p><p>·         AMS-IX: <a href="https://www.ams-ix.net/ams">https://www.ams-ix.net/ams</a></p><p>·         Threat Talks episode on Citrix Bleed: <a href="https://youtu.be/YwDpRPBfAzs">https://youtu.be/YwDpRPBfAzs</a></p><p><br> Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.</p><p> </p><p>🔔 Follow and Support our channel! 🔔</p><p><br> === </p><p><br> ► YOUTUBE:    / @threattalks  </p><p>► SPOTIFY: https://open.spotify.com/show/1SXUyUE...</p><p>► APPLE: https://podcasts.apple.com/us/podcast...</p><p> </p><p>👕 Receive your Threat Talks T-shirt</p><p>https://threat-talks.com/</p><p> </p><p>🗺️ Explore the Hack's Route in Detail 🗺️</p><p>https://threat-talks.com</p><p> </p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Imagine your memory just became the attack surface.<br>That’s MongoBleed. Or as others know it: <strong>CVE-2025-14847</strong>. No passwords to crack, no complex exploit chain. </p><p>Just normal protocol behavior, repeated at scale.</p><p>Each request leaks a little more MongoDB memory until something valuable shows up, even in environments that already follow network segmentation best practices.</p><p>Rob Maas (Field CTO, ON2IT) hosts Luca Cipriano (CTI &amp; Red Team Program Lead) to dissect <strong>MongoBleed</strong>, an unauthenticated memory leak vulnerability in MongoDB, in this episode of <strong>Threat Talks</strong>.</p><p>They break down how MongoBleed exploits MongoDB’s wire protocol before authentication and why repetition matters more than a single request. </p><p>MongoDB is everywhere: cloud platforms, scalable applications, and data-heavy environments where availability matters more than friction. If MongoDB is part of your environment, or you want to understand how this vulnerability is exploited in practice, the full breakdown is worth your time.</p><p><strong>Timestamps</strong></p><p> </p><p><strong>Key Topics Covered</strong></p><p>·         How malformed compressed messages manipulate MongoDB memory allocation</p><p>·         Why BSON string parsing can expose unintended data</p><p>·         How repeated burst requests turn small leaks into valuable information</p><p>·         Why MongoDB deployments are attractive targets in the cloud</p><p><strong>Resources</strong></p><p>·         Threat Talks: https://threat-talks.com/ </p><p>·         ON2IT (Zero Trust as a Service): https://on2it.net/ </p><p>·         AMS-IX: <a href="https://www.ams-ix.net/ams">https://www.ams-ix.net/ams</a></p><p>·         Threat Talks episode on Citrix Bleed: <a href="https://youtu.be/YwDpRPBfAzs">https://youtu.be/YwDpRPBfAzs</a></p><p><br> Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.</p><p> </p><p>🔔 Follow and Support our channel! 🔔</p><p><br> === </p><p><br> ► YOUTUBE:    / @threattalks  </p><p>► SPOTIFY: https://open.spotify.com/show/1SXUyUE...</p><p>► APPLE: https://podcasts.apple.com/us/podcast...</p><p> </p><p>👕 Receive your Threat Talks T-shirt</p><p>https://threat-talks.com/</p><p> </p><p>🗺️ Explore the Hack's Route in Detail 🗺️</p><p>https://threat-talks.com</p><p> </p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Tue, 17 Feb 2026 07:30:00 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/5ff212e9/e696bb6e.mp3" length="33465922" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/C-IXL3CQoljFmAvjOonURBE_yJp4nG0baDjuqmup6yQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hMDM0/ZmQ2OGE5MWU0NDVm/MTQ1NjdmMjIyZmE2/YTFmMy5wbmc.jpg"/>
      <itunes:duration>837</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Imagine your memory just became the attack surface.<br>That’s MongoBleed. Or as others know it: <strong>CVE-2025-14847</strong>. No passwords to crack, no complex exploit chain. </p><p>Just normal protocol behavior, repeated at scale.</p><p>Each request leaks a little more MongoDB memory until something valuable shows up, even in environments that already follow network segmentation best practices.</p><p>Rob Maas (Field CTO, ON2IT) hosts Luca Cipriano (CTI &amp; Red Team Program Lead) to dissect <strong>MongoBleed</strong>, an unauthenticated memory leak vulnerability in MongoDB, in this episode of <strong>Threat Talks</strong>.</p><p>They break down how MongoBleed exploits MongoDB’s wire protocol before authentication and why repetition matters more than a single request. </p><p>MongoDB is everywhere: cloud platforms, scalable applications, and data-heavy environments where availability matters more than friction. If MongoDB is part of your environment, or you want to understand how this vulnerability is exploited in practice, the full breakdown is worth your time.</p><p><strong>Timestamps</strong></p><p> </p><p><strong>Key Topics Covered</strong></p><p>·         How malformed compressed messages manipulate MongoDB memory allocation</p><p>·         Why BSON string parsing can expose unintended data</p><p>·         How repeated burst requests turn small leaks into valuable information</p><p>·         Why MongoDB deployments are attractive targets in the cloud</p><p><strong>Resources</strong></p><p>·         Threat Talks: https://threat-talks.com/ </p><p>·         ON2IT (Zero Trust as a Service): https://on2it.net/ </p><p>·         AMS-IX: <a href="https://www.ams-ix.net/ams">https://www.ams-ix.net/ams</a></p><p>·         Threat Talks episode on Citrix Bleed: <a href="https://youtu.be/YwDpRPBfAzs">https://youtu.be/YwDpRPBfAzs</a></p><p><br> Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.</p><p> </p><p>🔔 Follow and Support our channel! 🔔</p><p><br> === </p><p><br> ► YOUTUBE:    / @threattalks  </p><p>► SPOTIFY: https://open.spotify.com/show/1SXUyUE...</p><p>► APPLE: https://podcasts.apple.com/us/podcast...</p><p> </p><p>👕 Receive your Threat Talks T-shirt</p><p>https://threat-talks.com/</p><p> </p><p>🗺️ Explore the Hack's Route in Detail 🗺️</p><p>https://threat-talks.com</p><p> </p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/5ff212e9/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>How to pass any cybersecurity certification</title>
      <itunes:title>How to pass any cybersecurity certification</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c21dbcab-6aa4-40a9-bba3-605565c3d3b0</guid>
      <link>https://threat-talks.com/how-to-pass-any-cybersecurity-certification/</link>
      <description>
        <![CDATA[<p>Certifications play a central role in cybersecurity career development.<br>Yet many experienced engineers find themselves failing exams they should easily pass.</p><p>The problem isn’t a lack of knowledge or skills.</p><p>It’s the disconnect between real-world security work, and certifications built around memorization, UI trivia, and version-specific details that will be obsolete in two months.</p><p>In this episode of Threat Talks, <strong>Rob Maas</strong> (Field CTO, ON2IT) and <strong>Nicholai Piagentini</strong>(Technical Enablement Engineer, ON2IT) break down why this happens, how certification exams are designed, and how to pass <strong>any</strong> cybersecurity certification without memorization or falling for trick questions. </p><p>They explore how well-written exams validate real job tasks, while poorly designed ones drift into reading comprehension, UI trivia, and version-specific details that lose value the moment the product changes.</p><p>From blueprint-driven preparation to smart elimination tactics and knowing when not to overthink an answer, this is a grounded look at <strong>how to pass any certification for meaningful cybersecurity qualifications</strong>.</p><p><strong>Timestamps<br></strong></p><p><br></p><p><strong>Key Topics Covered</strong></p><p>·         Why many certification exams fail at measuring real-world cybersecurity skills</p><p>·         How to pass cybersecurity certification exams by focusing on concepts, not memorization</p><p>·         What makes a <em>good</em> vs <em>bad</em> exam (and how vendors design them)</p><p>·         Practical tactics for exam day, preparation strategies, and dealing with nerves</p><p> </p><p><strong>Resources</strong></p><p>·         Threat Talks: https://threat-talks.com/ </p><p>·         ON2IT (Zero Trust as a Service): https://on2it.net/ </p><p>·         AMS-IX: https://www.ams-ix.net/ams</p><p><br>Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.</p><p> </p><p>🔔 Follow and Support our channel! 🔔</p><p><br> === </p><p><br>► YOUTUBE:    / @threattalks  </p><p>► SPOTIFY: https://open.spotify.com/show/1SXUyUE...</p><p>► APPLE: https://podcasts.apple.com/us/podcast...</p><p> </p><p>👕 Receive your Threat Talks T-shirt</p><p>https://threat-talks.com/</p><p> </p><p>🗺️ Explore the Hack's Route in Detail 🗺️</p><p>https://threat-talks.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Certifications play a central role in cybersecurity career development.<br>Yet many experienced engineers find themselves failing exams they should easily pass.</p><p>The problem isn’t a lack of knowledge or skills.</p><p>It’s the disconnect between real-world security work, and certifications built around memorization, UI trivia, and version-specific details that will be obsolete in two months.</p><p>In this episode of Threat Talks, <strong>Rob Maas</strong> (Field CTO, ON2IT) and <strong>Nicholai Piagentini</strong>(Technical Enablement Engineer, ON2IT) break down why this happens, how certification exams are designed, and how to pass <strong>any</strong> cybersecurity certification without memorization or falling for trick questions. </p><p>They explore how well-written exams validate real job tasks, while poorly designed ones drift into reading comprehension, UI trivia, and version-specific details that lose value the moment the product changes.</p><p>From blueprint-driven preparation to smart elimination tactics and knowing when not to overthink an answer, this is a grounded look at <strong>how to pass any certification for meaningful cybersecurity qualifications</strong>.</p><p><strong>Timestamps<br></strong></p><p><br></p><p><strong>Key Topics Covered</strong></p><p>·         Why many certification exams fail at measuring real-world cybersecurity skills</p><p>·         How to pass cybersecurity certification exams by focusing on concepts, not memorization</p><p>·         What makes a <em>good</em> vs <em>bad</em> exam (and how vendors design them)</p><p>·         Practical tactics for exam day, preparation strategies, and dealing with nerves</p><p> </p><p><strong>Resources</strong></p><p>·         Threat Talks: https://threat-talks.com/ </p><p>·         ON2IT (Zero Trust as a Service): https://on2it.net/ </p><p>·         AMS-IX: https://www.ams-ix.net/ams</p><p><br>Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.</p><p> </p><p>🔔 Follow and Support our channel! 🔔</p><p><br> === </p><p><br>► YOUTUBE:    / @threattalks  </p><p>► SPOTIFY: https://open.spotify.com/show/1SXUyUE...</p><p>► APPLE: https://podcasts.apple.com/us/podcast...</p><p> </p><p>👕 Receive your Threat Talks T-shirt</p><p>https://threat-talks.com/</p><p> </p><p>🗺️ Explore the Hack's Route in Detail 🗺️</p><p>https://threat-talks.com</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 08:00:00 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/5f541fd0/e198ba31.mp3" length="52760963" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/8LRTvXSHWmx-CodjBMmVzBqdYgbjkbTAh8nk5eDIEyQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85NDNh/OWIyZTlhODI5ODNl/M2VkN2VhODIyOGEw/NzlmMi5wbmc.jpg"/>
      <itunes:duration>1319</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Certifications play a central role in cybersecurity career development.<br>Yet many experienced engineers find themselves failing exams they should easily pass.</p><p>The problem isn’t a lack of knowledge or skills.</p><p>It’s the disconnect between real-world security work, and certifications built around memorization, UI trivia, and version-specific details that will be obsolete in two months.</p><p>In this episode of Threat Talks, <strong>Rob Maas</strong> (Field CTO, ON2IT) and <strong>Nicholai Piagentini</strong>(Technical Enablement Engineer, ON2IT) break down why this happens, how certification exams are designed, and how to pass <strong>any</strong> cybersecurity certification without memorization or falling for trick questions. </p><p>They explore how well-written exams validate real job tasks, while poorly designed ones drift into reading comprehension, UI trivia, and version-specific details that lose value the moment the product changes.</p><p>From blueprint-driven preparation to smart elimination tactics and knowing when not to overthink an answer, this is a grounded look at <strong>how to pass any certification for meaningful cybersecurity qualifications</strong>.</p><p><strong>Timestamps<br></strong></p><p><br></p><p><strong>Key Topics Covered</strong></p><p>·         Why many certification exams fail at measuring real-world cybersecurity skills</p><p>·         How to pass cybersecurity certification exams by focusing on concepts, not memorization</p><p>·         What makes a <em>good</em> vs <em>bad</em> exam (and how vendors design them)</p><p>·         Practical tactics for exam day, preparation strategies, and dealing with nerves</p><p> </p><p><strong>Resources</strong></p><p>·         Threat Talks: https://threat-talks.com/ </p><p>·         ON2IT (Zero Trust as a Service): https://on2it.net/ </p><p>·         AMS-IX: https://www.ams-ix.net/ams</p><p><br>Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.</p><p> </p><p>🔔 Follow and Support our channel! 🔔</p><p><br> === </p><p><br>► YOUTUBE:    / @threattalks  </p><p>► SPOTIFY: https://open.spotify.com/show/1SXUyUE...</p><p>► APPLE: https://podcasts.apple.com/us/podcast...</p><p> </p><p>👕 Receive your Threat Talks T-shirt</p><p>https://threat-talks.com/</p><p> </p><p>🗺️ Explore the Hack's Route in Detail 🗺️</p><p>https://threat-talks.com</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity certification, cybersecurity qualifications</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/5f541fd0/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>The Battle of Defending a Digital City</title>
      <itunes:title>The Battle of Defending a Digital City</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6e8bd011-7912-4cf3-a078-1394399323fb</guid>
      <link>https://share.transistor.fm/s/8808890c</link>
      <description>
        <![CDATA[<p>When it comes to running an airport, there’s no room for error.</p><p>Any casualty is one too much.</p><p> </p><p>That’s the reality of all airports, including DFW Airport. It’s a 28-square-mile operation, bigger than the island of Manhattan, functioning as a city with its own police, fire services, OT environments, and always-on digital infrastructure.</p><p> </p><p>In this Threat Talks episode, Lieuwe-Jan Koning (Co-Founder and CTO, ON2IT) sits down with Eric Bowerman (CISO of DFW Airport), to unpack how cybersecurity actually works when IT, OT, and physical safety collide. </p><p> </p><p>From digital transformation security to real-world OT security and IT/OT convergence, this is a rare, grounded look at defending critical infrastructure where failure isn’t theoretical - it’s operational.</p><p><br><strong>Timestamps</strong></p><p><br></p><p><strong>Key Topics Covered</strong></p><ul><li>How a major airport functions as a <strong>digital city</strong> with IT, OT, and cyber-physical risk</li><li>Practical <strong>OT security</strong> strategies when patching and downtime aren’t options</li><li>Why <strong>IT/OT convergence</strong> changes threat modeling, segmentation, and detection</li></ul><p>Resilience-first security: keeping passengers, planes, and operations moving</p><p><a href="https://share.transistor.fm/s/8808890c/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br><strong>Related ON2IT Content &amp; Referenced Resources</strong></p><p>Threat Talks website: <a href="https://threat-talks.com/">https://threat-talks.com/</a><br> ON2IT website: <a href="https://on2it.net/">https://on2it.net/</a></p><p><br></p><p>If you’re responsible for <strong>critical infrastructure, OT environments, or large-scale digital transformation</strong>, this episode is essential viewing.</p><p>🔔 <strong>Subscribe and turn on notifications</strong> to stay ahead of emerging cyber threats across IT, OT, and critical infrastructure.</p><p>===<br>► YOUTUBE: / @threattalks<br> ► SPOTIFY: <a href="https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E">https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E</a></p><p>► APPLE: <a href="https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520">https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>When it comes to running an airport, there’s no room for error.</p><p>Any casualty is one too much.</p><p> </p><p>That’s the reality of all airports, including DFW Airport. It’s a 28-square-mile operation, bigger than the island of Manhattan, functioning as a city with its own police, fire services, OT environments, and always-on digital infrastructure.</p><p> </p><p>In this Threat Talks episode, Lieuwe-Jan Koning (Co-Founder and CTO, ON2IT) sits down with Eric Bowerman (CISO of DFW Airport), to unpack how cybersecurity actually works when IT, OT, and physical safety collide. </p><p> </p><p>From digital transformation security to real-world OT security and IT/OT convergence, this is a rare, grounded look at defending critical infrastructure where failure isn’t theoretical - it’s operational.</p><p><br><strong>Timestamps</strong></p><p><br></p><p><strong>Key Topics Covered</strong></p><ul><li>How a major airport functions as a <strong>digital city</strong> with IT, OT, and cyber-physical risk</li><li>Practical <strong>OT security</strong> strategies when patching and downtime aren’t options</li><li>Why <strong>IT/OT convergence</strong> changes threat modeling, segmentation, and detection</li></ul><p>Resilience-first security: keeping passengers, planes, and operations moving</p><p><a href="https://share.transistor.fm/s/8808890c/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br><strong>Related ON2IT Content &amp; Referenced Resources</strong></p><p>Threat Talks website: <a href="https://threat-talks.com/">https://threat-talks.com/</a><br> ON2IT website: <a href="https://on2it.net/">https://on2it.net/</a></p><p><br></p><p>If you’re responsible for <strong>critical infrastructure, OT environments, or large-scale digital transformation</strong>, this episode is essential viewing.</p><p>🔔 <strong>Subscribe and turn on notifications</strong> to stay ahead of emerging cyber threats across IT, OT, and critical infrastructure.</p><p>===<br>► YOUTUBE: / @threattalks<br> ► SPOTIFY: <a href="https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E">https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E</a></p><p>► APPLE: <a href="https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520">https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</a></p>]]>
      </content:encoded>
      <pubDate>Tue, 03 Feb 2026 08:36:05 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/8808890c/84f9cd92.mp3" length="113368733" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/kq0OM8P1Vd7UhrzwunJJ6ELBTmlkgxqrke0r06OUnQE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jNDAz/Njk0YjU2ODZjOTdm/YjFhODg2N2Q0YjY1/OWU2Yi5wbmc.jpg"/>
      <itunes:duration>2832</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>When it comes to running an airport, there’s no room for error.</p><p>Any casualty is one too much.</p><p> </p><p>That’s the reality of all airports, including DFW Airport. It’s a 28-square-mile operation, bigger than the island of Manhattan, functioning as a city with its own police, fire services, OT environments, and always-on digital infrastructure.</p><p> </p><p>In this Threat Talks episode, Lieuwe-Jan Koning (Co-Founder and CTO, ON2IT) sits down with Eric Bowerman (CISO of DFW Airport), to unpack how cybersecurity actually works when IT, OT, and physical safety collide. </p><p> </p><p>From digital transformation security to real-world OT security and IT/OT convergence, this is a rare, grounded look at defending critical infrastructure where failure isn’t theoretical - it’s operational.</p><p><br><strong>Timestamps</strong></p><p><br></p><p><strong>Key Topics Covered</strong></p><ul><li>How a major airport functions as a <strong>digital city</strong> with IT, OT, and cyber-physical risk</li><li>Practical <strong>OT security</strong> strategies when patching and downtime aren’t options</li><li>Why <strong>IT/OT convergence</strong> changes threat modeling, segmentation, and detection</li></ul><p>Resilience-first security: keeping passengers, planes, and operations moving</p><p><a href="https://share.transistor.fm/s/8808890c/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br><strong>Related ON2IT Content &amp; Referenced Resources</strong></p><p>Threat Talks website: <a href="https://threat-talks.com/">https://threat-talks.com/</a><br> ON2IT website: <a href="https://on2it.net/">https://on2it.net/</a></p><p><br></p><p>If you’re responsible for <strong>critical infrastructure, OT environments, or large-scale digital transformation</strong>, this episode is essential viewing.</p><p>🔔 <strong>Subscribe and turn on notifications</strong> to stay ahead of emerging cyber threats across IT, OT, and critical infrastructure.</p><p>===<br>► YOUTUBE: / @threattalks<br> ► SPOTIFY: <a href="https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E">https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E</a></p><p>► APPLE: <a href="https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520">https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Defending a Digital City, digital transformation security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/8808890c/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/8808890c/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/8808890c/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/8808890c/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/8808890c/transcription" type="text/html"/>
    </item>
    <item>
      <title>From IPs to people</title>
      <itunes:title>From IPs to people</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">84003034-ec65-47db-bd96-3f613f5066fd</guid>
      <link>https://share.transistor.fm/s/a50a793d</link>
      <description>
        <![CDATA[<p>Detection fails without identity. <br>When activity isn’t tied to a person, anomalies stop telling a story - they’re just signals without context. And when your logs only show IP addresses, your security team is left responding to shadows, not real risk. </p><p>In this Threat Talks Deep Dive, Rob Maas (Field CTO, ON2IT) and Nicholai Piagentini (Technical Enablement Engineer, ON2IT) show how identity-based firewalling fixes that-by enforcing policy based on who the user is, not where they connect from.The result: stronger network access control, cleaner zero trust firewall enforcement, and better enterprise security decisions. </p><p></p><ul><li>(00:56) - Intro - Detection fails without identity</li>
<li>(01:02:07) - Identity signals - users, devices, tags</li>
<li>(02:15:43) - Why identity-based firewalls win - zero trust &amp; threat detection</li>
<li>(04:48:01) - Why teams skip it -“as-is” migrations &amp; fear of complexity</li>
<li>(07:08:13) - Terminal servers - a network access control blind spot</li>
<li>(08:17:11) - NAT &amp; service accounts - who is the real identity?</li>
<li>(10:15:12) - When user ID feels impossible - the wireless workaround</li>
<li>(11:12:12) - How to start safely - turn it on, validate, tighten policy</li>
<li>(14:16:30) - Not optional anymore - zero trust firewall due diligence</li>
<li>(15:30:01) - Best advice - start imperfect, identity data wins</li>
<li>(17:09:58) - Wrap - stop guessing, know who’s acting</li>
</ul><br>Key Topics Covered<br>• Why anomaly detection breaks without identity correlation in firewall logs<br>• How identity-based policy improves network access control and reduces lateral movement<br>• Common failure points: terminal servers, NAT, service accounts, AD timeouts<br>• A low-risk rollout: enable for visibility first, then enforce zero trust rules<p>Related ON2IT content &amp; explicitly referenced resources<br>https://threat-talks.com/<br>https://on2it.net/<br>https://www.ams-ix.net/ams</p><p>Threat Talks connects cyber threats to operational reality-so CISOs and architects can make decisions faster.</p><p>Subscribe, follow, and turn on notifications to stay ahead of what changes enterprise security next.</p><p><a href="https://share.transistor.fm/s/a50a793d/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Detection fails without identity. <br>When activity isn’t tied to a person, anomalies stop telling a story - they’re just signals without context. And when your logs only show IP addresses, your security team is left responding to shadows, not real risk. </p><p>In this Threat Talks Deep Dive, Rob Maas (Field CTO, ON2IT) and Nicholai Piagentini (Technical Enablement Engineer, ON2IT) show how identity-based firewalling fixes that-by enforcing policy based on who the user is, not where they connect from.The result: stronger network access control, cleaner zero trust firewall enforcement, and better enterprise security decisions. </p><p></p><ul><li>(00:56) - Intro - Detection fails without identity</li>
<li>(01:02:07) - Identity signals - users, devices, tags</li>
<li>(02:15:43) - Why identity-based firewalls win - zero trust &amp; threat detection</li>
<li>(04:48:01) - Why teams skip it -“as-is” migrations &amp; fear of complexity</li>
<li>(07:08:13) - Terminal servers - a network access control blind spot</li>
<li>(08:17:11) - NAT &amp; service accounts - who is the real identity?</li>
<li>(10:15:12) - When user ID feels impossible - the wireless workaround</li>
<li>(11:12:12) - How to start safely - turn it on, validate, tighten policy</li>
<li>(14:16:30) - Not optional anymore - zero trust firewall due diligence</li>
<li>(15:30:01) - Best advice - start imperfect, identity data wins</li>
<li>(17:09:58) - Wrap - stop guessing, know who’s acting</li>
</ul><br>Key Topics Covered<br>• Why anomaly detection breaks without identity correlation in firewall logs<br>• How identity-based policy improves network access control and reduces lateral movement<br>• Common failure points: terminal servers, NAT, service accounts, AD timeouts<br>• A low-risk rollout: enable for visibility first, then enforce zero trust rules<p>Related ON2IT content &amp; explicitly referenced resources<br>https://threat-talks.com/<br>https://on2it.net/<br>https://www.ams-ix.net/ams</p><p>Threat Talks connects cyber threats to operational reality-so CISOs and architects can make decisions faster.</p><p>Subscribe, follow, and turn on notifications to stay ahead of what changes enterprise security next.</p><p><a href="https://share.transistor.fm/s/a50a793d/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Tue, 27 Jan 2026 07:17:18 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/a50a793d/7841bf85.mp3" length="43719045" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/rF_Xw15UNyx6u2wop-BW_kbdn21M3SmMPGektwNHUuw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xODFl/ZDA5Y2Y4OWJhNjgy/ZTllMTgwNDU0NTMz/OGE5Yy5wbmc.jpg"/>
      <itunes:duration>1092</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Detection fails without identity. <br>When activity isn’t tied to a person, anomalies stop telling a story - they’re just signals without context. And when your logs only show IP addresses, your security team is left responding to shadows, not real risk. </p><p>In this Threat Talks Deep Dive, Rob Maas (Field CTO, ON2IT) and Nicholai Piagentini (Technical Enablement Engineer, ON2IT) show how identity-based firewalling fixes that-by enforcing policy based on who the user is, not where they connect from.The result: stronger network access control, cleaner zero trust firewall enforcement, and better enterprise security decisions. </p><p></p><ul><li>(00:56) - Intro - Detection fails without identity</li>
<li>(01:02:07) - Identity signals - users, devices, tags</li>
<li>(02:15:43) - Why identity-based firewalls win - zero trust &amp; threat detection</li>
<li>(04:48:01) - Why teams skip it -“as-is” migrations &amp; fear of complexity</li>
<li>(07:08:13) - Terminal servers - a network access control blind spot</li>
<li>(08:17:11) - NAT &amp; service accounts - who is the real identity?</li>
<li>(10:15:12) - When user ID feels impossible - the wireless workaround</li>
<li>(11:12:12) - How to start safely - turn it on, validate, tighten policy</li>
<li>(14:16:30) - Not optional anymore - zero trust firewall due diligence</li>
<li>(15:30:01) - Best advice - start imperfect, identity data wins</li>
<li>(17:09:58) - Wrap - stop guessing, know who’s acting</li>
</ul><br>Key Topics Covered<br>• Why anomaly detection breaks without identity correlation in firewall logs<br>• How identity-based policy improves network access control and reduces lateral movement<br>• Common failure points: terminal servers, NAT, service accounts, AD timeouts<br>• A low-risk rollout: enable for visibility first, then enforce zero trust rules<p>Related ON2IT content &amp; explicitly referenced resources<br>https://threat-talks.com/<br>https://on2it.net/<br>https://www.ams-ix.net/ams</p><p>Threat Talks connects cyber threats to operational reality-so CISOs and architects can make decisions faster.</p><p>Subscribe, follow, and turn on notifications to stay ahead of what changes enterprise security next.</p><p><a href="https://share.transistor.fm/s/a50a793d/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </itunes:summary>
      <itunes:keywords>IPs to People, Threat Talks, Cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/a50a793d/transcript.srt" type="application/x-subrip" rel="captions"/>
      <podcast:chapters url="https://share.transistor.fm/s/a50a793d/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Beyond NIS2 Compliance</title>
      <itunes:title>Beyond NIS2 Compliance</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">682a084b-017e-46b7-96df-0639c320d662</guid>
      <link>https://threat-talks.com/beyond-nis2-compliance/</link>
      <description>
        <![CDATA[<p>Most organizations ask one question:<br> <strong>“Are we compliant?”</strong></p><p><br>The question that actually matters is:<br> <strong>“Will we still be operating when things go wrong?”</strong></p><p><br>In this Threat Talks episode, Lieuwe Jan Koning speaks with Jasper Nagtegaal about what NIS2 is really trying to change - and why cyber resilience fails when organizations treat it as a policy exercise instead of a business risk.</p><p><br>This isn’t about regulators.<br>It’s about how digital risk is explained, understood, and acted on - from technical teams to the boardroom - and why organizations that meet <strong>NIS2</strong> in practice think very differently from those that end up explaining them.</p><p><br></p><ul><li>(00:15) - Fine or resilience: the question that changes everything</li>
<li>(02:20:26) - Why cyber incidents are business failures, not IT failures</li>
<li>(05:30:35) - NIS2 in plain terms: resilience over compliance</li>
<li>(06:35:31) - Building resilience before incidents — not after fines</li>
<li>(13:31:12) - Risk-based focus: you can’t protect everything</li>
<li>(16:12:37) - Why consequences still matter - and when they appear</li>
<li>(18:37:18) - What cybersecurity can learn from aviation, energy &amp; healthcare</li>
<li>(18:18) - Why digital risk is still treated as a compliance burden</li>
<li>(05:18:14) - Why cyber regulation works differently across countries</li>
<li>(09:14:13) - What to do tomorrow: risk, boards, and real accountability</li>
<li>(21:13:28) - Wrap: resilience first, compliance follows</li>
</ul><br><strong>Speakers</strong><br> Lieuwe Jan Koning - Security Operations Center, ON2IT<br> Jasper Nagtegaal - Director of Digital Resilience, Dutch Authority for Digital Infrastructure (RDI)<p><a href="https://share.transistor.fm/s/daeb7faf/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Most organizations ask one question:<br> <strong>“Are we compliant?”</strong></p><p><br>The question that actually matters is:<br> <strong>“Will we still be operating when things go wrong?”</strong></p><p><br>In this Threat Talks episode, Lieuwe Jan Koning speaks with Jasper Nagtegaal about what NIS2 is really trying to change - and why cyber resilience fails when organizations treat it as a policy exercise instead of a business risk.</p><p><br>This isn’t about regulators.<br>It’s about how digital risk is explained, understood, and acted on - from technical teams to the boardroom - and why organizations that meet <strong>NIS2</strong> in practice think very differently from those that end up explaining them.</p><p><br></p><ul><li>(00:15) - Fine or resilience: the question that changes everything</li>
<li>(02:20:26) - Why cyber incidents are business failures, not IT failures</li>
<li>(05:30:35) - NIS2 in plain terms: resilience over compliance</li>
<li>(06:35:31) - Building resilience before incidents — not after fines</li>
<li>(13:31:12) - Risk-based focus: you can’t protect everything</li>
<li>(16:12:37) - Why consequences still matter - and when they appear</li>
<li>(18:37:18) - What cybersecurity can learn from aviation, energy &amp; healthcare</li>
<li>(18:18) - Why digital risk is still treated as a compliance burden</li>
<li>(05:18:14) - Why cyber regulation works differently across countries</li>
<li>(09:14:13) - What to do tomorrow: risk, boards, and real accountability</li>
<li>(21:13:28) - Wrap: resilience first, compliance follows</li>
</ul><br><strong>Speakers</strong><br> Lieuwe Jan Koning - Security Operations Center, ON2IT<br> Jasper Nagtegaal - Director of Digital Resilience, Dutch Authority for Digital Infrastructure (RDI)<p><a href="https://share.transistor.fm/s/daeb7faf/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </content:encoded>
      <pubDate>Wed, 21 Jan 2026 06:56:39 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/daeb7faf/ceea685b.mp3" length="114362617" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/yoH1goqqBR4jwPo5W11RtJF3apye2sucfg6WhxxE1YI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84ZjBj/Y2ZmM2E0ZGU3Y2Mx/MzViOWQzYWVjYTQw/MThkMS5wbmc.jpg"/>
      <itunes:duration>2858</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Most organizations ask one question:<br> <strong>“Are we compliant?”</strong></p><p><br>The question that actually matters is:<br> <strong>“Will we still be operating when things go wrong?”</strong></p><p><br>In this Threat Talks episode, Lieuwe Jan Koning speaks with Jasper Nagtegaal about what NIS2 is really trying to change - and why cyber resilience fails when organizations treat it as a policy exercise instead of a business risk.</p><p><br>This isn’t about regulators.<br>It’s about how digital risk is explained, understood, and acted on - from technical teams to the boardroom - and why organizations that meet <strong>NIS2</strong> in practice think very differently from those that end up explaining them.</p><p><br></p><ul><li>(00:15) - Fine or resilience: the question that changes everything</li>
<li>(02:20:26) - Why cyber incidents are business failures, not IT failures</li>
<li>(05:30:35) - NIS2 in plain terms: resilience over compliance</li>
<li>(06:35:31) - Building resilience before incidents — not after fines</li>
<li>(13:31:12) - Risk-based focus: you can’t protect everything</li>
<li>(16:12:37) - Why consequences still matter - and when they appear</li>
<li>(18:37:18) - What cybersecurity can learn from aviation, energy &amp; healthcare</li>
<li>(18:18) - Why digital risk is still treated as a compliance burden</li>
<li>(05:18:14) - Why cyber regulation works differently across countries</li>
<li>(09:14:13) - What to do tomorrow: risk, boards, and real accountability</li>
<li>(21:13:28) - Wrap: resilience first, compliance follows</li>
</ul><br><strong>Speakers</strong><br> Lieuwe Jan Koning - Security Operations Center, ON2IT<br> Jasper Nagtegaal - Director of Digital Resilience, Dutch Authority for Digital Infrastructure (RDI)<p><a href="https://share.transistor.fm/s/daeb7faf/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </itunes:summary>
      <itunes:keywords>NIS2, Compliance</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/daeb7faf/transcript.srt" type="application/x-subrip" rel="captions"/>
      <podcast:chapters url="https://share.transistor.fm/s/daeb7faf/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Maritime Cybersecurity: Predictable = Hackable</title>
      <itunes:title>Maritime Cybersecurity: Predictable = Hackable</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c09ee6ee-51c0-4895-ab3d-94705878fa65</guid>
      <link>https://share.transistor.fm/s/405ffdc2</link>
      <description>
        <![CDATA[<p>You’re Port Control. A vessel requests entry.<br>No captain. No crew. Just autonomy.</p><p>In maritime cybersecurity, the risk isn’t that the ship is autonomous.<br>It’s that you no longer know who’s steering.</p><p>Lieuwe Jan Koning (Co-Founder &amp; CTO, ON2IT) joins Stephen McCombie (Professor of Maritime IT Security, NHL Stenden) and Hans Quivooij (CISO, Damen Shipyards) to expose the illusion of control in autonomous shipping - where technology moves fast, responsibility blurs, and regulation lags behind.</p><p></p><ul><li>(00:05) - No captain, just code: the Port Control dilemma</li>
<li>(02:05:15) - Autonomous shipping is here - and it’s remote by design</li>
<li>(06:15:48) - When it crashes: who owns the blame (and the bill)?</li>
<li>(07:38:12) - Ready or not: why “keeping watch” breaks at sea</li>
<li>(10:12:49) - Predictable = steerable: the risks most teams miss</li>
<li>(13:49:46) - Visibility vs compromise: when the ship becomes a weapon</li>
<li>(18:46:10) - The mindset shift: from castles to constant compromise</li>
<li>(20:10:45) - Regulation gap: high impact, low control</li>
<li>(21:45:50) - Too late? Only if you stay blind to real threats</li>
<li>(01:50:19) - Stop splitting IT and OT: defend vessels like HQ</li>
<li>(05:19:42) - Put it on the agenda: ask better questions, run scenarios</li>
<li>(09:42:22) - Wrap: make it tangible, build security into autonomy</li>
</ul><br>Key Topics Covered<br>• Why maritime cybersecurity now decides physical safety, not just data protection<br>• How predictability in autonomous vessels creates exploitable maritime cyber risk<br>• Where responsibility breaks down when humans leave the bridge<br>• What cyber attacks on critical infrastructure look like once they reach the sea<br>• What to do next to protect against cyber attacks at sea<p>Related ON2IT content &amp; explicitly referenced resources<br>Before the Mayday: Cyber Attacks at Sea: https://www.youtube.com/watch?v=4rxWUmjbYOo <br>Hack the Boat episode: https://www.youtube.com/watch?v=Xa0TJ3eRTCw <br>Threat Talks: https://threat-talks.com/<br>ON2IT (Zero Trust as a Service): https://on2it.net/<br>AMS-IX: https://www.ams-ix.net/ams</p><p>Threat Talks connects cyber threats to operational reality - every week.<br>Subscribe and turn on notifications to stay ahead of emerging cyber threats across IT, OT, and critical infrastructure.</p><p><a href="https://share.transistor.fm/s/405ffdc2/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>You’re Port Control. A vessel requests entry.<br>No captain. No crew. Just autonomy.</p><p>In maritime cybersecurity, the risk isn’t that the ship is autonomous.<br>It’s that you no longer know who’s steering.</p><p>Lieuwe Jan Koning (Co-Founder &amp; CTO, ON2IT) joins Stephen McCombie (Professor of Maritime IT Security, NHL Stenden) and Hans Quivooij (CISO, Damen Shipyards) to expose the illusion of control in autonomous shipping - where technology moves fast, responsibility blurs, and regulation lags behind.</p><p></p><ul><li>(00:05) - No captain, just code: the Port Control dilemma</li>
<li>(02:05:15) - Autonomous shipping is here - and it’s remote by design</li>
<li>(06:15:48) - When it crashes: who owns the blame (and the bill)?</li>
<li>(07:38:12) - Ready or not: why “keeping watch” breaks at sea</li>
<li>(10:12:49) - Predictable = steerable: the risks most teams miss</li>
<li>(13:49:46) - Visibility vs compromise: when the ship becomes a weapon</li>
<li>(18:46:10) - The mindset shift: from castles to constant compromise</li>
<li>(20:10:45) - Regulation gap: high impact, low control</li>
<li>(21:45:50) - Too late? Only if you stay blind to real threats</li>
<li>(01:50:19) - Stop splitting IT and OT: defend vessels like HQ</li>
<li>(05:19:42) - Put it on the agenda: ask better questions, run scenarios</li>
<li>(09:42:22) - Wrap: make it tangible, build security into autonomy</li>
</ul><br>Key Topics Covered<br>• Why maritime cybersecurity now decides physical safety, not just data protection<br>• How predictability in autonomous vessels creates exploitable maritime cyber risk<br>• Where responsibility breaks down when humans leave the bridge<br>• What cyber attacks on critical infrastructure look like once they reach the sea<br>• What to do next to protect against cyber attacks at sea<p>Related ON2IT content &amp; explicitly referenced resources<br>Before the Mayday: Cyber Attacks at Sea: https://www.youtube.com/watch?v=4rxWUmjbYOo <br>Hack the Boat episode: https://www.youtube.com/watch?v=Xa0TJ3eRTCw <br>Threat Talks: https://threat-talks.com/<br>ON2IT (Zero Trust as a Service): https://on2it.net/<br>AMS-IX: https://www.ams-ix.net/ams</p><p>Threat Talks connects cyber threats to operational reality - every week.<br>Subscribe and turn on notifications to stay ahead of emerging cyber threats across IT, OT, and critical infrastructure.</p><p><a href="https://share.transistor.fm/s/405ffdc2/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Tue, 13 Jan 2026 07:17:37 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/405ffdc2/37076c68.mp3" length="90078714" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/n4Xya61ZnKTuBeCPmcPNKe2Ol3z5ZaNV_vS9MyLj82A/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hOTQ4/NjQ3MjAzZTNjNmNl/ZDYzOGM2NWU2NjI2/YTFjNS5wbmc.jpg"/>
      <itunes:duration>2252</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>You’re Port Control. A vessel requests entry.<br>No captain. No crew. Just autonomy.</p><p>In maritime cybersecurity, the risk isn’t that the ship is autonomous.<br>It’s that you no longer know who’s steering.</p><p>Lieuwe Jan Koning (Co-Founder &amp; CTO, ON2IT) joins Stephen McCombie (Professor of Maritime IT Security, NHL Stenden) and Hans Quivooij (CISO, Damen Shipyards) to expose the illusion of control in autonomous shipping - where technology moves fast, responsibility blurs, and regulation lags behind.</p><p></p><ul><li>(00:05) - No captain, just code: the Port Control dilemma</li>
<li>(02:05:15) - Autonomous shipping is here - and it’s remote by design</li>
<li>(06:15:48) - When it crashes: who owns the blame (and the bill)?</li>
<li>(07:38:12) - Ready or not: why “keeping watch” breaks at sea</li>
<li>(10:12:49) - Predictable = steerable: the risks most teams miss</li>
<li>(13:49:46) - Visibility vs compromise: when the ship becomes a weapon</li>
<li>(18:46:10) - The mindset shift: from castles to constant compromise</li>
<li>(20:10:45) - Regulation gap: high impact, low control</li>
<li>(21:45:50) - Too late? Only if you stay blind to real threats</li>
<li>(01:50:19) - Stop splitting IT and OT: defend vessels like HQ</li>
<li>(05:19:42) - Put it on the agenda: ask better questions, run scenarios</li>
<li>(09:42:22) - Wrap: make it tangible, build security into autonomy</li>
</ul><br>Key Topics Covered<br>• Why maritime cybersecurity now decides physical safety, not just data protection<br>• How predictability in autonomous vessels creates exploitable maritime cyber risk<br>• Where responsibility breaks down when humans leave the bridge<br>• What cyber attacks on critical infrastructure look like once they reach the sea<br>• What to do next to protect against cyber attacks at sea<p>Related ON2IT content &amp; explicitly referenced resources<br>Before the Mayday: Cyber Attacks at Sea: https://www.youtube.com/watch?v=4rxWUmjbYOo <br>Hack the Boat episode: https://www.youtube.com/watch?v=Xa0TJ3eRTCw <br>Threat Talks: https://threat-talks.com/<br>ON2IT (Zero Trust as a Service): https://on2it.net/<br>AMS-IX: https://www.ams-ix.net/ams</p><p>Threat Talks connects cyber threats to operational reality - every week.<br>Subscribe and turn on notifications to stay ahead of emerging cyber threats across IT, OT, and critical infrastructure.</p><p><a href="https://share.transistor.fm/s/405ffdc2/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/405ffdc2/transcript.srt" type="application/x-subrip" rel="captions"/>
      <podcast:chapters url="https://share.transistor.fm/s/405ffdc2/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Before the Mayday: Cyber ​​Attacks at Sea</title>
      <itunes:title>Before the Mayday: Cyber ​​Attacks at Sea</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a7852762-b1d9-48e3-8bcd-b19b6fde93fc</guid>
      <link>https://share.transistor.fm/s/10068fa1</link>
      <description>
        <![CDATA[<p>Could Stuxnet happen again - this time at sea?</p><p>In this Threat Talks episode, host Lieuwe Jan Koning sits down with Professor Stephen McCombie, global expert in maritime cybersecurity, to unpack real-world cyber attacks on critical infrastructure and why the maritime sector is dangerously exposed.</p><p>From GPS spoofing and insider threats to aging ship systems and state-sponsored attacks, this conversation reveals how maritime cyber risk is no longer theoretical - it’s already disrupting global trade, safety, and geopolitics.</p><p>If your organization depends on shipping, ports, or industrial OT environments, this is an episode you really shouldn’t ignore.</p><p></p><ul><li>(00:00) - – 01:15 Why Cyber Attacks at Sea Matter</li>
<li>(01:15) - – 04:01 What Makes the Maritime Industry Uniquely Vulnerable</li>
<li>(04:01) - – 07:15 Legacy Ships vs. Modern Ships: Where the Real Risk Lies</li>
<li>(07:15) - – 13:17 Stuxnet and the Blueprint for Physical Cyber Attacks</li>
<li>(13:17) - – 14:17 Today’s Biggest Maritime Cyber Threats</li>
<li>(14:17) - – 17:04 Learning from Real Incidents: The MCAT Database</li>
<li>(17:04) - – 23:19 Real Attacks at Sea: Insider Threats &amp; GPS Spoofing</li>
<li>(24:34) - – 33:11 From Awareness to Action: Solutions That Actually Help</li>
<li>(33:11) - – 37:25 The Ship Honeynet: Detecting Attacks Before the Mayday</li>
<li>(37:25) - – 38:24 End Key Takeaways &amp; What Comes Next</li>
</ul><br>Key Topics Covered<br>• Why maritime cybersecurity failures can cripple global supply chains<br>• Real examples of cyber attacks on critical infrastructure, including GPS spoofing and insider threats<br>• How legacy OT, poor segmentation, and low awareness increase maritime cyber risk<br>• Practical lessons: intelligence-led defense, openness, exercises, and Zero Trust thinking<p>Related ON2IT Content &amp; Referenced Resources<br>Threat Talk episode - Hack the Boat: https://youtu.be/Xa0TJ3eRTCw?si=oQPhu4iyfVJEh0CQ <br>Threat Talk episode - Maritime Cyber Attack Database: https://maritimecybersecurity.nl/ <br>Threat Talk website: https://threat-talks.com/<br>ON2IT website: https://on2it.net/<br>AMS-IX website: https://www.ams-ix.net/ams<br>https://www.mcatdatabase.org/<br>https://www.nhlstenden.com/<br>https://www.marinetraffic.com/</p><p><a href="https://share.transistor.fm/s/10068fa1/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>Subscribe and turn on notifications to stay ahead of emerging cyber threats across IT, OT, and critical infrastructure.</p><p>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Could Stuxnet happen again - this time at sea?</p><p>In this Threat Talks episode, host Lieuwe Jan Koning sits down with Professor Stephen McCombie, global expert in maritime cybersecurity, to unpack real-world cyber attacks on critical infrastructure and why the maritime sector is dangerously exposed.</p><p>From GPS spoofing and insider threats to aging ship systems and state-sponsored attacks, this conversation reveals how maritime cyber risk is no longer theoretical - it’s already disrupting global trade, safety, and geopolitics.</p><p>If your organization depends on shipping, ports, or industrial OT environments, this is an episode you really shouldn’t ignore.</p><p></p><ul><li>(00:00) - – 01:15 Why Cyber Attacks at Sea Matter</li>
<li>(01:15) - – 04:01 What Makes the Maritime Industry Uniquely Vulnerable</li>
<li>(04:01) - – 07:15 Legacy Ships vs. Modern Ships: Where the Real Risk Lies</li>
<li>(07:15) - – 13:17 Stuxnet and the Blueprint for Physical Cyber Attacks</li>
<li>(13:17) - – 14:17 Today’s Biggest Maritime Cyber Threats</li>
<li>(14:17) - – 17:04 Learning from Real Incidents: The MCAT Database</li>
<li>(17:04) - – 23:19 Real Attacks at Sea: Insider Threats &amp; GPS Spoofing</li>
<li>(24:34) - – 33:11 From Awareness to Action: Solutions That Actually Help</li>
<li>(33:11) - – 37:25 The Ship Honeynet: Detecting Attacks Before the Mayday</li>
<li>(37:25) - – 38:24 End Key Takeaways &amp; What Comes Next</li>
</ul><br>Key Topics Covered<br>• Why maritime cybersecurity failures can cripple global supply chains<br>• Real examples of cyber attacks on critical infrastructure, including GPS spoofing and insider threats<br>• How legacy OT, poor segmentation, and low awareness increase maritime cyber risk<br>• Practical lessons: intelligence-led defense, openness, exercises, and Zero Trust thinking<p>Related ON2IT Content &amp; Referenced Resources<br>Threat Talk episode - Hack the Boat: https://youtu.be/Xa0TJ3eRTCw?si=oQPhu4iyfVJEh0CQ <br>Threat Talk episode - Maritime Cyber Attack Database: https://maritimecybersecurity.nl/ <br>Threat Talk website: https://threat-talks.com/<br>ON2IT website: https://on2it.net/<br>AMS-IX website: https://www.ams-ix.net/ams<br>https://www.mcatdatabase.org/<br>https://www.nhlstenden.com/<br>https://www.marinetraffic.com/</p><p><a href="https://share.transistor.fm/s/10068fa1/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>Subscribe and turn on notifications to stay ahead of emerging cyber threats across IT, OT, and critical infrastructure.</p><p>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Tue, 06 Jan 2026 07:29:00 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/10068fa1/6ed64e1a.mp3" length="92178016" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/r_OMm4bv7HEaPq03W3GUi7wbi6n9Mo7hdtINrC_CF34/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kMGZj/MzQyZDZjMTZmYzJj/MGMwNDc3NzEwY2U3/YzE5MS5wbmc.jpg"/>
      <itunes:duration>2305</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Could Stuxnet happen again - this time at sea?</p><p>In this Threat Talks episode, host Lieuwe Jan Koning sits down with Professor Stephen McCombie, global expert in maritime cybersecurity, to unpack real-world cyber attacks on critical infrastructure and why the maritime sector is dangerously exposed.</p><p>From GPS spoofing and insider threats to aging ship systems and state-sponsored attacks, this conversation reveals how maritime cyber risk is no longer theoretical - it’s already disrupting global trade, safety, and geopolitics.</p><p>If your organization depends on shipping, ports, or industrial OT environments, this is an episode you really shouldn’t ignore.</p><p></p><ul><li>(00:00) - – 01:15 Why Cyber Attacks at Sea Matter</li>
<li>(01:15) - – 04:01 What Makes the Maritime Industry Uniquely Vulnerable</li>
<li>(04:01) - – 07:15 Legacy Ships vs. Modern Ships: Where the Real Risk Lies</li>
<li>(07:15) - – 13:17 Stuxnet and the Blueprint for Physical Cyber Attacks</li>
<li>(13:17) - – 14:17 Today’s Biggest Maritime Cyber Threats</li>
<li>(14:17) - – 17:04 Learning from Real Incidents: The MCAT Database</li>
<li>(17:04) - – 23:19 Real Attacks at Sea: Insider Threats &amp; GPS Spoofing</li>
<li>(24:34) - – 33:11 From Awareness to Action: Solutions That Actually Help</li>
<li>(33:11) - – 37:25 The Ship Honeynet: Detecting Attacks Before the Mayday</li>
<li>(37:25) - – 38:24 End Key Takeaways &amp; What Comes Next</li>
</ul><br>Key Topics Covered<br>• Why maritime cybersecurity failures can cripple global supply chains<br>• Real examples of cyber attacks on critical infrastructure, including GPS spoofing and insider threats<br>• How legacy OT, poor segmentation, and low awareness increase maritime cyber risk<br>• Practical lessons: intelligence-led defense, openness, exercises, and Zero Trust thinking<p>Related ON2IT Content &amp; Referenced Resources<br>Threat Talk episode - Hack the Boat: https://youtu.be/Xa0TJ3eRTCw?si=oQPhu4iyfVJEh0CQ <br>Threat Talk episode - Maritime Cyber Attack Database: https://maritimecybersecurity.nl/ <br>Threat Talk website: https://threat-talks.com/<br>ON2IT website: https://on2it.net/<br>AMS-IX website: https://www.ams-ix.net/ams<br>https://www.mcatdatabase.org/<br>https://www.nhlstenden.com/<br>https://www.marinetraffic.com/</p><p><a href="https://share.transistor.fm/s/10068fa1/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>Subscribe and turn on notifications to stay ahead of emerging cyber threats across IT, OT, and critical infrastructure.</p><p>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </itunes:summary>
      <itunes:keywords>Threat talks, Mayday, Cyber ​​Attacks</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/10068fa1/transcript.srt" type="application/x-subrip" rel="captions"/>
      <podcast:chapters url="https://share.transistor.fm/s/10068fa1/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Looking Back at 2025: Cybersecurity at a Turning Point</title>
      <itunes:title>Looking Back at 2025: Cybersecurity at a Turning Point</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5d649808-b9b4-4fed-acd9-966d6c88ab51</guid>
      <link>https://share.transistor.fm/s/75c1de08</link>
      <description>
        <![CDATA[<p>2025 was the year detection stopped being enough.<br>Because attacks stopped behaving the way detection was built to handle.</p><p>OT systems were hit with real-world consequences. AI stopped being just a productivity tool and became an attacker. And SOCs discovered - often painfully - that speed alone still means reacting too late.<br>In this special end-of-year Threat Talks episode, Lieuwe Jan Koning is joined by Luca Cipriano, Yuri Wit, and Rob Maas, all in ugly Christmas sweaters, to unpack why the cybersecurity trends of 2025 represent a structural break, not a gradual evolution.<br>They trace how attackers scaled faster than defenders, why SOC automation became unavoidable, and how preemptive security and Zero Trust execution are emerging as the only way to regain control.<br>This isn’t a recap for curiosity.<br>It’s a map of how we got here - and what must change in 2026 to stay ahead.</p><p></p><ul><li>(00:00) - Introduction: why 2025 felt fundamentally different</li>
<li>(01:31) - - 05:12 The threat landscape shifts: OT security and real-world impact</li>
<li>(05:12) - - 07:27 A new normal: how AI changed daily security work</li>
<li>(07:27) - - 09:31 The most surprising attacks of 2025</li>
<li>(09:31) - - 20:00 Inside the SOC: scale, speed, and analyst fatigue</li>
<li>(20:00) - - 22:15 “There are protections against AI… right?”</li>
<li>(22:15) - - 20:23  Zero Trust redefined: can it handle AI-driven attacks?</li>
<li>(30:23) - - 32:04 Why prevention matters more than ever</li>
<li>(32:04) - - 41:06 Looking ahead: predictions for cybersecurity in 2026</li>
</ul><br>Key Topics Covered<br>• How AI-powered attacks and autonomous malware altered attacker economics<br>• Why OT security and critical infrastructure moved to the front line<br>• Where SOC automation helps - and where it creates false confidence<br>• Why preemptive security and Zero Trust shift defense from reaction to control<p>Related ON2IT Content &amp; Referenced Resources<br>I-Soon episode<br>https://www.youtube.com/watch?v=Rkp4OWOcCeU&amp;t=1s</p><p>Salesloft supply chain attack episode<br>https://www.youtube.com/watch?v=_asJ2AN7cbA</p><p>PromptLock malware episode<br>https://www.youtube.com/watch?v=lKcUwLPBC8k</p><p>MCP security episode<br>https://www.youtube.com/watch?v=IkV6jkuYz5g</p><p>Zero Trust episodes playlist<br>https://www.youtube.com/playlist?list=PLF5mXtEG4t5wigSRB3fpyFfMYp3l1Ux2g</p><p>Zero Trust infographic (PDF)<br>https://on2it.s3.us-east-1.amazonaws.com/250429_Infographic_ZT.pdf</p><p>Threat Talks is built for CISOs and security leaders navigating real trade-offs—not vendor promises.<br>Subscribe for grounded insight on Zero Trust execution, AI-driven threats, SOC automation, and preemptive security from practitioners in the field.</p><p><a href="https://share.transistor.fm/s/75c1de08/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>2025 was the year detection stopped being enough.<br>Because attacks stopped behaving the way detection was built to handle.</p><p>OT systems were hit with real-world consequences. AI stopped being just a productivity tool and became an attacker. And SOCs discovered - often painfully - that speed alone still means reacting too late.<br>In this special end-of-year Threat Talks episode, Lieuwe Jan Koning is joined by Luca Cipriano, Yuri Wit, and Rob Maas, all in ugly Christmas sweaters, to unpack why the cybersecurity trends of 2025 represent a structural break, not a gradual evolution.<br>They trace how attackers scaled faster than defenders, why SOC automation became unavoidable, and how preemptive security and Zero Trust execution are emerging as the only way to regain control.<br>This isn’t a recap for curiosity.<br>It’s a map of how we got here - and what must change in 2026 to stay ahead.</p><p></p><ul><li>(00:00) - Introduction: why 2025 felt fundamentally different</li>
<li>(01:31) - - 05:12 The threat landscape shifts: OT security and real-world impact</li>
<li>(05:12) - - 07:27 A new normal: how AI changed daily security work</li>
<li>(07:27) - - 09:31 The most surprising attacks of 2025</li>
<li>(09:31) - - 20:00 Inside the SOC: scale, speed, and analyst fatigue</li>
<li>(20:00) - - 22:15 “There are protections against AI… right?”</li>
<li>(22:15) - - 20:23  Zero Trust redefined: can it handle AI-driven attacks?</li>
<li>(30:23) - - 32:04 Why prevention matters more than ever</li>
<li>(32:04) - - 41:06 Looking ahead: predictions for cybersecurity in 2026</li>
</ul><br>Key Topics Covered<br>• How AI-powered attacks and autonomous malware altered attacker economics<br>• Why OT security and critical infrastructure moved to the front line<br>• Where SOC automation helps - and where it creates false confidence<br>• Why preemptive security and Zero Trust shift defense from reaction to control<p>Related ON2IT Content &amp; Referenced Resources<br>I-Soon episode<br>https://www.youtube.com/watch?v=Rkp4OWOcCeU&amp;t=1s</p><p>Salesloft supply chain attack episode<br>https://www.youtube.com/watch?v=_asJ2AN7cbA</p><p>PromptLock malware episode<br>https://www.youtube.com/watch?v=lKcUwLPBC8k</p><p>MCP security episode<br>https://www.youtube.com/watch?v=IkV6jkuYz5g</p><p>Zero Trust episodes playlist<br>https://www.youtube.com/playlist?list=PLF5mXtEG4t5wigSRB3fpyFfMYp3l1Ux2g</p><p>Zero Trust infographic (PDF)<br>https://on2it.s3.us-east-1.amazonaws.com/250429_Infographic_ZT.pdf</p><p>Threat Talks is built for CISOs and security leaders navigating real trade-offs—not vendor promises.<br>Subscribe for grounded insight on Zero Trust execution, AI-driven threats, SOC automation, and preemptive security from practitioners in the field.</p><p><a href="https://share.transistor.fm/s/75c1de08/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Tue, 30 Dec 2025 07:12:11 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/75c1de08/56b97aa0.mp3" length="98839120" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/i4EBEu0aZHbGxVwGXa-Ao3swU5anYJCYJhwe8CEj1C4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mOTAz/ODExMGEzNzFmZWQ4/ZDE0MGVjN2RkNGMz/N2JhOS5qcGc.jpg"/>
      <itunes:duration>2467</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>2025 was the year detection stopped being enough.<br>Because attacks stopped behaving the way detection was built to handle.</p><p>OT systems were hit with real-world consequences. AI stopped being just a productivity tool and became an attacker. And SOCs discovered - often painfully - that speed alone still means reacting too late.<br>In this special end-of-year Threat Talks episode, Lieuwe Jan Koning is joined by Luca Cipriano, Yuri Wit, and Rob Maas, all in ugly Christmas sweaters, to unpack why the cybersecurity trends of 2025 represent a structural break, not a gradual evolution.<br>They trace how attackers scaled faster than defenders, why SOC automation became unavoidable, and how preemptive security and Zero Trust execution are emerging as the only way to regain control.<br>This isn’t a recap for curiosity.<br>It’s a map of how we got here - and what must change in 2026 to stay ahead.</p><p></p><ul><li>(00:00) - Introduction: why 2025 felt fundamentally different</li>
<li>(01:31) - - 05:12 The threat landscape shifts: OT security and real-world impact</li>
<li>(05:12) - - 07:27 A new normal: how AI changed daily security work</li>
<li>(07:27) - - 09:31 The most surprising attacks of 2025</li>
<li>(09:31) - - 20:00 Inside the SOC: scale, speed, and analyst fatigue</li>
<li>(20:00) - - 22:15 “There are protections against AI… right?”</li>
<li>(22:15) - - 20:23  Zero Trust redefined: can it handle AI-driven attacks?</li>
<li>(30:23) - - 32:04 Why prevention matters more than ever</li>
<li>(32:04) - - 41:06 Looking ahead: predictions for cybersecurity in 2026</li>
</ul><br>Key Topics Covered<br>• How AI-powered attacks and autonomous malware altered attacker economics<br>• Why OT security and critical infrastructure moved to the front line<br>• Where SOC automation helps - and where it creates false confidence<br>• Why preemptive security and Zero Trust shift defense from reaction to control<p>Related ON2IT Content &amp; Referenced Resources<br>I-Soon episode<br>https://www.youtube.com/watch?v=Rkp4OWOcCeU&amp;t=1s</p><p>Salesloft supply chain attack episode<br>https://www.youtube.com/watch?v=_asJ2AN7cbA</p><p>PromptLock malware episode<br>https://www.youtube.com/watch?v=lKcUwLPBC8k</p><p>MCP security episode<br>https://www.youtube.com/watch?v=IkV6jkuYz5g</p><p>Zero Trust episodes playlist<br>https://www.youtube.com/playlist?list=PLF5mXtEG4t5wigSRB3fpyFfMYp3l1Ux2g</p><p>Zero Trust infographic (PDF)<br>https://on2it.s3.us-east-1.amazonaws.com/250429_Infographic_ZT.pdf</p><p>Threat Talks is built for CISOs and security leaders navigating real trade-offs—not vendor promises.<br>Subscribe for grounded insight on Zero Trust execution, AI-driven threats, SOC automation, and preemptive security from practitioners in the field.</p><p><a href="https://share.transistor.fm/s/75c1de08/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/75c1de08/transcript.srt" type="application/x-subrip" rel="captions"/>
      <podcast:chapters url="https://share.transistor.fm/s/75c1de08/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>BGP Vortex: Internet Kill Switch?</title>
      <itunes:title>BGP Vortex: Internet Kill Switch?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f5a42a87-c7f7-4a9f-b36f-abd1b8b35790</guid>
      <link>https://share.transistor.fm/s/46deaaec</link>
      <description>
        <![CDATA[<p>Could a single BGP trick really break the internet?</p><p>A new “BGP Vortex” claim says yes  - by abusing route oscillation and BGP communities to trigger endless update loops and exhaust router CPU. So we check what actually holds up in the real world.<br>In this Threat Talks Deep Dive, Rob Maas, Field CTO at ON2IT, sits down with Eric Nghia Nguyen Duy, Network Engineer at AMS-IX, to understand what BGP (short for Border Gateway Protocol) actually does, how the proposed Vortex mechanism works (route oscillation + community behavior), and why real-world internet operators are far more resilient than the headline suggests.<br>Yes, it’s an attention-grabbing claim.</p><p>No, it’s not a “break the whole internet tomorrow” button.</p><p></p><ul><li>(00:00) - – 02:29 Introduction: The BGP Vortex Claim</li>
<li>(02:29) - - 06:35 What is BGP? </li>
<li>(06:35) - - 13:13 BGP Vortex: How it works</li>
<li>(13:13) - - 15:02 What an Attacker Would Actually Need</li>
<li>(15:02) - - 19:08 What can we do to prevent this</li>
<li>(19:08) - - 19:56 What role AMS-IX plays</li>
<li>(19:56) - – 22:01 Conclusion</li>
</ul><br>Key topics covered<br>• What BGP is and why the internet depends on it<br>• How route oscillation and update amplification can overload routers<br>• Why the attack relies on upstream policy choices (communities aren’t “magic”)<br>• Why the “break the internet” claim is mostly theoretical<br>• Practical mitigations: filtering/inspecting communities, monitoring, session shutdown<p>Resources<br>• BGP Vortex research paper: https://www.usenix.org/system/files/usenixsecurity25-stoeger.pdf <br>• BGP Vortex presentation video: https://www.youtube.com/watch?v=dd6L1mdQLmk<br>• Threat Talks: https://threat-talks.com/<br>• ON2IT (Zero Trust as a Service): https://on2it.net/<br>• AMS-IX: https://www.ams-ix.net/ams</p><p>Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.</p><p><a href="https://share.transistor.fm/s/46deaaec/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Could a single BGP trick really break the internet?</p><p>A new “BGP Vortex” claim says yes  - by abusing route oscillation and BGP communities to trigger endless update loops and exhaust router CPU. So we check what actually holds up in the real world.<br>In this Threat Talks Deep Dive, Rob Maas, Field CTO at ON2IT, sits down with Eric Nghia Nguyen Duy, Network Engineer at AMS-IX, to understand what BGP (short for Border Gateway Protocol) actually does, how the proposed Vortex mechanism works (route oscillation + community behavior), and why real-world internet operators are far more resilient than the headline suggests.<br>Yes, it’s an attention-grabbing claim.</p><p>No, it’s not a “break the whole internet tomorrow” button.</p><p></p><ul><li>(00:00) - – 02:29 Introduction: The BGP Vortex Claim</li>
<li>(02:29) - - 06:35 What is BGP? </li>
<li>(06:35) - - 13:13 BGP Vortex: How it works</li>
<li>(13:13) - - 15:02 What an Attacker Would Actually Need</li>
<li>(15:02) - - 19:08 What can we do to prevent this</li>
<li>(19:08) - - 19:56 What role AMS-IX plays</li>
<li>(19:56) - – 22:01 Conclusion</li>
</ul><br>Key topics covered<br>• What BGP is and why the internet depends on it<br>• How route oscillation and update amplification can overload routers<br>• Why the attack relies on upstream policy choices (communities aren’t “magic”)<br>• Why the “break the internet” claim is mostly theoretical<br>• Practical mitigations: filtering/inspecting communities, monitoring, session shutdown<p>Resources<br>• BGP Vortex research paper: https://www.usenix.org/system/files/usenixsecurity25-stoeger.pdf <br>• BGP Vortex presentation video: https://www.youtube.com/watch?v=dd6L1mdQLmk<br>• Threat Talks: https://threat-talks.com/<br>• ON2IT (Zero Trust as a Service): https://on2it.net/<br>• AMS-IX: https://www.ams-ix.net/ams</p><p>Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.</p><p><a href="https://share.transistor.fm/s/46deaaec/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Tue, 23 Dec 2025 07:07:34 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/46deaaec/53fca182.mp3" length="52909900" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/BdalFL6mySLB1TyDGkEL4cHp6DiCRXqAyXcPv4clX9g/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mYTFk/YzBkYTQ1YTg4MDk5/ZDk4NTA4NTMzYTQ3/MWU4Yi5qcGc.jpg"/>
      <itunes:duration>1322</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Could a single BGP trick really break the internet?</p><p>A new “BGP Vortex” claim says yes  - by abusing route oscillation and BGP communities to trigger endless update loops and exhaust router CPU. So we check what actually holds up in the real world.<br>In this Threat Talks Deep Dive, Rob Maas, Field CTO at ON2IT, sits down with Eric Nghia Nguyen Duy, Network Engineer at AMS-IX, to understand what BGP (short for Border Gateway Protocol) actually does, how the proposed Vortex mechanism works (route oscillation + community behavior), and why real-world internet operators are far more resilient than the headline suggests.<br>Yes, it’s an attention-grabbing claim.</p><p>No, it’s not a “break the whole internet tomorrow” button.</p><p></p><ul><li>(00:00) - – 02:29 Introduction: The BGP Vortex Claim</li>
<li>(02:29) - - 06:35 What is BGP? </li>
<li>(06:35) - - 13:13 BGP Vortex: How it works</li>
<li>(13:13) - - 15:02 What an Attacker Would Actually Need</li>
<li>(15:02) - - 19:08 What can we do to prevent this</li>
<li>(19:08) - - 19:56 What role AMS-IX plays</li>
<li>(19:56) - – 22:01 Conclusion</li>
</ul><br>Key topics covered<br>• What BGP is and why the internet depends on it<br>• How route oscillation and update amplification can overload routers<br>• Why the attack relies on upstream policy choices (communities aren’t “magic”)<br>• Why the “break the internet” claim is mostly theoretical<br>• Practical mitigations: filtering/inspecting communities, monitoring, session shutdown<p>Resources<br>• BGP Vortex research paper: https://www.usenix.org/system/files/usenixsecurity25-stoeger.pdf <br>• BGP Vortex presentation video: https://www.youtube.com/watch?v=dd6L1mdQLmk<br>• Threat Talks: https://threat-talks.com/<br>• ON2IT (Zero Trust as a Service): https://on2it.net/<br>• AMS-IX: https://www.ams-ix.net/ams</p><p>Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.</p><p><a href="https://share.transistor.fm/s/46deaaec/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </itunes:summary>
      <itunes:keywords>BGP Vortex</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/46deaaec/transcript.srt" type="application/x-subrip" rel="captions"/>
      <podcast:chapters url="https://share.transistor.fm/s/46deaaec/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>WSUS RCE: Update Weaponized</title>
      <itunes:title>WSUS RCE: Update Weaponized</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1f8cb7ca-8845-4a71-b25b-4469178a5e81</guid>
      <link>https://share.transistor.fm/s/a5b84931</link>
      <description>
        <![CDATA[<p>Attackers are abusing a WSUS flaw - Microsoft’s Windows Server Update Services - to detonate PowerCat, spawn reverse shells, and plant ShadowPad. All from the update server your entire Windows estate trusts by default.</p><p>One weak crypto key and a broken deserialization function let attackers hit your WSUS server with unauthenticated SYSTEM-level code execution. Chinese APT groups are already exploiting it to drop malware in memory, blend into legitimate WSUS traffic, and pivot deeper into the network.</p><p>Yes WSUS patch exists, but even if you patch it today, the real problem remains:<br>Your WSUS server is a high-value target with high-trust pathways - and most environments expose it far more than they think.</p><p>Watch host Lieuwe Jan Koning - with Blue Team expert Rob Maas and Red Team lead Luca Cipriano - break down how the exploit works, how attackers chain it into real-world intrusions, and the Zero Trust fixes that actually matter.</p><p></p><ul><li>(00:00) - Intro</li>
<li>(01:03) - What is a WSUS server?</li>
<li>(02:48) - The WSUS vulnerability</li>
<li>(05:49) - What is deserialization?</li>
<li>(08:17) - What to do about this vulnerability</li>
<li>(10:52) - How attackers are exploiting it</li>
<li>(18:42) - Real-world harm</li>
<li>(19:16) - Final advice &amp; defense strategy</li>
</ul><br>Key Topics Covered<br>• How one WSUS flaw enables unauthenticated RCE as SYSTEM<br>• The attack chain: crafted payload → deserialization → PowerCat → ShadowPad<br>• Why update servers are high-value pivot points for APT groups<br>• How Chinese APTs weaponized this vulnerability in real-world intrusions<br>• Zero Trust protections: segmentation, egress control, EDR/XDR detection<br>• How to secure Microsoft Windows Server Update Services (WSUS patching best practices)<p>Episodes Mentioned<br>• China Nexus Barracuda Hack: https://www.youtube.com/watch?v=4X9AmBhOmSA<br>• APT Sand Eagle: https://youtu.be/U5qdERmvEwg?si=kdsCJDNkGjs6Lklz<br>• APT 44 / Seashell Blizzard: https://youtu.be/JqA0Irspxrc?si=nnJpz7VnLtz38LN4<br>• APT Handala: https://youtu.be/XYf-SMhQdDc?si=WpIE0h9Q-pokz0MD</p><p>Guest &amp; Host Links<br>Rob Maas (Field CTO, ON2IT): https://threat-talks.com/the-hosts/<br>Luca Cipriano (CTI &amp; Red Team Lead, ON2IT): https://threat-talks.com/the-hosts/</p><p>Additional Resources<br>Threat Talks: https://threat-talks.com/<br>ON2IT (Zero Trust as a Service): https://on2it.net/<br>AMS-IX: https://www.ams-ix.net/ams</p><p>Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.</p><p><a href="https://share.transistor.fm/s/a5b84931/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Attackers are abusing a WSUS flaw - Microsoft’s Windows Server Update Services - to detonate PowerCat, spawn reverse shells, and plant ShadowPad. All from the update server your entire Windows estate trusts by default.</p><p>One weak crypto key and a broken deserialization function let attackers hit your WSUS server with unauthenticated SYSTEM-level code execution. Chinese APT groups are already exploiting it to drop malware in memory, blend into legitimate WSUS traffic, and pivot deeper into the network.</p><p>Yes WSUS patch exists, but even if you patch it today, the real problem remains:<br>Your WSUS server is a high-value target with high-trust pathways - and most environments expose it far more than they think.</p><p>Watch host Lieuwe Jan Koning - with Blue Team expert Rob Maas and Red Team lead Luca Cipriano - break down how the exploit works, how attackers chain it into real-world intrusions, and the Zero Trust fixes that actually matter.</p><p></p><ul><li>(00:00) - Intro</li>
<li>(01:03) - What is a WSUS server?</li>
<li>(02:48) - The WSUS vulnerability</li>
<li>(05:49) - What is deserialization?</li>
<li>(08:17) - What to do about this vulnerability</li>
<li>(10:52) - How attackers are exploiting it</li>
<li>(18:42) - Real-world harm</li>
<li>(19:16) - Final advice &amp; defense strategy</li>
</ul><br>Key Topics Covered<br>• How one WSUS flaw enables unauthenticated RCE as SYSTEM<br>• The attack chain: crafted payload → deserialization → PowerCat → ShadowPad<br>• Why update servers are high-value pivot points for APT groups<br>• How Chinese APTs weaponized this vulnerability in real-world intrusions<br>• Zero Trust protections: segmentation, egress control, EDR/XDR detection<br>• How to secure Microsoft Windows Server Update Services (WSUS patching best practices)<p>Episodes Mentioned<br>• China Nexus Barracuda Hack: https://www.youtube.com/watch?v=4X9AmBhOmSA<br>• APT Sand Eagle: https://youtu.be/U5qdERmvEwg?si=kdsCJDNkGjs6Lklz<br>• APT 44 / Seashell Blizzard: https://youtu.be/JqA0Irspxrc?si=nnJpz7VnLtz38LN4<br>• APT Handala: https://youtu.be/XYf-SMhQdDc?si=WpIE0h9Q-pokz0MD</p><p>Guest &amp; Host Links<br>Rob Maas (Field CTO, ON2IT): https://threat-talks.com/the-hosts/<br>Luca Cipriano (CTI &amp; Red Team Lead, ON2IT): https://threat-talks.com/the-hosts/</p><p>Additional Resources<br>Threat Talks: https://threat-talks.com/<br>ON2IT (Zero Trust as a Service): https://on2it.net/<br>AMS-IX: https://www.ams-ix.net/ams</p><p>Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.</p><p><a href="https://share.transistor.fm/s/a5b84931/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Tue, 16 Dec 2025 08:03:47 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/a5b84931/7888f5f1.mp3" length="55193337" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/8hspPadKVHKoN19Mwbu-7baQM7SEKXdwXvxEv_nbtUQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85ZWFh/ODMzMWY3ZjM4MGU2/YTkwMGJiODMwMjY5/MThiOC5qcGc.jpg"/>
      <itunes:duration>1377</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Attackers are abusing a WSUS flaw - Microsoft’s Windows Server Update Services - to detonate PowerCat, spawn reverse shells, and plant ShadowPad. All from the update server your entire Windows estate trusts by default.</p><p>One weak crypto key and a broken deserialization function let attackers hit your WSUS server with unauthenticated SYSTEM-level code execution. Chinese APT groups are already exploiting it to drop malware in memory, blend into legitimate WSUS traffic, and pivot deeper into the network.</p><p>Yes WSUS patch exists, but even if you patch it today, the real problem remains:<br>Your WSUS server is a high-value target with high-trust pathways - and most environments expose it far more than they think.</p><p>Watch host Lieuwe Jan Koning - with Blue Team expert Rob Maas and Red Team lead Luca Cipriano - break down how the exploit works, how attackers chain it into real-world intrusions, and the Zero Trust fixes that actually matter.</p><p></p><ul><li>(00:00) - Intro</li>
<li>(01:03) - What is a WSUS server?</li>
<li>(02:48) - The WSUS vulnerability</li>
<li>(05:49) - What is deserialization?</li>
<li>(08:17) - What to do about this vulnerability</li>
<li>(10:52) - How attackers are exploiting it</li>
<li>(18:42) - Real-world harm</li>
<li>(19:16) - Final advice &amp; defense strategy</li>
</ul><br>Key Topics Covered<br>• How one WSUS flaw enables unauthenticated RCE as SYSTEM<br>• The attack chain: crafted payload → deserialization → PowerCat → ShadowPad<br>• Why update servers are high-value pivot points for APT groups<br>• How Chinese APTs weaponized this vulnerability in real-world intrusions<br>• Zero Trust protections: segmentation, egress control, EDR/XDR detection<br>• How to secure Microsoft Windows Server Update Services (WSUS patching best practices)<p>Episodes Mentioned<br>• China Nexus Barracuda Hack: https://www.youtube.com/watch?v=4X9AmBhOmSA<br>• APT Sand Eagle: https://youtu.be/U5qdERmvEwg?si=kdsCJDNkGjs6Lklz<br>• APT 44 / Seashell Blizzard: https://youtu.be/JqA0Irspxrc?si=nnJpz7VnLtz38LN4<br>• APT Handala: https://youtu.be/XYf-SMhQdDc?si=WpIE0h9Q-pokz0MD</p><p>Guest &amp; Host Links<br>Rob Maas (Field CTO, ON2IT): https://threat-talks.com/the-hosts/<br>Luca Cipriano (CTI &amp; Red Team Lead, ON2IT): https://threat-talks.com/the-hosts/</p><p>Additional Resources<br>Threat Talks: https://threat-talks.com/<br>ON2IT (Zero Trust as a Service): https://on2it.net/<br>AMS-IX: https://www.ams-ix.net/ams</p><p>Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.</p><p><a href="https://share.transistor.fm/s/a5b84931/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </itunes:summary>
      <itunes:keywords>WSUS RCE</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/a5b84931/transcript.srt" type="application/x-subrip" rel="captions"/>
      <podcast:chapters url="https://share.transistor.fm/s/a5b84931/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Bad Successor: The Service Account Flaw to Watch</title>
      <itunes:title>Bad Successor: The Service Account Flaw to Watch</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6819e760-2982-448b-8965-a7db6d4c6343</guid>
      <link>https://share.transistor.fm/s/8ff1c49a</link>
      <description>
        <![CDATA[<p>It was built to secure service accounts.<br>Instead, it became the cleanest privilege-escalation vector of 2025.</p><p>They called it Bad Successor (A.K.A. CVE-2025-53779).</p><p>A new “secure by design” feature in Windows Server 2025 -DMSA -was supposed to fix service account hygiene. Instead, it introduced a loophole where attackers could claim successor status, skip password requirements, and silently inherit elevated rights from any target account.</p><p>Including domain admin.</p><p>Even after Microsoft patched the issue, the deeper risk remains:<br>Service accounts are over-privileged, under-monitored, and dangerously trusted -and adversaries know it.</p><p>This isn’t a niche AD misconfiguration.</p><p>It’s a privilege-escalation design flaw hiding inside a security feature, and a warning shot for every environment leaning on default trust in the identity layer.</p><p>Watch host Rob Maas, Field CTO at ON2IT, and Luca Cipriano, CTI &amp; Red Team Lead at ON2IT break down how Bad Successor works, how attackers exploited it, and what a Zero Trust AD strategy actually looks like in 2025.</p><p></p><ul><li>(00:00) - Intro &amp; why service accounts still matter</li>
<li>(00:46) - What are service accounts really for?</li>
<li>(01:31) - DMSA explained: Microsoft’s new managed service account</li>
<li>(02:56) - How DMSA migration works (the phone-migration analogy)</li>
<li>(04:40) - What is Bad Successor &amp; why it matters</li>
<li>(08:00) - How widespread is this vulnerbility?</li>
<li>(11:42) - – Microsoft’s patch &amp; post-patch stealth paths – is the patch working?</li>
<li>(14:03) - Defending AD: patching, OU permissions &amp; logging</li>
<li>(15:23) - Is Bad Proccessor the biggest active directory attack in your tool box?</li>
</ul><br>Key Topics Covered<br>• How a security upgrade became a privilege-escalation vector.<br>• Why service account security failures create invisible attack paths.<br>• The real DMSA abuse chain: child objects → successor claim → domain admin.<br>• Zero Trust defenses for AD: permissions, logging, rotation, least privilege.<p>Got your attention?<br>Subscribe to Threat Talks and turn on notifications for deep dives into the world’s leading cyber threats and trends.</p><p>Guest and Host Links:<br>Rob Maas (Field CTO, ON2IT): https://threat-talks.com/the-hosts/<br>Luca Cipriano (CTI &amp; Red Team Lead, ON2IT): https://threat-talks.com/the-hosts/</p><p>Additional Resources<br>Threat Talks: https://threat-talks.com/<br>ON2IT (Zero Trust as a Service): https://on2it.net/<br>AMS-IX: https://www.ams-ix.net/ams</p><p><a href="https://share.transistor.fm/s/8ff1c49a/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>It was built to secure service accounts.<br>Instead, it became the cleanest privilege-escalation vector of 2025.</p><p>They called it Bad Successor (A.K.A. CVE-2025-53779).</p><p>A new “secure by design” feature in Windows Server 2025 -DMSA -was supposed to fix service account hygiene. Instead, it introduced a loophole where attackers could claim successor status, skip password requirements, and silently inherit elevated rights from any target account.</p><p>Including domain admin.</p><p>Even after Microsoft patched the issue, the deeper risk remains:<br>Service accounts are over-privileged, under-monitored, and dangerously trusted -and adversaries know it.</p><p>This isn’t a niche AD misconfiguration.</p><p>It’s a privilege-escalation design flaw hiding inside a security feature, and a warning shot for every environment leaning on default trust in the identity layer.</p><p>Watch host Rob Maas, Field CTO at ON2IT, and Luca Cipriano, CTI &amp; Red Team Lead at ON2IT break down how Bad Successor works, how attackers exploited it, and what a Zero Trust AD strategy actually looks like in 2025.</p><p></p><ul><li>(00:00) - Intro &amp; why service accounts still matter</li>
<li>(00:46) - What are service accounts really for?</li>
<li>(01:31) - DMSA explained: Microsoft’s new managed service account</li>
<li>(02:56) - How DMSA migration works (the phone-migration analogy)</li>
<li>(04:40) - What is Bad Successor &amp; why it matters</li>
<li>(08:00) - How widespread is this vulnerbility?</li>
<li>(11:42) - – Microsoft’s patch &amp; post-patch stealth paths – is the patch working?</li>
<li>(14:03) - Defending AD: patching, OU permissions &amp; logging</li>
<li>(15:23) - Is Bad Proccessor the biggest active directory attack in your tool box?</li>
</ul><br>Key Topics Covered<br>• How a security upgrade became a privilege-escalation vector.<br>• Why service account security failures create invisible attack paths.<br>• The real DMSA abuse chain: child objects → successor claim → domain admin.<br>• Zero Trust defenses for AD: permissions, logging, rotation, least privilege.<p>Got your attention?<br>Subscribe to Threat Talks and turn on notifications for deep dives into the world’s leading cyber threats and trends.</p><p>Guest and Host Links:<br>Rob Maas (Field CTO, ON2IT): https://threat-talks.com/the-hosts/<br>Luca Cipriano (CTI &amp; Red Team Lead, ON2IT): https://threat-talks.com/the-hosts/</p><p>Additional Resources<br>Threat Talks: https://threat-talks.com/<br>ON2IT (Zero Trust as a Service): https://on2it.net/<br>AMS-IX: https://www.ams-ix.net/ams</p><p><a href="https://share.transistor.fm/s/8ff1c49a/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Tue, 09 Dec 2025 07:06:13 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/8ff1c49a/7bce17de.mp3" length="41378407" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/YJoo7ELSPRSlZaTbf1s5LgvQWp8jLtW9g-OE1HgoR4M/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yNmZm/NmU5Y2NkYmNmNTlm/Mzk4OGI4MjM4OTUx/ZDQyOS5qcGc.jpg"/>
      <itunes:duration>1035</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>It was built to secure service accounts.<br>Instead, it became the cleanest privilege-escalation vector of 2025.</p><p>They called it Bad Successor (A.K.A. CVE-2025-53779).</p><p>A new “secure by design” feature in Windows Server 2025 -DMSA -was supposed to fix service account hygiene. Instead, it introduced a loophole where attackers could claim successor status, skip password requirements, and silently inherit elevated rights from any target account.</p><p>Including domain admin.</p><p>Even after Microsoft patched the issue, the deeper risk remains:<br>Service accounts are over-privileged, under-monitored, and dangerously trusted -and adversaries know it.</p><p>This isn’t a niche AD misconfiguration.</p><p>It’s a privilege-escalation design flaw hiding inside a security feature, and a warning shot for every environment leaning on default trust in the identity layer.</p><p>Watch host Rob Maas, Field CTO at ON2IT, and Luca Cipriano, CTI &amp; Red Team Lead at ON2IT break down how Bad Successor works, how attackers exploited it, and what a Zero Trust AD strategy actually looks like in 2025.</p><p></p><ul><li>(00:00) - Intro &amp; why service accounts still matter</li>
<li>(00:46) - What are service accounts really for?</li>
<li>(01:31) - DMSA explained: Microsoft’s new managed service account</li>
<li>(02:56) - How DMSA migration works (the phone-migration analogy)</li>
<li>(04:40) - What is Bad Successor &amp; why it matters</li>
<li>(08:00) - How widespread is this vulnerbility?</li>
<li>(11:42) - – Microsoft’s patch &amp; post-patch stealth paths – is the patch working?</li>
<li>(14:03) - Defending AD: patching, OU permissions &amp; logging</li>
<li>(15:23) - Is Bad Proccessor the biggest active directory attack in your tool box?</li>
</ul><br>Key Topics Covered<br>• How a security upgrade became a privilege-escalation vector.<br>• Why service account security failures create invisible attack paths.<br>• The real DMSA abuse chain: child objects → successor claim → domain admin.<br>• Zero Trust defenses for AD: permissions, logging, rotation, least privilege.<p>Got your attention?<br>Subscribe to Threat Talks and turn on notifications for deep dives into the world’s leading cyber threats and trends.</p><p>Guest and Host Links:<br>Rob Maas (Field CTO, ON2IT): https://threat-talks.com/the-hosts/<br>Luca Cipriano (CTI &amp; Red Team Lead, ON2IT): https://threat-talks.com/the-hosts/</p><p>Additional Resources<br>Threat Talks: https://threat-talks.com/<br>ON2IT (Zero Trust as a Service): https://on2it.net/<br>AMS-IX: https://www.ams-ix.net/ams</p><p><a href="https://share.transistor.fm/s/8ff1c49a/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </itunes:summary>
      <itunes:keywords>Bad Successor</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/8ff1c49a/transcript.srt" type="application/x-subrip" rel="captions"/>
      <podcast:chapters url="https://share.transistor.fm/s/8ff1c49a/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>From Hacker to Hero</title>
      <itunes:title>From Hacker to Hero</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ef6131fc-f5dd-46e2-b428-5b96593a3067</guid>
      <link>https://share.transistor.fm/s/ab39bb87</link>
      <description>
        <![CDATA[<p>What if your next great cyber defender is a teenager gaming in their bedroom right now?</p><p>In this Threat Talks episode, Lieuwe Jan Koning and former FBI Supervisory Special Agent William McKean (founder of The Redirect Project) explore how young digital natives go From Hacker to Hero.</p><p>They chart the journey from gaming and online communities to risky first hacks and real-world intrusions. Then they show how to redirect that curiosity away from cybercrime and into ethical hacking, cyber defense, and a Zero Trust mindset at home and at work.</p><p>You’ll get practical questions to ask kids, simple “safe word” tactics, and concrete steps security leaders can use to grow defenders instead of future attackers.</p><p>Key Topics Covered<br>From gamer to attacker: How curiosity, gaming communities and digital “mentors” funnel kids into cybercrime, and how to redirect that path toward ethical hacking.</p><p>Psychology of recruitment: Why belonging, status and rewards override an undeveloped moral compass, and how grooming patterns mirror terrorism and gang recruitment.</p><p>Parent &amp; educator playbook: Practical ways to talk about online life, spot early warning signs, use “safe words,” and apply a Zero Trust mindset at home.</p><p>Diversion, not destruction: How programs like The re_direct Project, HackShield, re_B00TCMP, Hack_Right, and The Hacking Games turn justice-involved kids into defenders instead of life-long offenders.</p><p></p><ul><li>(00:00) - - Introduction</li>
<li>(01:25) - -  What does FBI’s cyber division do</li>
<li>(05:40) - - Children as hackers</li>
<li>(08:14) - - From hacker to helper </li>
<li>(10:31) - - It all starts with curiosity</li>
<li>(17:56) - - What about AI development</li>
<li>(21:27) - - Other mechanisms to worry about</li>
<li>(22:32) - - 27:17 What can we do to help </li>
<li>(27:17) - - The re_direct Project </li>
<li>(33:45) - - What should the consequences be for child hackers</li>
<li>(37:09) - - Recommendations for parents</li>
<li>(42:02) - - What can organizations do</li>
</ul><br>Additional Resources<br>ON2IT &amp; Threat Talks<br>• ON2IT – Zero Trust Innovators: https://on2it.net/<br>• Zero Trust as a Service: https://on2it.net/zero-trust/<br>• Threat Talks podcast hub: https://threat-talks.com/ <p>Episode Guest &amp; Projects Mentioned<br>• The re_direct Project (youth cyber diversion &amp; mentorship): https://www.redirectproject.org/ <br>• HackShield (elementary school cyber game): https://www.hackshieldgame.com/ <br>• Dutch Police re_B00TCMP “Reboot Camp”: https://www.politie.nl/informatie/re_b00tcmp.html <br>• Hack_Right juvenile cyber program: https://www.om.nl/onderwerpen/cybercrime/hack_right <br>• The Hacking Games (ethical hacker esports): https://www.thehackinggames.com/ </p><p>If this episode helped you rethink your From Hacker to Hero strategy for your family or your workforce, don’t forget to hit Like, subscribe to Threat Talks.</p><p><a href="https://share.transistor.fm/s/ab39bb87/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔 === <br>► YOUTUBE: https://youtube.com/@ThreatTalks <br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E <br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520 <br>👕 Receive your Threat Talks T-shirt https://threat-talks.com/ <br>🗺️ Explore the Hack's Route in Detail <br>🗺️ https://threat-talks.com 🕵️<br> Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>What if your next great cyber defender is a teenager gaming in their bedroom right now?</p><p>In this Threat Talks episode, Lieuwe Jan Koning and former FBI Supervisory Special Agent William McKean (founder of The Redirect Project) explore how young digital natives go From Hacker to Hero.</p><p>They chart the journey from gaming and online communities to risky first hacks and real-world intrusions. Then they show how to redirect that curiosity away from cybercrime and into ethical hacking, cyber defense, and a Zero Trust mindset at home and at work.</p><p>You’ll get practical questions to ask kids, simple “safe word” tactics, and concrete steps security leaders can use to grow defenders instead of future attackers.</p><p>Key Topics Covered<br>From gamer to attacker: How curiosity, gaming communities and digital “mentors” funnel kids into cybercrime, and how to redirect that path toward ethical hacking.</p><p>Psychology of recruitment: Why belonging, status and rewards override an undeveloped moral compass, and how grooming patterns mirror terrorism and gang recruitment.</p><p>Parent &amp; educator playbook: Practical ways to talk about online life, spot early warning signs, use “safe words,” and apply a Zero Trust mindset at home.</p><p>Diversion, not destruction: How programs like The re_direct Project, HackShield, re_B00TCMP, Hack_Right, and The Hacking Games turn justice-involved kids into defenders instead of life-long offenders.</p><p></p><ul><li>(00:00) - - Introduction</li>
<li>(01:25) - -  What does FBI’s cyber division do</li>
<li>(05:40) - - Children as hackers</li>
<li>(08:14) - - From hacker to helper </li>
<li>(10:31) - - It all starts with curiosity</li>
<li>(17:56) - - What about AI development</li>
<li>(21:27) - - Other mechanisms to worry about</li>
<li>(22:32) - - 27:17 What can we do to help </li>
<li>(27:17) - - The re_direct Project </li>
<li>(33:45) - - What should the consequences be for child hackers</li>
<li>(37:09) - - Recommendations for parents</li>
<li>(42:02) - - What can organizations do</li>
</ul><br>Additional Resources<br>ON2IT &amp; Threat Talks<br>• ON2IT – Zero Trust Innovators: https://on2it.net/<br>• Zero Trust as a Service: https://on2it.net/zero-trust/<br>• Threat Talks podcast hub: https://threat-talks.com/ <p>Episode Guest &amp; Projects Mentioned<br>• The re_direct Project (youth cyber diversion &amp; mentorship): https://www.redirectproject.org/ <br>• HackShield (elementary school cyber game): https://www.hackshieldgame.com/ <br>• Dutch Police re_B00TCMP “Reboot Camp”: https://www.politie.nl/informatie/re_b00tcmp.html <br>• Hack_Right juvenile cyber program: https://www.om.nl/onderwerpen/cybercrime/hack_right <br>• The Hacking Games (ethical hacker esports): https://www.thehackinggames.com/ </p><p>If this episode helped you rethink your From Hacker to Hero strategy for your family or your workforce, don’t forget to hit Like, subscribe to Threat Talks.</p><p><a href="https://share.transistor.fm/s/ab39bb87/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔 === <br>► YOUTUBE: https://youtube.com/@ThreatTalks <br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E <br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520 <br>👕 Receive your Threat Talks T-shirt https://threat-talks.com/ <br>🗺️ Explore the Hack's Route in Detail <br>🗺️ https://threat-talks.com 🕵️<br> Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Wed, 03 Dec 2025 16:33:37 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/ab39bb87/bb381455.mp3" length="108707960" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/6Lwy38CAswOwKN3sPjcorOjEZHM1GO9T4mo0NNXFOUM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wZmRk/ZWMzNDBhMmY1MmM3/YmM0ZDNlYTAwZWQx/YTg1ZS5qcGc.jpg"/>
      <itunes:duration>2718</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>What if your next great cyber defender is a teenager gaming in their bedroom right now?</p><p>In this Threat Talks episode, Lieuwe Jan Koning and former FBI Supervisory Special Agent William McKean (founder of The Redirect Project) explore how young digital natives go From Hacker to Hero.</p><p>They chart the journey from gaming and online communities to risky first hacks and real-world intrusions. Then they show how to redirect that curiosity away from cybercrime and into ethical hacking, cyber defense, and a Zero Trust mindset at home and at work.</p><p>You’ll get practical questions to ask kids, simple “safe word” tactics, and concrete steps security leaders can use to grow defenders instead of future attackers.</p><p>Key Topics Covered<br>From gamer to attacker: How curiosity, gaming communities and digital “mentors” funnel kids into cybercrime, and how to redirect that path toward ethical hacking.</p><p>Psychology of recruitment: Why belonging, status and rewards override an undeveloped moral compass, and how grooming patterns mirror terrorism and gang recruitment.</p><p>Parent &amp; educator playbook: Practical ways to talk about online life, spot early warning signs, use “safe words,” and apply a Zero Trust mindset at home.</p><p>Diversion, not destruction: How programs like The re_direct Project, HackShield, re_B00TCMP, Hack_Right, and The Hacking Games turn justice-involved kids into defenders instead of life-long offenders.</p><p></p><ul><li>(00:00) - - Introduction</li>
<li>(01:25) - -  What does FBI’s cyber division do</li>
<li>(05:40) - - Children as hackers</li>
<li>(08:14) - - From hacker to helper </li>
<li>(10:31) - - It all starts with curiosity</li>
<li>(17:56) - - What about AI development</li>
<li>(21:27) - - Other mechanisms to worry about</li>
<li>(22:32) - - 27:17 What can we do to help </li>
<li>(27:17) - - The re_direct Project </li>
<li>(33:45) - - What should the consequences be for child hackers</li>
<li>(37:09) - - Recommendations for parents</li>
<li>(42:02) - - What can organizations do</li>
</ul><br>Additional Resources<br>ON2IT &amp; Threat Talks<br>• ON2IT – Zero Trust Innovators: https://on2it.net/<br>• Zero Trust as a Service: https://on2it.net/zero-trust/<br>• Threat Talks podcast hub: https://threat-talks.com/ <p>Episode Guest &amp; Projects Mentioned<br>• The re_direct Project (youth cyber diversion &amp; mentorship): https://www.redirectproject.org/ <br>• HackShield (elementary school cyber game): https://www.hackshieldgame.com/ <br>• Dutch Police re_B00TCMP “Reboot Camp”: https://www.politie.nl/informatie/re_b00tcmp.html <br>• Hack_Right juvenile cyber program: https://www.om.nl/onderwerpen/cybercrime/hack_right <br>• The Hacking Games (ethical hacker esports): https://www.thehackinggames.com/ </p><p>If this episode helped you rethink your From Hacker to Hero strategy for your family or your workforce, don’t forget to hit Like, subscribe to Threat Talks.</p><p><a href="https://share.transistor.fm/s/ab39bb87/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔 === <br>► YOUTUBE: https://youtube.com/@ThreatTalks <br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E <br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520 <br>👕 Receive your Threat Talks T-shirt https://threat-talks.com/ <br>🗺️ Explore the Hack's Route in Detail <br>🗺️ https://threat-talks.com 🕵️<br> Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ab39bb87/transcript.srt" type="application/x-subrip" rel="captions"/>
      <podcast:chapters url="https://share.transistor.fm/s/ab39bb87/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>The Npm Worm Outbreak</title>
      <itunes:title>The Npm Worm Outbreak</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7ca48880-56a9-4baa-8637-81671536056a</guid>
      <link>https://threat-talks.com/the-npm-worm-outbreak/</link>
      <description>
        <![CDATA[<p>The world’s biggest open-source ecosystem - npm - faced its first self-spreading worm.</p><p><br>They called it Shai Hulud.</p><p><br>It didn’t just infect one package. It infected developers themselves.</p><p><br>When a maintainer got phished, the worm harvested credentials, hijacked tokens, and created new CI/CD workflows to keep spreading - <em>automatically</em>.</p><p><br>No command-and-control. No manual uploads. Just a chain reaction across the npm registry.</p><p><br>And while the world was busy shouting about “2.6 billion downloads affected,” this real threat was quietly exfiltrating GitHub, cloud, and npm secrets - right under everyone’s nose.</p><p><br>This isn’t just another npm story.</p><p><br>It’s the first-ever self-replicating supply chain worm - and a wake-up call for every developer and security team building in the open.</p><p><br>Watch host <strong>Rob Maas</strong> (Field CTO, ON2IT) and <strong>Yuri Wit</strong> (SOC Analyst, ON2IT) </p><p>break down how it started, how it spread, and how to make sure your pipeline isn’t the next one to go viral.</p><p><br></p><ul><li>(00:00) - Intro, welcome &amp; what npm is</li>
<li>(00:01) - Crypto drainer: how it worked, maintainer phish &amp; real impact</li>
<li>(00:05) - “Shai Hulud” worm: credential harvesting &amp; package spread</li>
<li>(00:07) - Hype vs reality: the “2.6 billion downloads” myth &amp; media reaction</li>
<li>(00:10) - Defenses: dependency strategy &amp; CI/CD workflow alerts</li>
<li>(00:14) - Secrets hygiene, OS targeting (Windows exit), end-user/EDR tips &amp; takeaways</li>
</ul><br><strong>Key Topics Covered</strong><ul><li>How a maintainer phish and TOTP capture led to a crypto drainer in npm.</li><li>Why Shai Hulud’s credential harvesting + CI/CD persistence makes it high-impact.</li><li>Practical defenses: pin/review dependencies, CI/CD change alerts, secret rotation, egress monitoring.</li><li>What developers vs. end users can (and can’t) do in supply-chain attacks.</li></ul><p>Got your attention? </p><p>Subscribe to Threat Talks and turn on notifications for more content on the world’s leading cyber threats and trends.</p><p><br></p><p><strong>Guest and Host Links: </strong></p><p>Rob Maas (Field CTO, ON2IT): https://www.linkedin.com/in/robmaas83/  </p><p>Yuri Wit (SOC Analyst, ON2IT): https://www.linkedin.com/in/yuriwit/  </p><p> </p><p><strong>Additional Resources<br></strong> Threat Talks: <a href="https://threat-talks.com/">https://threat-talks.com/</a><br> ON2IT (Zero Trust as a Service): <a href="https://on2it.net/">https://on2it.net/</a><br> AMS-IX: <a href="https://www.ams-ix.net/ams">https://www.ams-ix.net/ams</a><br> npm: https://www.npmjs.com/<br> Node.js: https://nodejs.org/<br> GitHub Docs: Actions &amp; Workflows: <a href="https://docs.github.com/actions">https://docs.github.com/actions</a><br> MetaMask: https://metamask.io/<br> OWASP Dependency Management: https://owasp.org/www-project-dependency-check/<br> SLSA Supply-chain Levels for Software Artifacts: https://slsa.dev/</p><p><a href="https://share.transistor.fm/s/8bbd2a4d/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The world’s biggest open-source ecosystem - npm - faced its first self-spreading worm.</p><p><br>They called it Shai Hulud.</p><p><br>It didn’t just infect one package. It infected developers themselves.</p><p><br>When a maintainer got phished, the worm harvested credentials, hijacked tokens, and created new CI/CD workflows to keep spreading - <em>automatically</em>.</p><p><br>No command-and-control. No manual uploads. Just a chain reaction across the npm registry.</p><p><br>And while the world was busy shouting about “2.6 billion downloads affected,” this real threat was quietly exfiltrating GitHub, cloud, and npm secrets - right under everyone’s nose.</p><p><br>This isn’t just another npm story.</p><p><br>It’s the first-ever self-replicating supply chain worm - and a wake-up call for every developer and security team building in the open.</p><p><br>Watch host <strong>Rob Maas</strong> (Field CTO, ON2IT) and <strong>Yuri Wit</strong> (SOC Analyst, ON2IT) </p><p>break down how it started, how it spread, and how to make sure your pipeline isn’t the next one to go viral.</p><p><br></p><ul><li>(00:00) - Intro, welcome &amp; what npm is</li>
<li>(00:01) - Crypto drainer: how it worked, maintainer phish &amp; real impact</li>
<li>(00:05) - “Shai Hulud” worm: credential harvesting &amp; package spread</li>
<li>(00:07) - Hype vs reality: the “2.6 billion downloads” myth &amp; media reaction</li>
<li>(00:10) - Defenses: dependency strategy &amp; CI/CD workflow alerts</li>
<li>(00:14) - Secrets hygiene, OS targeting (Windows exit), end-user/EDR tips &amp; takeaways</li>
</ul><br><strong>Key Topics Covered</strong><ul><li>How a maintainer phish and TOTP capture led to a crypto drainer in npm.</li><li>Why Shai Hulud’s credential harvesting + CI/CD persistence makes it high-impact.</li><li>Practical defenses: pin/review dependencies, CI/CD change alerts, secret rotation, egress monitoring.</li><li>What developers vs. end users can (and can’t) do in supply-chain attacks.</li></ul><p>Got your attention? </p><p>Subscribe to Threat Talks and turn on notifications for more content on the world’s leading cyber threats and trends.</p><p><br></p><p><strong>Guest and Host Links: </strong></p><p>Rob Maas (Field CTO, ON2IT): https://www.linkedin.com/in/robmaas83/  </p><p>Yuri Wit (SOC Analyst, ON2IT): https://www.linkedin.com/in/yuriwit/  </p><p> </p><p><strong>Additional Resources<br></strong> Threat Talks: <a href="https://threat-talks.com/">https://threat-talks.com/</a><br> ON2IT (Zero Trust as a Service): <a href="https://on2it.net/">https://on2it.net/</a><br> AMS-IX: <a href="https://www.ams-ix.net/ams">https://www.ams-ix.net/ams</a><br> npm: https://www.npmjs.com/<br> Node.js: https://nodejs.org/<br> GitHub Docs: Actions &amp; Workflows: <a href="https://docs.github.com/actions">https://docs.github.com/actions</a><br> MetaMask: https://metamask.io/<br> OWASP Dependency Management: https://owasp.org/www-project-dependency-check/<br> SLSA Supply-chain Levels for Software Artifacts: https://slsa.dev/</p><p><a href="https://share.transistor.fm/s/8bbd2a4d/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </content:encoded>
      <pubDate>Tue, 25 Nov 2025 08:13:26 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/8bbd2a4d/dca515ff.mp3" length="44252418" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/OXGUftDWeGRXdOYHDVsj9YVn5daSV0XBRlLYZmqINTA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kNWU1/NTAxMDMwMWRhYjRm/YjVkNjg4MGQzZTZk/ODIwYi5wbmc.jpg"/>
      <itunes:duration>1107</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The world’s biggest open-source ecosystem - npm - faced its first self-spreading worm.</p><p><br>They called it Shai Hulud.</p><p><br>It didn’t just infect one package. It infected developers themselves.</p><p><br>When a maintainer got phished, the worm harvested credentials, hijacked tokens, and created new CI/CD workflows to keep spreading - <em>automatically</em>.</p><p><br>No command-and-control. No manual uploads. Just a chain reaction across the npm registry.</p><p><br>And while the world was busy shouting about “2.6 billion downloads affected,” this real threat was quietly exfiltrating GitHub, cloud, and npm secrets - right under everyone’s nose.</p><p><br>This isn’t just another npm story.</p><p><br>It’s the first-ever self-replicating supply chain worm - and a wake-up call for every developer and security team building in the open.</p><p><br>Watch host <strong>Rob Maas</strong> (Field CTO, ON2IT) and <strong>Yuri Wit</strong> (SOC Analyst, ON2IT) </p><p>break down how it started, how it spread, and how to make sure your pipeline isn’t the next one to go viral.</p><p><br></p><ul><li>(00:00) - Intro, welcome &amp; what npm is</li>
<li>(00:01) - Crypto drainer: how it worked, maintainer phish &amp; real impact</li>
<li>(00:05) - “Shai Hulud” worm: credential harvesting &amp; package spread</li>
<li>(00:07) - Hype vs reality: the “2.6 billion downloads” myth &amp; media reaction</li>
<li>(00:10) - Defenses: dependency strategy &amp; CI/CD workflow alerts</li>
<li>(00:14) - Secrets hygiene, OS targeting (Windows exit), end-user/EDR tips &amp; takeaways</li>
</ul><br><strong>Key Topics Covered</strong><ul><li>How a maintainer phish and TOTP capture led to a crypto drainer in npm.</li><li>Why Shai Hulud’s credential harvesting + CI/CD persistence makes it high-impact.</li><li>Practical defenses: pin/review dependencies, CI/CD change alerts, secret rotation, egress monitoring.</li><li>What developers vs. end users can (and can’t) do in supply-chain attacks.</li></ul><p>Got your attention? </p><p>Subscribe to Threat Talks and turn on notifications for more content on the world’s leading cyber threats and trends.</p><p><br></p><p><strong>Guest and Host Links: </strong></p><p>Rob Maas (Field CTO, ON2IT): https://www.linkedin.com/in/robmaas83/  </p><p>Yuri Wit (SOC Analyst, ON2IT): https://www.linkedin.com/in/yuriwit/  </p><p> </p><p><strong>Additional Resources<br></strong> Threat Talks: <a href="https://threat-talks.com/">https://threat-talks.com/</a><br> ON2IT (Zero Trust as a Service): <a href="https://on2it.net/">https://on2it.net/</a><br> AMS-IX: <a href="https://www.ams-ix.net/ams">https://www.ams-ix.net/ams</a><br> npm: https://www.npmjs.com/<br> Node.js: https://nodejs.org/<br> GitHub Docs: Actions &amp; Workflows: <a href="https://docs.github.com/actions">https://docs.github.com/actions</a><br> MetaMask: https://metamask.io/<br> OWASP Dependency Management: https://owasp.org/www-project-dependency-check/<br> SLSA Supply-chain Levels for Software Artifacts: https://slsa.dev/</p><p><a href="https://share.transistor.fm/s/8bbd2a4d/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </itunes:summary>
      <itunes:keywords>Shai Hulud, npm</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/8bbd2a4d/transcript.srt" type="application/x-subrip" rel="captions"/>
      <podcast:chapters url="https://share.transistor.fm/s/8bbd2a4d/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Inside the SalesLoft Breach </title>
      <itunes:title>Inside the SalesLoft Breach </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">834b4efa-9297-4ec6-aa27-a56dcb20a1ed</guid>
      <link>https://share.transistor.fm/s/31624e5e</link>
      <description>
        <![CDATA[<p>You were promised safe SaaS - but got silent data loss.<br>In Inside the Salesloft Breach, Rob Maas and Luca Cipriano expose how trusted integrations became the attack vector.</p><p>They trace how vishing calls, trojanized Salesforce tools, and GitHub-to-AWS pivots gave attackers OAuth access and drained CRMs without a single alert. You’ll hear how Drift integrations and bulk SOQL queries quietly moved data out of sight, while audit trails and API metadata disappeared.<br>If you need provable control over data exfiltration and a narrative your board will understand, this is your playbook.</p><p>Turn Zero Trust from slogan to stop - with IP allowlists, app inventories, token telemetry, and shared responsibility that actually blocks abuse at the source.</p><p></p><ul><li>(00:00) - Cloud first did not mean data safe.</li>
<li>(00:45) - What Salesforce is and why attackers target it.</li>
<li>(02:00) - Campaign one. Vishing and a trojanized data loader to OAuth access.</li>
<li>(04:15) - Campaign two. Salesloft and Drift path from GitHub to AWS to Salesforce tokens.</li>
<li>(07:00) - Impact and cover up. 700 plus orgs hit and API job metadata removed.</li>
<li>(09:10) - Who was involved. ShinyHunters, Scattered Spider, Lapsus, and legal fallout.</li>
<li>(11:00) - Zero Trust actions. IP allowlisting, app inventory, token monitoring, staff education, shared responsibility.</li>
</ul><br>Key Topics Covered:<br>•  How one sign-in token became a master key for your CRM.<br>•  The attacker’s route: from code repo → cloud → Salesforce → data exfiltration.<br>•  What shared responsibility means in SaaS — and what’s actually on you.<br>•  What truly stops it: trusted apps only, IP allowlists, short-lived tokens, and continuous monitoring.<p>Found value and want outcome focused guidance every week? <br>Subscribe to Threat Talks, turn on notifications and add your questions for the next deep dive</p><p>Guest and Host Links: <br>Rob Maas (Field CTO, ON2IT): https://www.linkedin.com/in/robmaas83/ <br>Luca Cipriano (Cyber Threat Intelligence Program Lead, ON2IT): https://www.linkedin.com/in/luca-c-914973124/</p><p><a href="https://share.transistor.fm/s/31624e5e/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>Additional resources:<br>Threat Talks https://threat-talks.com/<br>ON2IT https://on2it.net/?<br>AMS IX https://www.ams-ix.net/ams<br>Salesforce https://www.salesforce.com/<br>Salesloft https://www.salesloft.com/<br>Drift https://www.drift.com/<br>Okta https://www.okta.com/<br>Have I Been Pwned https://haveibeenpwned.com/</p><p>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE:  / @threattalks  <br>► SPOTIFY: https://open.spotify.com/show/1SXUyUE...<br>► APPLE: https://podcasts.apple.com/us/podcast...</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>You were promised safe SaaS - but got silent data loss.<br>In Inside the Salesloft Breach, Rob Maas and Luca Cipriano expose how trusted integrations became the attack vector.</p><p>They trace how vishing calls, trojanized Salesforce tools, and GitHub-to-AWS pivots gave attackers OAuth access and drained CRMs without a single alert. You’ll hear how Drift integrations and bulk SOQL queries quietly moved data out of sight, while audit trails and API metadata disappeared.<br>If you need provable control over data exfiltration and a narrative your board will understand, this is your playbook.</p><p>Turn Zero Trust from slogan to stop - with IP allowlists, app inventories, token telemetry, and shared responsibility that actually blocks abuse at the source.</p><p></p><ul><li>(00:00) - Cloud first did not mean data safe.</li>
<li>(00:45) - What Salesforce is and why attackers target it.</li>
<li>(02:00) - Campaign one. Vishing and a trojanized data loader to OAuth access.</li>
<li>(04:15) - Campaign two. Salesloft and Drift path from GitHub to AWS to Salesforce tokens.</li>
<li>(07:00) - Impact and cover up. 700 plus orgs hit and API job metadata removed.</li>
<li>(09:10) - Who was involved. ShinyHunters, Scattered Spider, Lapsus, and legal fallout.</li>
<li>(11:00) - Zero Trust actions. IP allowlisting, app inventory, token monitoring, staff education, shared responsibility.</li>
</ul><br>Key Topics Covered:<br>•  How one sign-in token became a master key for your CRM.<br>•  The attacker’s route: from code repo → cloud → Salesforce → data exfiltration.<br>•  What shared responsibility means in SaaS — and what’s actually on you.<br>•  What truly stops it: trusted apps only, IP allowlists, short-lived tokens, and continuous monitoring.<p>Found value and want outcome focused guidance every week? <br>Subscribe to Threat Talks, turn on notifications and add your questions for the next deep dive</p><p>Guest and Host Links: <br>Rob Maas (Field CTO, ON2IT): https://www.linkedin.com/in/robmaas83/ <br>Luca Cipriano (Cyber Threat Intelligence Program Lead, ON2IT): https://www.linkedin.com/in/luca-c-914973124/</p><p><a href="https://share.transistor.fm/s/31624e5e/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>Additional resources:<br>Threat Talks https://threat-talks.com/<br>ON2IT https://on2it.net/?<br>AMS IX https://www.ams-ix.net/ams<br>Salesforce https://www.salesforce.com/<br>Salesloft https://www.salesloft.com/<br>Drift https://www.drift.com/<br>Okta https://www.okta.com/<br>Have I Been Pwned https://haveibeenpwned.com/</p><p>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE:  / @threattalks  <br>► SPOTIFY: https://open.spotify.com/show/1SXUyUE...<br>► APPLE: https://podcasts.apple.com/us/podcast...</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Tue, 18 Nov 2025 08:54:50 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/31624e5e/49d080b2.mp3" length="12920251" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/BEiDRoFZY0rE6u3U46aUHXVLANgImeDyjgo22A0bdBw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yMDIy/N2UyMmNlMzJjZDFi/ODY4ZTYyMWIxYWU0/MjU4Mi5wbmc.jpg"/>
      <itunes:duration>1292</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>You were promised safe SaaS - but got silent data loss.<br>In Inside the Salesloft Breach, Rob Maas and Luca Cipriano expose how trusted integrations became the attack vector.</p><p>They trace how vishing calls, trojanized Salesforce tools, and GitHub-to-AWS pivots gave attackers OAuth access and drained CRMs without a single alert. You’ll hear how Drift integrations and bulk SOQL queries quietly moved data out of sight, while audit trails and API metadata disappeared.<br>If you need provable control over data exfiltration and a narrative your board will understand, this is your playbook.</p><p>Turn Zero Trust from slogan to stop - with IP allowlists, app inventories, token telemetry, and shared responsibility that actually blocks abuse at the source.</p><p></p><ul><li>(00:00) - Cloud first did not mean data safe.</li>
<li>(00:45) - What Salesforce is and why attackers target it.</li>
<li>(02:00) - Campaign one. Vishing and a trojanized data loader to OAuth access.</li>
<li>(04:15) - Campaign two. Salesloft and Drift path from GitHub to AWS to Salesforce tokens.</li>
<li>(07:00) - Impact and cover up. 700 plus orgs hit and API job metadata removed.</li>
<li>(09:10) - Who was involved. ShinyHunters, Scattered Spider, Lapsus, and legal fallout.</li>
<li>(11:00) - Zero Trust actions. IP allowlisting, app inventory, token monitoring, staff education, shared responsibility.</li>
</ul><br>Key Topics Covered:<br>•  How one sign-in token became a master key for your CRM.<br>•  The attacker’s route: from code repo → cloud → Salesforce → data exfiltration.<br>•  What shared responsibility means in SaaS — and what’s actually on you.<br>•  What truly stops it: trusted apps only, IP allowlists, short-lived tokens, and continuous monitoring.<p>Found value and want outcome focused guidance every week? <br>Subscribe to Threat Talks, turn on notifications and add your questions for the next deep dive</p><p>Guest and Host Links: <br>Rob Maas (Field CTO, ON2IT): https://www.linkedin.com/in/robmaas83/ <br>Luca Cipriano (Cyber Threat Intelligence Program Lead, ON2IT): https://www.linkedin.com/in/luca-c-914973124/</p><p><a href="https://share.transistor.fm/s/31624e5e/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>Additional resources:<br>Threat Talks https://threat-talks.com/<br>ON2IT https://on2it.net/?<br>AMS IX https://www.ams-ix.net/ams<br>Salesforce https://www.salesforce.com/<br>Salesloft https://www.salesloft.com/<br>Drift https://www.drift.com/<br>Okta https://www.okta.com/<br>Have I Been Pwned https://haveibeenpwned.com/</p><p>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE:  / @threattalks  <br>► SPOTIFY: https://open.spotify.com/show/1SXUyUE...<br>► APPLE: https://podcasts.apple.com/us/podcast...</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/31624e5e/transcript.srt" type="application/x-subrip" rel="captions"/>
      <podcast:chapters url="https://share.transistor.fm/s/31624e5e/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>The App Store Nightmare: Why AI MCP Stores Are a Trap</title>
      <itunes:title>The App Store Nightmare: Why AI MCP Stores Are a Trap</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4019fbdd-2b03-42c4-bda8-92386189a97b</guid>
      <link>https://share.transistor.fm/s/58a76c2a</link>
      <description>
        <![CDATA[<p><strong>The new AI app store is here - and it’s already making choices for your company.</strong><br> This episode shows you how to spot it, stop it, and stay safe.</p><p>Host <strong>Lieuwe Jan Koning</strong> with <strong>RobMaas</strong> (Field CTO, ON2IT) explain the app store<strong>nightmare</strong> in plain language. A new system (MCP) lets AI tools like <strong>ChatGPT</strong>, <strong>Claude</strong>, and <strong>Gemini</strong> do tasks for you - sometimes too much. When a bad tool or a sneaky document gets in, it can read, send, or delete things without you noticing.</p><p><br><strong>Real cases, real damage:</strong></p><ul><li><strong>Postmark MCP backdoor</strong> - secretly BCC’d emails (email copies)</li><li><strong>Shadow Escape</strong> - “zero-click” data theft from a hidden prompt</li><li><strong>kubectl chaos</strong> - a command mistake that can wipe servers</li></ul><p><br><strong>Your quick fix:</strong> keep a list of every AI tool and give each only the access it needs. <strong>Example:</strong> let your document bot read just the “Policies” folder—not your whole drive. <strong>For more fixes, watch the full episode.</strong></p><p>Key topics covered:</p><p>·       The app store<strong>nightmare</strong>: a new AI app store you don’t control</p><p>·       How a tricked document can make your AI act against you</p><p>·       A simple <strong>ZeroTrust</strong> plan anyone can start today</p><p>·       How to cut tool sprawl, cost, and risk—without slowing the team</p><p><br><strong>If you use ChatGPT, Claude, or Gemini at work, this is your survival brief.</strong><br> Subscribe for more <strong>Threat Talks</strong> and ON2IT’s Zero Trust guidance.</p><p> </p><p><strong>Guest and Host Links: </strong></p><p>Rob Maas (Field CTO, ON2IT): https://www.linkedin.com/in/robmaas83/ </p><p>Lieuwe Jan Koning (Founding Partner, ON2IT): https://www.linkedin.com/in/lieuwejan/ </p><p><br><a href="https://share.transistor.fm/s/58a76c2a/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<strong><br>Additional Resources:<br></strong>Threat Talks: <a href="https://threat-talks.com/">https://threat-talks.com/</a><br> ON2IT (Zero Trust as a Service): <a href="https://on2it.net/">https://on2it.net/</a><br> AMS-IX: <a href="https://www.ams-ix.net/ams">https://www.ams-ix.net/ams</a><br> Anthropic MCP announcement: <a href="https://www.anthropic.com/news/model-context-protocol">https://www.anthropic.com/news/model-context-protocol</a><br> OpenAI Tools/Connectors/MCP: <a href="https://platform.openai.com/docs/guides/tools-connectors-mcp">https://platform.openai.com/docs/guides/tools-connectors-mcp</a><br> Kubernetes (kubectl): <a href="https://kubernetes.io/docs/reference/kubectl/">https://kubernetes.io/docs/reference/kubectl/</a><br> Reported Postmark MCP backdoor: <a href="https://thehackernews.com/2025/09/first-malicious-mcp-server-found.html">https://thehackernews.com/2025/09/first-malicious-mcp-server-found.html</a><br> Shadow Escape zero-click research: <a href="https://www.globenewswire.com/news-release/2025/10/22/3171164/0/en/Operant-AI-Discovers-Shadow-Escape-The-First-Zero-Click-Agentic-Attack-via-MCP.html">https://www.globenewswire.com/news-release/2025/10/22/3171164/0/en/Operant-AI-Discovers-Shadow-Escape-The-First-Zero-Click-Agentic-Attack-via-MCP.html</a></p><p>If this saved you a breach, <strong>subscribe</strong> to Threat Talks and follow ON2IT for weekly Zero Trust moves. New episode next week.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>The new AI app store is here - and it’s already making choices for your company.</strong><br> This episode shows you how to spot it, stop it, and stay safe.</p><p>Host <strong>Lieuwe Jan Koning</strong> with <strong>RobMaas</strong> (Field CTO, ON2IT) explain the app store<strong>nightmare</strong> in plain language. A new system (MCP) lets AI tools like <strong>ChatGPT</strong>, <strong>Claude</strong>, and <strong>Gemini</strong> do tasks for you - sometimes too much. When a bad tool or a sneaky document gets in, it can read, send, or delete things without you noticing.</p><p><br><strong>Real cases, real damage:</strong></p><ul><li><strong>Postmark MCP backdoor</strong> - secretly BCC’d emails (email copies)</li><li><strong>Shadow Escape</strong> - “zero-click” data theft from a hidden prompt</li><li><strong>kubectl chaos</strong> - a command mistake that can wipe servers</li></ul><p><br><strong>Your quick fix:</strong> keep a list of every AI tool and give each only the access it needs. <strong>Example:</strong> let your document bot read just the “Policies” folder—not your whole drive. <strong>For more fixes, watch the full episode.</strong></p><p>Key topics covered:</p><p>·       The app store<strong>nightmare</strong>: a new AI app store you don’t control</p><p>·       How a tricked document can make your AI act against you</p><p>·       A simple <strong>ZeroTrust</strong> plan anyone can start today</p><p>·       How to cut tool sprawl, cost, and risk—without slowing the team</p><p><br><strong>If you use ChatGPT, Claude, or Gemini at work, this is your survival brief.</strong><br> Subscribe for more <strong>Threat Talks</strong> and ON2IT’s Zero Trust guidance.</p><p> </p><p><strong>Guest and Host Links: </strong></p><p>Rob Maas (Field CTO, ON2IT): https://www.linkedin.com/in/robmaas83/ </p><p>Lieuwe Jan Koning (Founding Partner, ON2IT): https://www.linkedin.com/in/lieuwejan/ </p><p><br><a href="https://share.transistor.fm/s/58a76c2a/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<strong><br>Additional Resources:<br></strong>Threat Talks: <a href="https://threat-talks.com/">https://threat-talks.com/</a><br> ON2IT (Zero Trust as a Service): <a href="https://on2it.net/">https://on2it.net/</a><br> AMS-IX: <a href="https://www.ams-ix.net/ams">https://www.ams-ix.net/ams</a><br> Anthropic MCP announcement: <a href="https://www.anthropic.com/news/model-context-protocol">https://www.anthropic.com/news/model-context-protocol</a><br> OpenAI Tools/Connectors/MCP: <a href="https://platform.openai.com/docs/guides/tools-connectors-mcp">https://platform.openai.com/docs/guides/tools-connectors-mcp</a><br> Kubernetes (kubectl): <a href="https://kubernetes.io/docs/reference/kubectl/">https://kubernetes.io/docs/reference/kubectl/</a><br> Reported Postmark MCP backdoor: <a href="https://thehackernews.com/2025/09/first-malicious-mcp-server-found.html">https://thehackernews.com/2025/09/first-malicious-mcp-server-found.html</a><br> Shadow Escape zero-click research: <a href="https://www.globenewswire.com/news-release/2025/10/22/3171164/0/en/Operant-AI-Discovers-Shadow-Escape-The-First-Zero-Click-Agentic-Attack-via-MCP.html">https://www.globenewswire.com/news-release/2025/10/22/3171164/0/en/Operant-AI-Discovers-Shadow-Escape-The-First-Zero-Click-Agentic-Attack-via-MCP.html</a></p><p>If this saved you a breach, <strong>subscribe</strong> to Threat Talks and follow ON2IT for weekly Zero Trust moves. New episode next week.</p>]]>
      </content:encoded>
      <pubDate>Tue, 11 Nov 2025 07:31:09 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/58a76c2a/d6409d9d.mp3" length="67238539" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/v8jMkBmxuR5HMnXvYNVA65if1pVeYzTKRM9wivPwEyo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zNWU2/YjMxMWRlNGE3YmYw/ZWZmOWRhN2M3ODZj/ZmViNy5wbmc.jpg"/>
      <itunes:duration>2101</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>The new AI app store is here - and it’s already making choices for your company.</strong><br> This episode shows you how to spot it, stop it, and stay safe.</p><p>Host <strong>Lieuwe Jan Koning</strong> with <strong>RobMaas</strong> (Field CTO, ON2IT) explain the app store<strong>nightmare</strong> in plain language. A new system (MCP) lets AI tools like <strong>ChatGPT</strong>, <strong>Claude</strong>, and <strong>Gemini</strong> do tasks for you - sometimes too much. When a bad tool or a sneaky document gets in, it can read, send, or delete things without you noticing.</p><p><br><strong>Real cases, real damage:</strong></p><ul><li><strong>Postmark MCP backdoor</strong> - secretly BCC’d emails (email copies)</li><li><strong>Shadow Escape</strong> - “zero-click” data theft from a hidden prompt</li><li><strong>kubectl chaos</strong> - a command mistake that can wipe servers</li></ul><p><br><strong>Your quick fix:</strong> keep a list of every AI tool and give each only the access it needs. <strong>Example:</strong> let your document bot read just the “Policies” folder—not your whole drive. <strong>For more fixes, watch the full episode.</strong></p><p>Key topics covered:</p><p>·       The app store<strong>nightmare</strong>: a new AI app store you don’t control</p><p>·       How a tricked document can make your AI act against you</p><p>·       A simple <strong>ZeroTrust</strong> plan anyone can start today</p><p>·       How to cut tool sprawl, cost, and risk—without slowing the team</p><p><br><strong>If you use ChatGPT, Claude, or Gemini at work, this is your survival brief.</strong><br> Subscribe for more <strong>Threat Talks</strong> and ON2IT’s Zero Trust guidance.</p><p> </p><p><strong>Guest and Host Links: </strong></p><p>Rob Maas (Field CTO, ON2IT): https://www.linkedin.com/in/robmaas83/ </p><p>Lieuwe Jan Koning (Founding Partner, ON2IT): https://www.linkedin.com/in/lieuwejan/ </p><p><br><a href="https://share.transistor.fm/s/58a76c2a/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<strong><br>Additional Resources:<br></strong>Threat Talks: <a href="https://threat-talks.com/">https://threat-talks.com/</a><br> ON2IT (Zero Trust as a Service): <a href="https://on2it.net/">https://on2it.net/</a><br> AMS-IX: <a href="https://www.ams-ix.net/ams">https://www.ams-ix.net/ams</a><br> Anthropic MCP announcement: <a href="https://www.anthropic.com/news/model-context-protocol">https://www.anthropic.com/news/model-context-protocol</a><br> OpenAI Tools/Connectors/MCP: <a href="https://platform.openai.com/docs/guides/tools-connectors-mcp">https://platform.openai.com/docs/guides/tools-connectors-mcp</a><br> Kubernetes (kubectl): <a href="https://kubernetes.io/docs/reference/kubectl/">https://kubernetes.io/docs/reference/kubectl/</a><br> Reported Postmark MCP backdoor: <a href="https://thehackernews.com/2025/09/first-malicious-mcp-server-found.html">https://thehackernews.com/2025/09/first-malicious-mcp-server-found.html</a><br> Shadow Escape zero-click research: <a href="https://www.globenewswire.com/news-release/2025/10/22/3171164/0/en/Operant-AI-Discovers-Shadow-Escape-The-First-Zero-Click-Agentic-Attack-via-MCP.html">https://www.globenewswire.com/news-release/2025/10/22/3171164/0/en/Operant-AI-Discovers-Shadow-Escape-The-First-Zero-Click-Agentic-Attack-via-MCP.html</a></p><p>If this saved you a breach, <strong>subscribe</strong> to Threat Talks and follow ON2IT for weekly Zero Trust moves. New episode next week.</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/58a76c2a/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>The Secret Diplomats Fighting Cyber Wars</title>
      <itunes:title>The Secret Diplomats Fighting Cyber Wars</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2422adaf-c6fc-4f08-81ac-191a3cbd5e60</guid>
      <link>https://threat-talks.com/the-secret-diplomats-fighting-cyber-wars/</link>
      <description>
        <![CDATA[<p>Cyber defense doesn’t just happen in code. It’s shaped in conversation. Behind every cyber norm or sanction, there’s a diplomat working to stop digital wars before they start.</p><p> </p><p>In this episode of Threat Talks, Lieuwe Jan Koning (CTO &amp; co-founder of ON2IT) sits down with Ernst Noorman, Ambassador at Large for Cyber Affairs for the Kingdom of the Netherlands. They reveal how backchannel talks, sanctions, and shared rules define what countries can and can’t do in cyberspace, and what CISOs can learn from a diplomat’s playbook. This isn’t patch management. It’s peacekeeping in real time.</p><p><br><strong>What You’ll Learn (From Real-Life Example Discussions)</strong></p><ul><li>What a cyber ambassador actually does – and why every nation needs one.</li><li>How diplomacy helps prevent cyber conflicts between world powers.</li><li>Why UN-backed cyber norms matters even when nations ignore them.</li><li>How global collaboration builds cyber resilience, from Ukraine to Asia.</li><li>What businesses can learn from diplomats about cooperation and intelligence sharing.</li></ul><p></p><ul><li>(00:00) - - 02:29 - Intro</li>
<li>(02:29) - - 03:46 - What is the role of a cyber ambassador?</li>
<li>(03:46) - - 09:13 - What diplomacy achieves</li>
<li>(09:13) - - 10:07 -  The US and cyber diplomacy</li>
<li>(10:07) - - 11:51 - Asian countries and their approach to cyber crime</li>
<li>(11:51) - - 15:47 - The five ‘don’t’s and eight ‘do’s’ at UN level</li>
<li>(15:47) - - 19:52 - What happens if someone violates a rule?</li>
<li>(19:52) - - 21:09 - Helping Ukraine with cyber resilience + the Tallinn mechanism</li>
<li>(21:09) - - 23:01 - Efforts against disinformation</li>
<li>(23:01) - - 26:22 - How to ensure information integrity</li>
<li>(26:22) - - 29:12 - What is the Brussels Effect?</li>
<li>(29:12) - - 30:13 - Common ground on worldwide subjects</li>
<li>(30:13) - - 30:35 - Treasure hunt</li>
<li>(30:35) - - 34:51 - Diplomacy and skepticism</li>
<li>(34:51) - - 37:59 - A European Splinternet - how realistic is this?</li>
<li>(37:59) - - 39:07 - The Cyber Resilience Act and China</li>
<li>(39:07) - - 47:23 - Initiatives to look forward to</li>
<li>(47:23) - - 48:53 - Outro</li>
</ul><br><strong>Related ON2IT Content &amp; Referenced Resources</strong><ul><li>ON2IT: <a href="https://on2it.net/">https://on2it.net/</a></li><li>Threat Talks: <a href="https://threat-talks.com/">https://threat-talks.com/</a></li><li>AMS-IX: <a href="https://www.ams-ix.net/ams">https://www.ams-ix.net/ams</a></li><li>Lieuwe Jan Koning: <a href="https://www.linkedin.com/in/lieuwejan/">https://www.linkedin.com/in/lieuwejan/</a> </li><li>Ernst Noorman: <a href="https://www.linkedin.com/in/ernst-noorman-b630ab6/">https://www.linkedin.com/in/ernst-noorman-b630ab6/</a> </li></ul><p><br></p><p>If this episode gave you a new view on global cybersecurity, subscribe to <em>Threat Talks</em>. Share it with your team – because in a connected world, every company plays a role in cyber peace.</p><p><a href="https://share.transistor.fm/s/e7ad3024/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Cyber defense doesn’t just happen in code. It’s shaped in conversation. Behind every cyber norm or sanction, there’s a diplomat working to stop digital wars before they start.</p><p> </p><p>In this episode of Threat Talks, Lieuwe Jan Koning (CTO &amp; co-founder of ON2IT) sits down with Ernst Noorman, Ambassador at Large for Cyber Affairs for the Kingdom of the Netherlands. They reveal how backchannel talks, sanctions, and shared rules define what countries can and can’t do in cyberspace, and what CISOs can learn from a diplomat’s playbook. This isn’t patch management. It’s peacekeeping in real time.</p><p><br><strong>What You’ll Learn (From Real-Life Example Discussions)</strong></p><ul><li>What a cyber ambassador actually does – and why every nation needs one.</li><li>How diplomacy helps prevent cyber conflicts between world powers.</li><li>Why UN-backed cyber norms matters even when nations ignore them.</li><li>How global collaboration builds cyber resilience, from Ukraine to Asia.</li><li>What businesses can learn from diplomats about cooperation and intelligence sharing.</li></ul><p></p><ul><li>(00:00) - - 02:29 - Intro</li>
<li>(02:29) - - 03:46 - What is the role of a cyber ambassador?</li>
<li>(03:46) - - 09:13 - What diplomacy achieves</li>
<li>(09:13) - - 10:07 -  The US and cyber diplomacy</li>
<li>(10:07) - - 11:51 - Asian countries and their approach to cyber crime</li>
<li>(11:51) - - 15:47 - The five ‘don’t’s and eight ‘do’s’ at UN level</li>
<li>(15:47) - - 19:52 - What happens if someone violates a rule?</li>
<li>(19:52) - - 21:09 - Helping Ukraine with cyber resilience + the Tallinn mechanism</li>
<li>(21:09) - - 23:01 - Efforts against disinformation</li>
<li>(23:01) - - 26:22 - How to ensure information integrity</li>
<li>(26:22) - - 29:12 - What is the Brussels Effect?</li>
<li>(29:12) - - 30:13 - Common ground on worldwide subjects</li>
<li>(30:13) - - 30:35 - Treasure hunt</li>
<li>(30:35) - - 34:51 - Diplomacy and skepticism</li>
<li>(34:51) - - 37:59 - A European Splinternet - how realistic is this?</li>
<li>(37:59) - - 39:07 - The Cyber Resilience Act and China</li>
<li>(39:07) - - 47:23 - Initiatives to look forward to</li>
<li>(47:23) - - 48:53 - Outro</li>
</ul><br><strong>Related ON2IT Content &amp; Referenced Resources</strong><ul><li>ON2IT: <a href="https://on2it.net/">https://on2it.net/</a></li><li>Threat Talks: <a href="https://threat-talks.com/">https://threat-talks.com/</a></li><li>AMS-IX: <a href="https://www.ams-ix.net/ams">https://www.ams-ix.net/ams</a></li><li>Lieuwe Jan Koning: <a href="https://www.linkedin.com/in/lieuwejan/">https://www.linkedin.com/in/lieuwejan/</a> </li><li>Ernst Noorman: <a href="https://www.linkedin.com/in/ernst-noorman-b630ab6/">https://www.linkedin.com/in/ernst-noorman-b630ab6/</a> </li></ul><p><br></p><p>If this episode gave you a new view on global cybersecurity, subscribe to <em>Threat Talks</em>. Share it with your team – because in a connected world, every company plays a role in cyber peace.</p><p><a href="https://share.transistor.fm/s/e7ad3024/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </content:encoded>
      <pubDate>Tue, 04 Nov 2025 07:57:41 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/e7ad3024/e30725f5.mp3" length="117739661" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/eRSyvYt4TcTjavfFMeZ1TOmaAMLdA9H-qm9EHRqdKWg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YmNh/MTZhZTU4NjMzYmM2/YzNiYWQwMWU5YTQy/M2U0MC5wbmc.jpg"/>
      <itunes:duration>2943</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Cyber defense doesn’t just happen in code. It’s shaped in conversation. Behind every cyber norm or sanction, there’s a diplomat working to stop digital wars before they start.</p><p> </p><p>In this episode of Threat Talks, Lieuwe Jan Koning (CTO &amp; co-founder of ON2IT) sits down with Ernst Noorman, Ambassador at Large for Cyber Affairs for the Kingdom of the Netherlands. They reveal how backchannel talks, sanctions, and shared rules define what countries can and can’t do in cyberspace, and what CISOs can learn from a diplomat’s playbook. This isn’t patch management. It’s peacekeeping in real time.</p><p><br><strong>What You’ll Learn (From Real-Life Example Discussions)</strong></p><ul><li>What a cyber ambassador actually does – and why every nation needs one.</li><li>How diplomacy helps prevent cyber conflicts between world powers.</li><li>Why UN-backed cyber norms matters even when nations ignore them.</li><li>How global collaboration builds cyber resilience, from Ukraine to Asia.</li><li>What businesses can learn from diplomats about cooperation and intelligence sharing.</li></ul><p></p><ul><li>(00:00) - - 02:29 - Intro</li>
<li>(02:29) - - 03:46 - What is the role of a cyber ambassador?</li>
<li>(03:46) - - 09:13 - What diplomacy achieves</li>
<li>(09:13) - - 10:07 -  The US and cyber diplomacy</li>
<li>(10:07) - - 11:51 - Asian countries and their approach to cyber crime</li>
<li>(11:51) - - 15:47 - The five ‘don’t’s and eight ‘do’s’ at UN level</li>
<li>(15:47) - - 19:52 - What happens if someone violates a rule?</li>
<li>(19:52) - - 21:09 - Helping Ukraine with cyber resilience + the Tallinn mechanism</li>
<li>(21:09) - - 23:01 - Efforts against disinformation</li>
<li>(23:01) - - 26:22 - How to ensure information integrity</li>
<li>(26:22) - - 29:12 - What is the Brussels Effect?</li>
<li>(29:12) - - 30:13 - Common ground on worldwide subjects</li>
<li>(30:13) - - 30:35 - Treasure hunt</li>
<li>(30:35) - - 34:51 - Diplomacy and skepticism</li>
<li>(34:51) - - 37:59 - A European Splinternet - how realistic is this?</li>
<li>(37:59) - - 39:07 - The Cyber Resilience Act and China</li>
<li>(39:07) - - 47:23 - Initiatives to look forward to</li>
<li>(47:23) - - 48:53 - Outro</li>
</ul><br><strong>Related ON2IT Content &amp; Referenced Resources</strong><ul><li>ON2IT: <a href="https://on2it.net/">https://on2it.net/</a></li><li>Threat Talks: <a href="https://threat-talks.com/">https://threat-talks.com/</a></li><li>AMS-IX: <a href="https://www.ams-ix.net/ams">https://www.ams-ix.net/ams</a></li><li>Lieuwe Jan Koning: <a href="https://www.linkedin.com/in/lieuwejan/">https://www.linkedin.com/in/lieuwejan/</a> </li><li>Ernst Noorman: <a href="https://www.linkedin.com/in/ernst-noorman-b630ab6/">https://www.linkedin.com/in/ernst-noorman-b630ab6/</a> </li></ul><p><br></p><p>If this episode gave you a new view on global cybersecurity, subscribe to <em>Threat Talks</em>. Share it with your team – because in a connected world, every company plays a role in cyber peace.</p><p><a href="https://share.transistor.fm/s/e7ad3024/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </itunes:summary>
      <itunes:keywords>Cyber Warfare</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e7ad3024/transcript.srt" type="application/x-subrip" rel="captions"/>
      <podcast:chapters url="https://share.transistor.fm/s/e7ad3024/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Patch Smarter, Not Harder</title>
      <itunes:season>3</itunes:season>
      <podcast:season>3</podcast:season>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Patch Smarter, Not Harder</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">73cc85d9-4d22-4a6c-863d-bdfe70b902de</guid>
      <link>https://threat-talks.com/patch-smarter-not-harder/</link>
      <description>
        <![CDATA[<p><strong>Patch smarter, not harder.<br></strong>Lieuwe Jan Koning and ON2IT Field CTO Rob Maas break down why “patch everything now” isn’t a strategy, but a risk multiplier. In this session, they teach a practical <strong>patching strategy</strong>: know your assets, patch edge first, stage updates, and use <strong>Zero Trust segmentation</strong> to choke off exposure so you only patch what truly matters: fast, safely, and without outages.</p><p></p><ul><li>(00:00) - 01:11 - Intro </li>
<li>(01:11) - - 02:28 - Reality check #1: Not everything can be patched</li>
<li>(02:28) - - 05:02 - Reality check #2: Patches are scary</li>
<li>(05:02) - - 08:45 - The solution: Patch in phases</li>
<li>(08:45) - - 10:36 - How Zero Trust enables patch management</li>
<li>(10:36) - - 11:23 - Prioritization matters</li>
<li>(11:23) - - 14:50 - Patching tips and tricks</li>
<li>(14:50) - - 16:21 - Guidelines for patching triage</li>
<li>(16:21) - - 17:37 - Practical advice</li>
<li>(17:37) - - END - Outro</li>
</ul><p><strong>Key Topics Covered</strong></p><p>·       Why “patch everything immediately” fails; availability vs. security</p><p>·       Staged deployments and rollback safety for crown-jewel services</p><p>·       Zero Trust segmentation to reduce urgency and shrink attack surface</p><p>·       Priority signals that matter: asset criticality, exposure, KEV, CVSS<br></p><p><strong>Related ON2IT content &amp; explicitly referenced resources</strong><br> ON2IT Zero Trust: https://on2it.net/zero-trust/ <br> Threat Talks (site): <a href="https://threat-talks.com/?utm_source=chatgpt.com">https://threat-talks.com/</a><br> CVSS (FIRST): https://www.first.org/cvss/ <br> CISA guidance – Citrix/NetScaler (Citrix Bleed example): <a href="https://www.cisa.gov/guidance-addressing-citrix-netscaler-adc-and-gateway-vulnerability-cve-2023-4966-citrix-bleed">https://www.cisa.gov/guidance-addressing-citrix-netscaler-adc-and-gateway-vulnerability-cve-2023-4966-citrix-bleed</a><br> Crowdstrike episode: <a href="https://youtu.be/IRvWVg1lSuo?si=f8Sj6WYG0KNxlkJD">https://youtu.be/IRvWVg1lSuo?si=f8Sj6WYG0KNxlkJD</a> </p><p><a href="https://share.transistor.fm/s/d36d4ad3/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Patch smarter, not harder.<br></strong>Lieuwe Jan Koning and ON2IT Field CTO Rob Maas break down why “patch everything now” isn’t a strategy, but a risk multiplier. In this session, they teach a practical <strong>patching strategy</strong>: know your assets, patch edge first, stage updates, and use <strong>Zero Trust segmentation</strong> to choke off exposure so you only patch what truly matters: fast, safely, and without outages.</p><p></p><ul><li>(00:00) - 01:11 - Intro </li>
<li>(01:11) - - 02:28 - Reality check #1: Not everything can be patched</li>
<li>(02:28) - - 05:02 - Reality check #2: Patches are scary</li>
<li>(05:02) - - 08:45 - The solution: Patch in phases</li>
<li>(08:45) - - 10:36 - How Zero Trust enables patch management</li>
<li>(10:36) - - 11:23 - Prioritization matters</li>
<li>(11:23) - - 14:50 - Patching tips and tricks</li>
<li>(14:50) - - 16:21 - Guidelines for patching triage</li>
<li>(16:21) - - 17:37 - Practical advice</li>
<li>(17:37) - - END - Outro</li>
</ul><p><strong>Key Topics Covered</strong></p><p>·       Why “patch everything immediately” fails; availability vs. security</p><p>·       Staged deployments and rollback safety for crown-jewel services</p><p>·       Zero Trust segmentation to reduce urgency and shrink attack surface</p><p>·       Priority signals that matter: asset criticality, exposure, KEV, CVSS<br></p><p><strong>Related ON2IT content &amp; explicitly referenced resources</strong><br> ON2IT Zero Trust: https://on2it.net/zero-trust/ <br> Threat Talks (site): <a href="https://threat-talks.com/?utm_source=chatgpt.com">https://threat-talks.com/</a><br> CVSS (FIRST): https://www.first.org/cvss/ <br> CISA guidance – Citrix/NetScaler (Citrix Bleed example): <a href="https://www.cisa.gov/guidance-addressing-citrix-netscaler-adc-and-gateway-vulnerability-cve-2023-4966-citrix-bleed">https://www.cisa.gov/guidance-addressing-citrix-netscaler-adc-and-gateway-vulnerability-cve-2023-4966-citrix-bleed</a><br> Crowdstrike episode: <a href="https://youtu.be/IRvWVg1lSuo?si=f8Sj6WYG0KNxlkJD">https://youtu.be/IRvWVg1lSuo?si=f8Sj6WYG0KNxlkJD</a> </p><p><a href="https://share.transistor.fm/s/d36d4ad3/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </content:encoded>
      <pubDate>Tue, 28 Oct 2025 08:00:00 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/d36d4ad3/f5a44ae3.mp3" length="43900801" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/OO0VSEqKIBkSS6x4T69lxt9xQ7fGpWEQ2Fczsa_87lk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kM2U4/MzgyYjcxOTcyNzYz/N2VjNzhlNWZlYTA4/YzRkYi5wbmc.jpg"/>
      <itunes:duration>1097</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Patch smarter, not harder.<br></strong>Lieuwe Jan Koning and ON2IT Field CTO Rob Maas break down why “patch everything now” isn’t a strategy, but a risk multiplier. In this session, they teach a practical <strong>patching strategy</strong>: know your assets, patch edge first, stage updates, and use <strong>Zero Trust segmentation</strong> to choke off exposure so you only patch what truly matters: fast, safely, and without outages.</p><p></p><ul><li>(00:00) - 01:11 - Intro </li>
<li>(01:11) - - 02:28 - Reality check #1: Not everything can be patched</li>
<li>(02:28) - - 05:02 - Reality check #2: Patches are scary</li>
<li>(05:02) - - 08:45 - The solution: Patch in phases</li>
<li>(08:45) - - 10:36 - How Zero Trust enables patch management</li>
<li>(10:36) - - 11:23 - Prioritization matters</li>
<li>(11:23) - - 14:50 - Patching tips and tricks</li>
<li>(14:50) - - 16:21 - Guidelines for patching triage</li>
<li>(16:21) - - 17:37 - Practical advice</li>
<li>(17:37) - - END - Outro</li>
</ul><p><strong>Key Topics Covered</strong></p><p>·       Why “patch everything immediately” fails; availability vs. security</p><p>·       Staged deployments and rollback safety for crown-jewel services</p><p>·       Zero Trust segmentation to reduce urgency and shrink attack surface</p><p>·       Priority signals that matter: asset criticality, exposure, KEV, CVSS<br></p><p><strong>Related ON2IT content &amp; explicitly referenced resources</strong><br> ON2IT Zero Trust: https://on2it.net/zero-trust/ <br> Threat Talks (site): <a href="https://threat-talks.com/?utm_source=chatgpt.com">https://threat-talks.com/</a><br> CVSS (FIRST): https://www.first.org/cvss/ <br> CISA guidance – Citrix/NetScaler (Citrix Bleed example): <a href="https://www.cisa.gov/guidance-addressing-citrix-netscaler-adc-and-gateway-vulnerability-cve-2023-4966-citrix-bleed">https://www.cisa.gov/guidance-addressing-citrix-netscaler-adc-and-gateway-vulnerability-cve-2023-4966-citrix-bleed</a><br> Crowdstrike episode: <a href="https://youtu.be/IRvWVg1lSuo?si=f8Sj6WYG0KNxlkJD">https://youtu.be/IRvWVg1lSuo?si=f8Sj6WYG0KNxlkJD</a> </p><p><a href="https://share.transistor.fm/s/d36d4ad3/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </itunes:summary>
      <itunes:keywords>Patch Management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d36d4ad3/transcript.srt" type="application/x-subrip" rel="captions"/>
      <podcast:chapters url="https://share.transistor.fm/s/d36d4ad3/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Public Key Infrastructure: The Foundation of Digital Trust</title>
      <itunes:title>Public Key Infrastructure: The Foundation of Digital Trust</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">49aa8613-d85b-4844-827d-be8594b9a31c</guid>
      <link>https://share.transistor.fm/s/336c2e92</link>
      <description>
        <![CDATA[<p>How solid is your digital trust—or are you just hoping your PKI is secure?<br>Let’s be honest: too many companies run on borrowed trust and forgotten certificates. In this episode of Threat Talks, ON2IT’s Lieuwe Jan Koning and Rob Maas pull back the curtain on what really holds your digital world together—and what can tear it down overnight.<br>They break down PKI in plain language: the root of trust that must stay locked away, the intermediates that keep your systems running, and the automation that stops your team from clicking “ignore” on yet another warning.<br>You’ll see why rolling your own keys beats trusting anyone else, how to keep your devices speaking the same language of trust, and why short-lived certificates might just save you from the next big breach.<br>This isn’t theory—it’s how Zero Trust really starts: by proving that your organization can trust itself.</p><p>Additional Resources<br>• Threat Talks Episode on SSL Decryption – https://youtu.be/Xv_jVHVsD9w<br>• ON2IT Zero Trust: https://on2it.net/zero-trust/<br>• ACME protocol (RFC 8555): https://datatracker.ietf.org/doc/rfc8555/<br>• Let’s Encrypt / ACME protocol – https://letsencrypt.org<br>• DigiNotar case study background – https://en.wikipedia.org/wiki/DigiNotar<br>• Mozilla CA Program (trusted root store): https://wiki.mozilla.org/CA<br>• infographic about encryption  https://on2it.s3.us-east-1.amazonaws.com/20250304_Infographic_Encryption.pdf</p><p>Guest &amp; Host Links:<br>Rob Maas (Field CTO, ON2IT): https://www.linkedin.com/in/robmaas83/ <br>Lieuwe Jan Koning (Founding Partner, ON2IT): https://www.linkedin.com/in/lieuwejan/</p><p><br>Key Topics Covered<br>•  Why root certificates must never be online—and how intermediates provide a safe fallback.<br>•  Real-world PKI failure: DigiNotar compromise and lessons for CISOs.<br>•  How ON2IT built a secure, low-cost PKI with offline key bearers and ACME automation.<br>•  The hidden risks of training employees to ignore certificate warnings—and how Zero Trust demands the opposite.</p><p><br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>How solid is your digital trust—or are you just hoping your PKI is secure?<br>Let’s be honest: too many companies run on borrowed trust and forgotten certificates. In this episode of Threat Talks, ON2IT’s Lieuwe Jan Koning and Rob Maas pull back the curtain on what really holds your digital world together—and what can tear it down overnight.<br>They break down PKI in plain language: the root of trust that must stay locked away, the intermediates that keep your systems running, and the automation that stops your team from clicking “ignore” on yet another warning.<br>You’ll see why rolling your own keys beats trusting anyone else, how to keep your devices speaking the same language of trust, and why short-lived certificates might just save you from the next big breach.<br>This isn’t theory—it’s how Zero Trust really starts: by proving that your organization can trust itself.</p><p>Additional Resources<br>• Threat Talks Episode on SSL Decryption – https://youtu.be/Xv_jVHVsD9w<br>• ON2IT Zero Trust: https://on2it.net/zero-trust/<br>• ACME protocol (RFC 8555): https://datatracker.ietf.org/doc/rfc8555/<br>• Let’s Encrypt / ACME protocol – https://letsencrypt.org<br>• DigiNotar case study background – https://en.wikipedia.org/wiki/DigiNotar<br>• Mozilla CA Program (trusted root store): https://wiki.mozilla.org/CA<br>• infographic about encryption  https://on2it.s3.us-east-1.amazonaws.com/20250304_Infographic_Encryption.pdf</p><p>Guest &amp; Host Links:<br>Rob Maas (Field CTO, ON2IT): https://www.linkedin.com/in/robmaas83/ <br>Lieuwe Jan Koning (Founding Partner, ON2IT): https://www.linkedin.com/in/lieuwejan/</p><p><br>Key Topics Covered<br>•  Why root certificates must never be online—and how intermediates provide a safe fallback.<br>•  Real-world PKI failure: DigiNotar compromise and lessons for CISOs.<br>•  How ON2IT built a secure, low-cost PKI with offline key bearers and ACME automation.<br>•  The hidden risks of training employees to ignore certificate warnings—and how Zero Trust demands the opposite.</p><p><br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Oct 2025 07:15:23 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/336c2e92/75cc6ee1.mp3" length="83450957" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/qPSYxEHrdgiPszqjwNrXC2e6jpvgPCWpqbW17JucFwU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jMzFm/MzIzNTViYWY5Mjk0/N2ZiNTE0M2VlOTY0/MzA0Yy5wbmc.jpg"/>
      <itunes:duration>2081</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>How solid is your digital trust—or are you just hoping your PKI is secure?<br>Let’s be honest: too many companies run on borrowed trust and forgotten certificates. In this episode of Threat Talks, ON2IT’s Lieuwe Jan Koning and Rob Maas pull back the curtain on what really holds your digital world together—and what can tear it down overnight.<br>They break down PKI in plain language: the root of trust that must stay locked away, the intermediates that keep your systems running, and the automation that stops your team from clicking “ignore” on yet another warning.<br>You’ll see why rolling your own keys beats trusting anyone else, how to keep your devices speaking the same language of trust, and why short-lived certificates might just save you from the next big breach.<br>This isn’t theory—it’s how Zero Trust really starts: by proving that your organization can trust itself.</p><p>Additional Resources<br>• Threat Talks Episode on SSL Decryption – https://youtu.be/Xv_jVHVsD9w<br>• ON2IT Zero Trust: https://on2it.net/zero-trust/<br>• ACME protocol (RFC 8555): https://datatracker.ietf.org/doc/rfc8555/<br>• Let’s Encrypt / ACME protocol – https://letsencrypt.org<br>• DigiNotar case study background – https://en.wikipedia.org/wiki/DigiNotar<br>• Mozilla CA Program (trusted root store): https://wiki.mozilla.org/CA<br>• infographic about encryption  https://on2it.s3.us-east-1.amazonaws.com/20250304_Infographic_Encryption.pdf</p><p>Guest &amp; Host Links:<br>Rob Maas (Field CTO, ON2IT): https://www.linkedin.com/in/robmaas83/ <br>Lieuwe Jan Koning (Founding Partner, ON2IT): https://www.linkedin.com/in/lieuwejan/</p><p><br>Key Topics Covered<br>•  Why root certificates must never be online—and how intermediates provide a safe fallback.<br>•  Real-world PKI failure: DigiNotar compromise and lessons for CISOs.<br>•  How ON2IT built a secure, low-cost PKI with offline key bearers and ACME automation.<br>•  The hidden risks of training employees to ignore certificate warnings—and how Zero Trust demands the opposite.</p><p><br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </itunes:summary>
      <itunes:keywords>PKI, Public Key Infrastructure</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/336c2e92/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/336c2e92/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Why Your Cyber Hygiene Matters?</title>
      <itunes:title>Why Your Cyber Hygiene Matters?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b30273e2-777c-4088-8308-e611fdf0a52e</guid>
      <link>https://share.transistor.fm/s/ee901861</link>
      <description>
        <![CDATA[<p>One unlocked phone can unravel the defenses of a billion-dollar enterprise—because in cybersecurity, small mistakes don’t stay small for long. Attackers can read notes, steal IDs, or impersonate you on WhatsApp. A reused password can launch a remote tool that looks completely legitimate.</p><p>Rob Maas (Field CTO, ON2IT) and Luca Cipriano (Cyber Threat Intelligence Program Lead, ON2IT) reveal how poor cyber hygiene erodes trust, endangers partners, and weakens enterprise defenses.<br>CISOs, CIO and IT managers remember: in a Zero Trust world, your weakest link might not even be inside your organization.</p><p></p><ul><li>(00:00) - Why your cyber hygiene affects others</li>
<li>(00:28) - Meet the speakers (Rob Maas, Luca Cipriano)</li>
<li>(00:47) - Cyber hygiene defined for CISOs</li>
<li>(03:00) - Unlocked phone → passwords in notes, WhatsApp fraud, ID photos</li>
<li>(05:53) - SOC case: contractor email compromise → remote tool drop (ConnectWise)</li>
<li>(09:40) - OSINT: 19 breaches + iterative password reuse</li>
<li>(17:01) - What to fix now: MFA, vaults, device lock, breach monitoring</li>
<li>(20:24) - Final takeaways &amp; resources </li>
</ul><br>What You’ll Learn (From Real-Life Example Discussions)<br>• How a stolen phone quickly turns into identity theft, impersonation, and scams targeting your contacts.<br>• A real SOC case: a contractor’s reused password allowed attackers to hide a remote access tool inside normal IT activity.<br>• How OSINT and dark web data reveal how password reuse spreads risk across accounts.<br>• Why shared tools like Google Docs can quietly multiply breaches when one user slips up.<br>• Simple upgrades—MFA, password vaults, breach alerts, and secure devices—that cut your organization’s exposure fast.<p><a href="https://share.transistor.fm/s/ee901861/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>Related ON2IT Content &amp; Referenced Resources<br>• ON2IT: https://on2it.net/<br>• Threat Talks: https://threat-talks.com/<br>• AMS-IX: https://www.ams-ix.net/ams<br>• WatchYourHack: https://watchyourhack.com<br>• Have I Been Pwned: https://haveibeenpwned.com</p><p>Guest and Host Links: <br>Rob Maas, Field CTO, ON2IT: https://www.linkedin.com/in/robmaas83/ <br>Luca Cipriano, Cyber Threat Intelligence Program Lead, ON2IT: https://www.linkedin.com/in/luca-c-914973124/</p><p>If this helped, subscribe to Threat Talks. Share this episode with your partners and contractors—stronger cyber hygiene across your ecosystem protects everyone. </p><p>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>One unlocked phone can unravel the defenses of a billion-dollar enterprise—because in cybersecurity, small mistakes don’t stay small for long. Attackers can read notes, steal IDs, or impersonate you on WhatsApp. A reused password can launch a remote tool that looks completely legitimate.</p><p>Rob Maas (Field CTO, ON2IT) and Luca Cipriano (Cyber Threat Intelligence Program Lead, ON2IT) reveal how poor cyber hygiene erodes trust, endangers partners, and weakens enterprise defenses.<br>CISOs, CIO and IT managers remember: in a Zero Trust world, your weakest link might not even be inside your organization.</p><p></p><ul><li>(00:00) - Why your cyber hygiene affects others</li>
<li>(00:28) - Meet the speakers (Rob Maas, Luca Cipriano)</li>
<li>(00:47) - Cyber hygiene defined for CISOs</li>
<li>(03:00) - Unlocked phone → passwords in notes, WhatsApp fraud, ID photos</li>
<li>(05:53) - SOC case: contractor email compromise → remote tool drop (ConnectWise)</li>
<li>(09:40) - OSINT: 19 breaches + iterative password reuse</li>
<li>(17:01) - What to fix now: MFA, vaults, device lock, breach monitoring</li>
<li>(20:24) - Final takeaways &amp; resources </li>
</ul><br>What You’ll Learn (From Real-Life Example Discussions)<br>• How a stolen phone quickly turns into identity theft, impersonation, and scams targeting your contacts.<br>• A real SOC case: a contractor’s reused password allowed attackers to hide a remote access tool inside normal IT activity.<br>• How OSINT and dark web data reveal how password reuse spreads risk across accounts.<br>• Why shared tools like Google Docs can quietly multiply breaches when one user slips up.<br>• Simple upgrades—MFA, password vaults, breach alerts, and secure devices—that cut your organization’s exposure fast.<p><a href="https://share.transistor.fm/s/ee901861/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>Related ON2IT Content &amp; Referenced Resources<br>• ON2IT: https://on2it.net/<br>• Threat Talks: https://threat-talks.com/<br>• AMS-IX: https://www.ams-ix.net/ams<br>• WatchYourHack: https://watchyourhack.com<br>• Have I Been Pwned: https://haveibeenpwned.com</p><p>Guest and Host Links: <br>Rob Maas, Field CTO, ON2IT: https://www.linkedin.com/in/robmaas83/ <br>Luca Cipriano, Cyber Threat Intelligence Program Lead, ON2IT: https://www.linkedin.com/in/luca-c-914973124/</p><p>If this helped, subscribe to Threat Talks. Share this episode with your partners and contractors—stronger cyber hygiene across your ecosystem protects everyone. </p><p>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Tue, 14 Oct 2025 07:31:36 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/ee901861/2dc5bb36.mp3" length="52553596" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/rfmvKzRUHJpMWol1kLEhER41NDrtRmif3y7sBVB2fUQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iZGU0/YTU3MTMzM2I5MTFl/NTFlYTYwY2ZiNWE1/NzMwYS5qcGc.jpg"/>
      <itunes:duration>1313</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>One unlocked phone can unravel the defenses of a billion-dollar enterprise—because in cybersecurity, small mistakes don’t stay small for long. Attackers can read notes, steal IDs, or impersonate you on WhatsApp. A reused password can launch a remote tool that looks completely legitimate.</p><p>Rob Maas (Field CTO, ON2IT) and Luca Cipriano (Cyber Threat Intelligence Program Lead, ON2IT) reveal how poor cyber hygiene erodes trust, endangers partners, and weakens enterprise defenses.<br>CISOs, CIO and IT managers remember: in a Zero Trust world, your weakest link might not even be inside your organization.</p><p></p><ul><li>(00:00) - Why your cyber hygiene affects others</li>
<li>(00:28) - Meet the speakers (Rob Maas, Luca Cipriano)</li>
<li>(00:47) - Cyber hygiene defined for CISOs</li>
<li>(03:00) - Unlocked phone → passwords in notes, WhatsApp fraud, ID photos</li>
<li>(05:53) - SOC case: contractor email compromise → remote tool drop (ConnectWise)</li>
<li>(09:40) - OSINT: 19 breaches + iterative password reuse</li>
<li>(17:01) - What to fix now: MFA, vaults, device lock, breach monitoring</li>
<li>(20:24) - Final takeaways &amp; resources </li>
</ul><br>What You’ll Learn (From Real-Life Example Discussions)<br>• How a stolen phone quickly turns into identity theft, impersonation, and scams targeting your contacts.<br>• A real SOC case: a contractor’s reused password allowed attackers to hide a remote access tool inside normal IT activity.<br>• How OSINT and dark web data reveal how password reuse spreads risk across accounts.<br>• Why shared tools like Google Docs can quietly multiply breaches when one user slips up.<br>• Simple upgrades—MFA, password vaults, breach alerts, and secure devices—that cut your organization’s exposure fast.<p><a href="https://share.transistor.fm/s/ee901861/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>Related ON2IT Content &amp; Referenced Resources<br>• ON2IT: https://on2it.net/<br>• Threat Talks: https://threat-talks.com/<br>• AMS-IX: https://www.ams-ix.net/ams<br>• WatchYourHack: https://watchyourhack.com<br>• Have I Been Pwned: https://haveibeenpwned.com</p><p>Guest and Host Links: <br>Rob Maas, Field CTO, ON2IT: https://www.linkedin.com/in/robmaas83/ <br>Luca Cipriano, Cyber Threat Intelligence Program Lead, ON2IT: https://www.linkedin.com/in/luca-c-914973124/</p><p>If this helped, subscribe to Threat Talks. Share this episode with your partners and contractors—stronger cyber hygiene across your ecosystem protects everyone. </p><p>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </itunes:summary>
      <itunes:keywords>Cyber Hygiene, Threat Talks</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ee901861/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/ee901861/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Resilience Over Fragmentation: The Risk You Can’t Ignore</title>
      <itunes:title>Resilience Over Fragmentation: The Risk You Can’t Ignore</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">69f1576b-160f-4a89-a081-5a3e06190b07</guid>
      <link>https://share.transistor.fm/s/fd554f4d</link>
      <description>
        <![CDATA[<p>The internet promised freedom. Now it monetizes you. The trade-off? Convenience for control.<br>In this episode, Lieuwe Jan Koning and Prof. Jacobs reveal how scattered tools like meta and X create security gaps—and how one policy, fewer interfaces, and less data shared cut exposure and keep operations running.</p><p>Real examples you’ll hear:<br>• The neighborhood chat stuck on WhatsApp—and how switching to Signal breaks dependency.<br>• How your address book upload leaks other people’s data to platforms.<br>• Why secure doesn’t mean private on platforms that profit from your data.<br>• Age checks done right: passport chip + selective disclosure instead of oversharing.<br>• Patient groups and municipalities using PubHubs for private, verified rooms (no ads).<br>• Continuity risk in the real world: federated login outages, US-dependent authenticators, transatlantic cable cuts, and a court moving email to ProtonMail to stay operational.</p><p></p><ul><li>(00:00) - – Free vs. monetized internet</li>
<li>(02:22) - – Facebook: secure ≠ private</li>
<li>(05:31) - – WhatsApp vs. Signal trade-offs</li>
<li>(07:05) - – Metadata &amp; social graph risk</li>
<li>(11:58) - – Attribute-based auth (Yi)</li>
<li>(19:55) - – Decentralized login; split keys</li>
<li>(28:11) - – PubHubs: private, verified rooms</li>
<li>(49:54) - – Continuity: vendor/cable risk</li>
<li>(56:01) - – Close &amp; takeaways</li>
</ul><br>Related ON2IT Content &amp; Referenced Resources<br>• ON2IT: https://on2it.net/<br>• Threat Talks: https://threat-talks.com/<br>• AMS-IX: https://www.ams-ix.net/ams<br>• Yivi (privacy-preserving authentication): https://yivi.app/<br>• PubHubs (privacy-first social platform): https://pubhubs.net/<br>• European alternatives (mentioned): http://european-alternative.eu/<br>• Privacy tools (mentioned): https://privacytools.io/<p>Guest and Host Links: <br>Lieuwe Jan Koning (ON2IT Co-Founder): https://www.linkedin.com/in/lieuwejan/ <br>Bart Jacobs: http://www.cs.ru.nl/~bart/</p><p>If this helped you strengthen your Zero Trust policy, subscribe, like, and share. New episodes weekly. Follow Threat Talks on YouTube, Spotify, and Apple Podcasts.</p><p><a href="https://share.transistor.fm/s/fd554f4d/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The internet promised freedom. Now it monetizes you. The trade-off? Convenience for control.<br>In this episode, Lieuwe Jan Koning and Prof. Jacobs reveal how scattered tools like meta and X create security gaps—and how one policy, fewer interfaces, and less data shared cut exposure and keep operations running.</p><p>Real examples you’ll hear:<br>• The neighborhood chat stuck on WhatsApp—and how switching to Signal breaks dependency.<br>• How your address book upload leaks other people’s data to platforms.<br>• Why secure doesn’t mean private on platforms that profit from your data.<br>• Age checks done right: passport chip + selective disclosure instead of oversharing.<br>• Patient groups and municipalities using PubHubs for private, verified rooms (no ads).<br>• Continuity risk in the real world: federated login outages, US-dependent authenticators, transatlantic cable cuts, and a court moving email to ProtonMail to stay operational.</p><p></p><ul><li>(00:00) - – Free vs. monetized internet</li>
<li>(02:22) - – Facebook: secure ≠ private</li>
<li>(05:31) - – WhatsApp vs. Signal trade-offs</li>
<li>(07:05) - – Metadata &amp; social graph risk</li>
<li>(11:58) - – Attribute-based auth (Yi)</li>
<li>(19:55) - – Decentralized login; split keys</li>
<li>(28:11) - – PubHubs: private, verified rooms</li>
<li>(49:54) - – Continuity: vendor/cable risk</li>
<li>(56:01) - – Close &amp; takeaways</li>
</ul><br>Related ON2IT Content &amp; Referenced Resources<br>• ON2IT: https://on2it.net/<br>• Threat Talks: https://threat-talks.com/<br>• AMS-IX: https://www.ams-ix.net/ams<br>• Yivi (privacy-preserving authentication): https://yivi.app/<br>• PubHubs (privacy-first social platform): https://pubhubs.net/<br>• European alternatives (mentioned): http://european-alternative.eu/<br>• Privacy tools (mentioned): https://privacytools.io/<p>Guest and Host Links: <br>Lieuwe Jan Koning (ON2IT Co-Founder): https://www.linkedin.com/in/lieuwejan/ <br>Bart Jacobs: http://www.cs.ru.nl/~bart/</p><p>If this helped you strengthen your Zero Trust policy, subscribe, like, and share. New episodes weekly. Follow Threat Talks on YouTube, Spotify, and Apple Podcasts.</p><p><a href="https://share.transistor.fm/s/fd554f4d/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Tue, 07 Oct 2025 07:17:29 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/fd554f4d/a74a5a9a.mp3" length="135440963" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/jya3XLCutHALiIXdbeWAglPQnGx5hqcPU59UbfaU3wI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yOGFm/ZmM3NWYyMmFiMzBi/NDA0NjE3ZTE5Yjgx/NmE4NC5qcGc.jpg"/>
      <itunes:duration>3386</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The internet promised freedom. Now it monetizes you. The trade-off? Convenience for control.<br>In this episode, Lieuwe Jan Koning and Prof. Jacobs reveal how scattered tools like meta and X create security gaps—and how one policy, fewer interfaces, and less data shared cut exposure and keep operations running.</p><p>Real examples you’ll hear:<br>• The neighborhood chat stuck on WhatsApp—and how switching to Signal breaks dependency.<br>• How your address book upload leaks other people’s data to platforms.<br>• Why secure doesn’t mean private on platforms that profit from your data.<br>• Age checks done right: passport chip + selective disclosure instead of oversharing.<br>• Patient groups and municipalities using PubHubs for private, verified rooms (no ads).<br>• Continuity risk in the real world: federated login outages, US-dependent authenticators, transatlantic cable cuts, and a court moving email to ProtonMail to stay operational.</p><p></p><ul><li>(00:00) - – Free vs. monetized internet</li>
<li>(02:22) - – Facebook: secure ≠ private</li>
<li>(05:31) - – WhatsApp vs. Signal trade-offs</li>
<li>(07:05) - – Metadata &amp; social graph risk</li>
<li>(11:58) - – Attribute-based auth (Yi)</li>
<li>(19:55) - – Decentralized login; split keys</li>
<li>(28:11) - – PubHubs: private, verified rooms</li>
<li>(49:54) - – Continuity: vendor/cable risk</li>
<li>(56:01) - – Close &amp; takeaways</li>
</ul><br>Related ON2IT Content &amp; Referenced Resources<br>• ON2IT: https://on2it.net/<br>• Threat Talks: https://threat-talks.com/<br>• AMS-IX: https://www.ams-ix.net/ams<br>• Yivi (privacy-preserving authentication): https://yivi.app/<br>• PubHubs (privacy-first social platform): https://pubhubs.net/<br>• European alternatives (mentioned): http://european-alternative.eu/<br>• Privacy tools (mentioned): https://privacytools.io/<p>Guest and Host Links: <br>Lieuwe Jan Koning (ON2IT Co-Founder): https://www.linkedin.com/in/lieuwejan/ <br>Bart Jacobs: http://www.cs.ru.nl/~bart/</p><p>If this helped you strengthen your Zero Trust policy, subscribe, like, and share. New episodes weekly. Follow Threat Talks on YouTube, Spotify, and Apple Podcasts.</p><p><a href="https://share.transistor.fm/s/fd554f4d/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </itunes:summary>
      <itunes:keywords>Threat Talks, Resilience Over Fragmentation</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/fd554f4d/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/fd554f4d/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Zero Trust Step 5B: Maintain Controls</title>
      <itunes:title>Zero Trust Step 5B: Maintain Controls</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">84ea8b90-85ef-4f77-ba6a-66e7883a973f</guid>
      <link>https://share.transistor.fm/s/d6849f10</link>
      <description>
        <![CDATA[<p>Boards don’t buy dashboards—they buy assurance. Breaches are late-stage symptoms of drift: rules pile up, logs lose signal, cloud/Kubernetes outpace governance. Lieuwe Jan Koning (ON2IT Co-Founder) and Rob Maas (Field CTO) show how Zero Trust Step 5B (Maintain) proves your controls still work—today.</p><p></p><ul><li>(00:00) - — Welcome &amp; Zero Trust Step 5B</li>
<li>(00:57) - — Five steps: fast recap</li>
<li>(03:12) - — Maintain = policy validation</li>
<li>(05:31) - — Vendor updates, hidden features</li>
<li>(08:46) - — Traffic flows vs. reality</li>
<li>(10:19) - — Behavior analytics, baselines</li>
<li>(11:56) - — Cloud/K8s/service-mesh shifts</li>
<li>(16:32) - — Wrap-up &amp; next actions</li>
</ul><br>Related ON2IT Content &amp; Referenced Resources<br>• Threat Talks homepage: https://threat-talks.com/<br>• ON2IT Zero Trust: https://on2it.net/zero-trust/ <p>Zero Trust Series<br>Step 1: https://youtu.be/mC66i-tEEFs<br>Step 2: https://youtu.be/wp0q9aZHuXc<br>Step 3: https://youtu.be/eGsw2JCnrac<br>Step 4A: https://youtu.be/qT_nqbBEkVw<br>Step 4B: https://youtu.be/fnKyMITZes8<br>Step 5A: https://youtu.be/N7pWXLxI6kY</p><p>Guest and Host Links:<br>Lieuwe Jan Koning (ON2IT Co-Founder): https://www.linkedin.com/in/lieuwejan/ <br>Rob Maas (Field CTO, ON2IT): https://www.linkedin.com/in/robmaas83/ </p><p>If this helped you strengthen your Zero Trust policy, subscribe, like, and share. New episodes weekly. Follow Threat Talks on YouTube, Spotify, and Apple Podcasts.</p><p><a href="https://share.transistor.fm/s/d6849f10/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Boards don’t buy dashboards—they buy assurance. Breaches are late-stage symptoms of drift: rules pile up, logs lose signal, cloud/Kubernetes outpace governance. Lieuwe Jan Koning (ON2IT Co-Founder) and Rob Maas (Field CTO) show how Zero Trust Step 5B (Maintain) proves your controls still work—today.</p><p></p><ul><li>(00:00) - — Welcome &amp; Zero Trust Step 5B</li>
<li>(00:57) - — Five steps: fast recap</li>
<li>(03:12) - — Maintain = policy validation</li>
<li>(05:31) - — Vendor updates, hidden features</li>
<li>(08:46) - — Traffic flows vs. reality</li>
<li>(10:19) - — Behavior analytics, baselines</li>
<li>(11:56) - — Cloud/K8s/service-mesh shifts</li>
<li>(16:32) - — Wrap-up &amp; next actions</li>
</ul><br>Related ON2IT Content &amp; Referenced Resources<br>• Threat Talks homepage: https://threat-talks.com/<br>• ON2IT Zero Trust: https://on2it.net/zero-trust/ <p>Zero Trust Series<br>Step 1: https://youtu.be/mC66i-tEEFs<br>Step 2: https://youtu.be/wp0q9aZHuXc<br>Step 3: https://youtu.be/eGsw2JCnrac<br>Step 4A: https://youtu.be/qT_nqbBEkVw<br>Step 4B: https://youtu.be/fnKyMITZes8<br>Step 5A: https://youtu.be/N7pWXLxI6kY</p><p>Guest and Host Links:<br>Lieuwe Jan Koning (ON2IT Co-Founder): https://www.linkedin.com/in/lieuwejan/ <br>Rob Maas (Field CTO, ON2IT): https://www.linkedin.com/in/robmaas83/ </p><p>If this helped you strengthen your Zero Trust policy, subscribe, like, and share. New episodes weekly. Follow Threat Talks on YouTube, Spotify, and Apple Podcasts.</p><p><a href="https://share.transistor.fm/s/d6849f10/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Tue, 30 Sep 2025 07:08:58 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/d6849f10/8d9efaad.mp3" length="41969378" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/hoBzr3V3cnTlcj331ZZptTyZEkbd_V3wl9XWNtTrl5k/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85MTJm/NjA4YTkzYTBhZGUz/MDAzNGY2YzViMDFh/ZWE3Ni5qcGc.jpg"/>
      <itunes:duration>1048</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Boards don’t buy dashboards—they buy assurance. Breaches are late-stage symptoms of drift: rules pile up, logs lose signal, cloud/Kubernetes outpace governance. Lieuwe Jan Koning (ON2IT Co-Founder) and Rob Maas (Field CTO) show how Zero Trust Step 5B (Maintain) proves your controls still work—today.</p><p></p><ul><li>(00:00) - — Welcome &amp; Zero Trust Step 5B</li>
<li>(00:57) - — Five steps: fast recap</li>
<li>(03:12) - — Maintain = policy validation</li>
<li>(05:31) - — Vendor updates, hidden features</li>
<li>(08:46) - — Traffic flows vs. reality</li>
<li>(10:19) - — Behavior analytics, baselines</li>
<li>(11:56) - — Cloud/K8s/service-mesh shifts</li>
<li>(16:32) - — Wrap-up &amp; next actions</li>
</ul><br>Related ON2IT Content &amp; Referenced Resources<br>• Threat Talks homepage: https://threat-talks.com/<br>• ON2IT Zero Trust: https://on2it.net/zero-trust/ <p>Zero Trust Series<br>Step 1: https://youtu.be/mC66i-tEEFs<br>Step 2: https://youtu.be/wp0q9aZHuXc<br>Step 3: https://youtu.be/eGsw2JCnrac<br>Step 4A: https://youtu.be/qT_nqbBEkVw<br>Step 4B: https://youtu.be/fnKyMITZes8<br>Step 5A: https://youtu.be/N7pWXLxI6kY</p><p>Guest and Host Links:<br>Lieuwe Jan Koning (ON2IT Co-Founder): https://www.linkedin.com/in/lieuwejan/ <br>Rob Maas (Field CTO, ON2IT): https://www.linkedin.com/in/robmaas83/ </p><p>If this helped you strengthen your Zero Trust policy, subscribe, like, and share. New episodes weekly. Follow Threat Talks on YouTube, Spotify, and Apple Podcasts.</p><p><a href="https://share.transistor.fm/s/d6849f10/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </itunes:summary>
      <itunes:keywords>Threat Talks Step 5B</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d6849f10/transcript.vtt" type="text/vtt" rel="captions"/>
      <podcast:chapters url="https://share.transistor.fm/s/d6849f10/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Defend Against Hacktivist Groups like APT Handala | The Cyber Security Podcast</title>
      <itunes:title>Defend Against Hacktivist Groups like APT Handala | The Cyber Security Podcast</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">000a9842-563f-4b4f-85fe-fb15ec055e26</guid>
      <link>https://share.transistor.fm/s/a249b048</link>
      <description>
        <![CDATA[<p>Hacktivists don’t need zero-days to hurt you—they weaponize people. Host Lieuwe Jan Koning sits down with Yuri Wit (SOC analyst) and Rob Maas (Field CTO) to dissect APT Handala: how they hunt targets, deliver wipers, and brag about leaks. We map their moves to the Lockheed Martin Kill Chain and turn it into a Zero Trust defense playbook you can actually use—today.</p><p></p><ul><li>(00:00) - - 01:40 - Introduction</li>
<li>(01:40) - - 02:27 - What is APT Handala?</li>
<li>(02:27) - - 05:27 - Kill Chain Step 1: Reconnaissance</li>
<li>(05:27) - - 06:43 - Kill Chain Step 2: Weaponization</li>
<li>(06:43) - - 10:39 - Kill Chain Step 3: Delivery</li>
<li>(10:39) - - 14:37 - Kill Chain Step 4: Exploitation</li>
<li>(14:37) - - 17:34 - Kill Chain Step 5: Installation</li>
<li>(17:34) - - 23:39 - Kill Chain Step 6: Command and control</li>
<li>(23:39) - - 26:40 - Kill Chain Step 7: Act on objectives</li>
<li>(26:40) - - 29:35 - How to respond to being hacked</li>
<li>(29:25) - - 30:22 - Closing notes</li>
</ul><br>Key Topics Covered<br>•  Handala’s playbook: people-centric recon, phishing kits, wipers, boast-and-leak ops.<br>•  Zero Trust counters: deny-by-default egress, newly-registered-domain blocks, hard EDR, passkeys.<br>•  SOC tells: DNS DGA spikes, encrypted C2 on common apps, “human error” as the biggest CVE.<br>•  Comms reality: when openness helps—and when strategic silence limits amplification.<p>Additional Resources<br>• ON2IT Zero Trust: https://on2it.net/zero-trust/<br>• Lockheed Martin Cyber Kill Chain: https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html<br>• Tor Project (onion services): https://www.torproject.org/<br>• Threat Talks hub: https://threat-talks.com/</p><p><a href="https://share.transistor.fm/s/a249b048/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🕵️ Threat Talks is a podcast created in collaboration with ON2IT and AMS-IX. Each episode features leading cybersecurity experts sharing real-world insights on emerging threats, trends, and defense strategies — helping organizations stay secure in today’s rapidly evolving digital world.</p><p>ON2IT website: https://on2it.net/<br>AMS-IX website: https://www.ams-ix.net/ams</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Hacktivists don’t need zero-days to hurt you—they weaponize people. Host Lieuwe Jan Koning sits down with Yuri Wit (SOC analyst) and Rob Maas (Field CTO) to dissect APT Handala: how they hunt targets, deliver wipers, and brag about leaks. We map their moves to the Lockheed Martin Kill Chain and turn it into a Zero Trust defense playbook you can actually use—today.</p><p></p><ul><li>(00:00) - - 01:40 - Introduction</li>
<li>(01:40) - - 02:27 - What is APT Handala?</li>
<li>(02:27) - - 05:27 - Kill Chain Step 1: Reconnaissance</li>
<li>(05:27) - - 06:43 - Kill Chain Step 2: Weaponization</li>
<li>(06:43) - - 10:39 - Kill Chain Step 3: Delivery</li>
<li>(10:39) - - 14:37 - Kill Chain Step 4: Exploitation</li>
<li>(14:37) - - 17:34 - Kill Chain Step 5: Installation</li>
<li>(17:34) - - 23:39 - Kill Chain Step 6: Command and control</li>
<li>(23:39) - - 26:40 - Kill Chain Step 7: Act on objectives</li>
<li>(26:40) - - 29:35 - How to respond to being hacked</li>
<li>(29:25) - - 30:22 - Closing notes</li>
</ul><br>Key Topics Covered<br>•  Handala’s playbook: people-centric recon, phishing kits, wipers, boast-and-leak ops.<br>•  Zero Trust counters: deny-by-default egress, newly-registered-domain blocks, hard EDR, passkeys.<br>•  SOC tells: DNS DGA spikes, encrypted C2 on common apps, “human error” as the biggest CVE.<br>•  Comms reality: when openness helps—and when strategic silence limits amplification.<p>Additional Resources<br>• ON2IT Zero Trust: https://on2it.net/zero-trust/<br>• Lockheed Martin Cyber Kill Chain: https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html<br>• Tor Project (onion services): https://www.torproject.org/<br>• Threat Talks hub: https://threat-talks.com/</p><p><a href="https://share.transistor.fm/s/a249b048/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🕵️ Threat Talks is a podcast created in collaboration with ON2IT and AMS-IX. Each episode features leading cybersecurity experts sharing real-world insights on emerging threats, trends, and defense strategies — helping organizations stay secure in today’s rapidly evolving digital world.</p><p>ON2IT website: https://on2it.net/<br>AMS-IX website: https://www.ams-ix.net/ams</p>]]>
      </content:encoded>
      <pubDate>Tue, 23 Sep 2025 07:05:24 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/a249b048/18f7d49e.mp3" length="73413468" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/WHM9Sk4byGYt8uanmeZ4TwEnGs4kvc90QPQN7s0q6Mw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83OTdk/ZDlmM2QxNzkyYTg1/MGI0YWI0NmEzNDYw/NGU5MC5qcGc.jpg"/>
      <itunes:duration>1832</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Hacktivists don’t need zero-days to hurt you—they weaponize people. Host Lieuwe Jan Koning sits down with Yuri Wit (SOC analyst) and Rob Maas (Field CTO) to dissect APT Handala: how they hunt targets, deliver wipers, and brag about leaks. We map their moves to the Lockheed Martin Kill Chain and turn it into a Zero Trust defense playbook you can actually use—today.</p><p></p><ul><li>(00:00) - - 01:40 - Introduction</li>
<li>(01:40) - - 02:27 - What is APT Handala?</li>
<li>(02:27) - - 05:27 - Kill Chain Step 1: Reconnaissance</li>
<li>(05:27) - - 06:43 - Kill Chain Step 2: Weaponization</li>
<li>(06:43) - - 10:39 - Kill Chain Step 3: Delivery</li>
<li>(10:39) - - 14:37 - Kill Chain Step 4: Exploitation</li>
<li>(14:37) - - 17:34 - Kill Chain Step 5: Installation</li>
<li>(17:34) - - 23:39 - Kill Chain Step 6: Command and control</li>
<li>(23:39) - - 26:40 - Kill Chain Step 7: Act on objectives</li>
<li>(26:40) - - 29:35 - How to respond to being hacked</li>
<li>(29:25) - - 30:22 - Closing notes</li>
</ul><br>Key Topics Covered<br>•  Handala’s playbook: people-centric recon, phishing kits, wipers, boast-and-leak ops.<br>•  Zero Trust counters: deny-by-default egress, newly-registered-domain blocks, hard EDR, passkeys.<br>•  SOC tells: DNS DGA spikes, encrypted C2 on common apps, “human error” as the biggest CVE.<br>•  Comms reality: when openness helps—and when strategic silence limits amplification.<p>Additional Resources<br>• ON2IT Zero Trust: https://on2it.net/zero-trust/<br>• Lockheed Martin Cyber Kill Chain: https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html<br>• Tor Project (onion services): https://www.torproject.org/<br>• Threat Talks hub: https://threat-talks.com/</p><p><a href="https://share.transistor.fm/s/a249b048/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🕵️ Threat Talks is a podcast created in collaboration with ON2IT and AMS-IX. Each episode features leading cybersecurity experts sharing real-world insights on emerging threats, trends, and defense strategies — helping organizations stay secure in today’s rapidly evolving digital world.</p><p>ON2IT website: https://on2it.net/<br>AMS-IX website: https://www.ams-ix.net/ams</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/a249b048/transcript.srt" type="application/x-subrip" rel="captions"/>
      <podcast:chapters url="https://share.transistor.fm/s/a249b048/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Promptlock – The First AI-Powered Malware | The Cyber Security Podcast</title>
      <itunes:title>Promptlock – The First AI-Powered Malware | The Cyber Security Podcast</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">dad30da4-411f-491f-9e50-f823346ffa31</guid>
      <link>https://share.transistor.fm/s/f36d3dd5</link>
      <description>
        <![CDATA[<p>First documented case: AI inside the breach.<br>Promptlock marks the first time malware has used AI during execution, not just in preparation. In this Threat Talks deep dive, Rob Maas (Field CTO, ON2IT) sits down with Yuri Wit (SOC Analyst, ON2IT) to break down how it works: a Go loader calling an attacker’s LLM in real time, generating fresh payloads that adapt on the fly.</p><p>This episode strips away sci-fi hype. You’ll see the psychology of an adversary that thinks mid-attack—and the Zero Trust defenses that box it in. When AI runs inside the kill chain, malware doesn’t just evolve. It crosses into super-malware.</p><p></p><ul><li>(00:00) - — Cold open: “What if malware could think?”</li>
<li>(00:18) - — Welcome: Rob Maas &amp; Yuri Wit</li>
<li>(00:41) - — First reaction to PromptLock</li>
<li>(01:02) - — How attackers already use AI (phishing, coding, negotiations)</li>
<li>(03:02) - — Why PromptLock is different: AI during execution</li>
<li>(03:35) - — How it works: Go → Ollama → LLM → Lua</li>
<li>(06:36) - — Proof-of-concept tells (the Satoshi wallet)</li>
<li>(07:55) - — Defense shift: hashes die, behavior wins</li>
<li>(10:40) - — Detecting LLM calls: SSL inspection realities</li>
<li>(11:26) - — Quick wins: block interpreters (Lua/Python/PowerShell)</li>
<li>(12:23) - — Zero Trust moves: default-deny egress &amp; segmentation</li>
<li>(12:41) - — What’s next: dynamic exploits &amp; on-demand EDR bypass</li>
<li>(16:21) - — Timelines &amp; hardware: why adoption could accelerate</li>
<li>(18:21) - — Wrap-up &amp; CTA</li>
</ul> <p>Key Topics Covered<br>• The first documented case of AI inside the breach — why Promptlock changes the game<br>• Promptlock’s core loop: calling an LLM mid-attack to generate fresh payloads.<br>• Why hash-based detection breaks against AI-powered malware detection, ever-changing scripts.<br>• Behavioral defense over signatures: EDR/XDR, sandboxing, and SSL inspection.<br>• Zero Trust in practice: block script interpreters, restrict egress, and shrink blast radius.</p><p>Additional Resources<br>ON2IT Zero Trust: https://on2it.net/zero-trust/<br>Threat Talks hub: https://threat-talks.com/<br>Ollama (referenced in episode): https://ollama.com/<br>The Rising Threat of Deepfakes: https://youtu.be/gmtZ_aYmQdQ</p><p>Guest &amp; Host Links:<br>Rob Maas, Field CTO, ON2IT: https://www.linkedin.com/in/robmaas83/ <br>Yuri Wit, SOC Specialist, ON2IT: https://www.linkedin.com/in/yuriwit/</p><p><a href="https://share.transistor.fm/s/f36d3dd5/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🕵️ Threat Talks is a podcast created in collaboration with ON2IT and AMS-IX. Each episode features leading cybersecurity experts sharing real-world insights on emerging threats, trends, and defense strategies — helping organizations stay secure in today’s rapidly evolving digital world.</p><p>ON2IT website: https://on2it.net/<br>AMS-IX website: https://www.ams-ix.net/ams</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>First documented case: AI inside the breach.<br>Promptlock marks the first time malware has used AI during execution, not just in preparation. In this Threat Talks deep dive, Rob Maas (Field CTO, ON2IT) sits down with Yuri Wit (SOC Analyst, ON2IT) to break down how it works: a Go loader calling an attacker’s LLM in real time, generating fresh payloads that adapt on the fly.</p><p>This episode strips away sci-fi hype. You’ll see the psychology of an adversary that thinks mid-attack—and the Zero Trust defenses that box it in. When AI runs inside the kill chain, malware doesn’t just evolve. It crosses into super-malware.</p><p></p><ul><li>(00:00) - — Cold open: “What if malware could think?”</li>
<li>(00:18) - — Welcome: Rob Maas &amp; Yuri Wit</li>
<li>(00:41) - — First reaction to PromptLock</li>
<li>(01:02) - — How attackers already use AI (phishing, coding, negotiations)</li>
<li>(03:02) - — Why PromptLock is different: AI during execution</li>
<li>(03:35) - — How it works: Go → Ollama → LLM → Lua</li>
<li>(06:36) - — Proof-of-concept tells (the Satoshi wallet)</li>
<li>(07:55) - — Defense shift: hashes die, behavior wins</li>
<li>(10:40) - — Detecting LLM calls: SSL inspection realities</li>
<li>(11:26) - — Quick wins: block interpreters (Lua/Python/PowerShell)</li>
<li>(12:23) - — Zero Trust moves: default-deny egress &amp; segmentation</li>
<li>(12:41) - — What’s next: dynamic exploits &amp; on-demand EDR bypass</li>
<li>(16:21) - — Timelines &amp; hardware: why adoption could accelerate</li>
<li>(18:21) - — Wrap-up &amp; CTA</li>
</ul> <p>Key Topics Covered<br>• The first documented case of AI inside the breach — why Promptlock changes the game<br>• Promptlock’s core loop: calling an LLM mid-attack to generate fresh payloads.<br>• Why hash-based detection breaks against AI-powered malware detection, ever-changing scripts.<br>• Behavioral defense over signatures: EDR/XDR, sandboxing, and SSL inspection.<br>• Zero Trust in practice: block script interpreters, restrict egress, and shrink blast radius.</p><p>Additional Resources<br>ON2IT Zero Trust: https://on2it.net/zero-trust/<br>Threat Talks hub: https://threat-talks.com/<br>Ollama (referenced in episode): https://ollama.com/<br>The Rising Threat of Deepfakes: https://youtu.be/gmtZ_aYmQdQ</p><p>Guest &amp; Host Links:<br>Rob Maas, Field CTO, ON2IT: https://www.linkedin.com/in/robmaas83/ <br>Yuri Wit, SOC Specialist, ON2IT: https://www.linkedin.com/in/yuriwit/</p><p><a href="https://share.transistor.fm/s/f36d3dd5/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🕵️ Threat Talks is a podcast created in collaboration with ON2IT and AMS-IX. Each episode features leading cybersecurity experts sharing real-world insights on emerging threats, trends, and defense strategies — helping organizations stay secure in today’s rapidly evolving digital world.</p><p>ON2IT website: https://on2it.net/<br>AMS-IX website: https://www.ams-ix.net/ams</p>]]>
      </content:encoded>
      <pubDate>Tue, 16 Sep 2025 07:04:04 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/f36d3dd5/449ee9a2.mp3" length="46094771" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/52-LZdEl4G4U-O2fjRJNH_AGkiXCbluaH-TL5mEVrw4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yOWM4/OGMwNmI0NzFjMzgx/YTA0NTFmMmU5YWUx/Y2Y0YS5qcGc.jpg"/>
      <itunes:duration>1150</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>First documented case: AI inside the breach.<br>Promptlock marks the first time malware has used AI during execution, not just in preparation. In this Threat Talks deep dive, Rob Maas (Field CTO, ON2IT) sits down with Yuri Wit (SOC Analyst, ON2IT) to break down how it works: a Go loader calling an attacker’s LLM in real time, generating fresh payloads that adapt on the fly.</p><p>This episode strips away sci-fi hype. You’ll see the psychology of an adversary that thinks mid-attack—and the Zero Trust defenses that box it in. When AI runs inside the kill chain, malware doesn’t just evolve. It crosses into super-malware.</p><p></p><ul><li>(00:00) - — Cold open: “What if malware could think?”</li>
<li>(00:18) - — Welcome: Rob Maas &amp; Yuri Wit</li>
<li>(00:41) - — First reaction to PromptLock</li>
<li>(01:02) - — How attackers already use AI (phishing, coding, negotiations)</li>
<li>(03:02) - — Why PromptLock is different: AI during execution</li>
<li>(03:35) - — How it works: Go → Ollama → LLM → Lua</li>
<li>(06:36) - — Proof-of-concept tells (the Satoshi wallet)</li>
<li>(07:55) - — Defense shift: hashes die, behavior wins</li>
<li>(10:40) - — Detecting LLM calls: SSL inspection realities</li>
<li>(11:26) - — Quick wins: block interpreters (Lua/Python/PowerShell)</li>
<li>(12:23) - — Zero Trust moves: default-deny egress &amp; segmentation</li>
<li>(12:41) - — What’s next: dynamic exploits &amp; on-demand EDR bypass</li>
<li>(16:21) - — Timelines &amp; hardware: why adoption could accelerate</li>
<li>(18:21) - — Wrap-up &amp; CTA</li>
</ul> <p>Key Topics Covered<br>• The first documented case of AI inside the breach — why Promptlock changes the game<br>• Promptlock’s core loop: calling an LLM mid-attack to generate fresh payloads.<br>• Why hash-based detection breaks against AI-powered malware detection, ever-changing scripts.<br>• Behavioral defense over signatures: EDR/XDR, sandboxing, and SSL inspection.<br>• Zero Trust in practice: block script interpreters, restrict egress, and shrink blast radius.</p><p>Additional Resources<br>ON2IT Zero Trust: https://on2it.net/zero-trust/<br>Threat Talks hub: https://threat-talks.com/<br>Ollama (referenced in episode): https://ollama.com/<br>The Rising Threat of Deepfakes: https://youtu.be/gmtZ_aYmQdQ</p><p>Guest &amp; Host Links:<br>Rob Maas, Field CTO, ON2IT: https://www.linkedin.com/in/robmaas83/ <br>Yuri Wit, SOC Specialist, ON2IT: https://www.linkedin.com/in/yuriwit/</p><p><a href="https://share.transistor.fm/s/f36d3dd5/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🕵️ Threat Talks is a podcast created in collaboration with ON2IT and AMS-IX. Each episode features leading cybersecurity experts sharing real-world insights on emerging threats, trends, and defense strategies — helping organizations stay secure in today’s rapidly evolving digital world.</p><p>ON2IT website: https://on2it.net/<br>AMS-IX website: https://www.ams-ix.net/ams</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f36d3dd5/transcript.vtt" type="text/vtt" rel="captions"/>
      <podcast:chapters url="https://share.transistor.fm/s/f36d3dd5/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Data Bouncing: How HTTP Headers Leak Data | The Cyber Security Podcast</title>
      <itunes:title>Data Bouncing: How HTTP Headers Leak Data | The Cyber Security Podcast</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2b176d15-d377-433c-abbd-8d22f62c5d4d</guid>
      <link>https://share.transistor.fm/s/d51a1053</link>
      <description>
        <![CDATA[<p>Your tools say “secure.” Your headers say “leaking.”<br>In this Threat Talks Deep Dive, ON2IT’s Luca Cipriano (CTI &amp; Red Team Lead) exposes Data Bouncing—a stealthy exfiltration trick that hides inside HTTP headers and abuses DNS lookups through trusted third parties. We show the demo, decode the psychology of the attack, and translate it into Zero Trust moves you can deploy today.</p><p></p><ul><li>(00:00) - – Why your defenses aren’t enough</li>
<li>(00:11) - – What is Data Bouncing?</li>
<li>(01:22) - – How attackers exfiltrate data via DNS &amp; headers</li>
<li>(05:20) - – Live demo: DNS lookups &amp; Burp Suite interception</li>
<li>(10:48) - – Reassembling stolen files undetected</li>
<li>(15:24) - – Can you defend against Data Bouncing?</li>
<li>(19:20) - – Testing it in your own environment</li>
<li>(21:00) - – Key takeaways &amp; call to action</li>
</ul><br>Key Topics Covered<br>•  How Data Bouncing enables covert data exfiltration<br>•  Abuse of headers like X-Forwarded-For to bypass firewalls<br>•  Live demo: attacker vs. victim scenario<br>•  Defensive measures: decryption, inspection, Zero Trust, and SOC awareness<p>Additional Resources<br>• ON2IT Threat Talks Podcast: https://www.on2it.net/threat-talks<br>• Zero Trust Resources: https://www.on2it.net/zero-trust/</p><p>Guest &amp; Host Links:<br>• Luca Cipriano, Cyber Threat Intelligence Program Lead, ON2IT: https://www.linkedin.com/in/luca-c-914973124/<br>• Rob Maas, Field CTO, ON2IT: https://www.linkedin.com/in/robmaas83/ </p><p><a href="https://share.transistor.fm/s/d51a1053/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a podcast created in collaboration with ON2IT and AMS-IX. Each episode features leading cybersecurity experts sharing real-world insights on emerging threats, trends, and defense strategies — helping organizations stay secure in today’s rapidly evolving digital world.</p><p>ON2IT website: https://on2it.net/<br>AMS-IX website: https://www.ams-ix.net/ams</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Your tools say “secure.” Your headers say “leaking.”<br>In this Threat Talks Deep Dive, ON2IT’s Luca Cipriano (CTI &amp; Red Team Lead) exposes Data Bouncing—a stealthy exfiltration trick that hides inside HTTP headers and abuses DNS lookups through trusted third parties. We show the demo, decode the psychology of the attack, and translate it into Zero Trust moves you can deploy today.</p><p></p><ul><li>(00:00) - – Why your defenses aren’t enough</li>
<li>(00:11) - – What is Data Bouncing?</li>
<li>(01:22) - – How attackers exfiltrate data via DNS &amp; headers</li>
<li>(05:20) - – Live demo: DNS lookups &amp; Burp Suite interception</li>
<li>(10:48) - – Reassembling stolen files undetected</li>
<li>(15:24) - – Can you defend against Data Bouncing?</li>
<li>(19:20) - – Testing it in your own environment</li>
<li>(21:00) - – Key takeaways &amp; call to action</li>
</ul><br>Key Topics Covered<br>•  How Data Bouncing enables covert data exfiltration<br>•  Abuse of headers like X-Forwarded-For to bypass firewalls<br>•  Live demo: attacker vs. victim scenario<br>•  Defensive measures: decryption, inspection, Zero Trust, and SOC awareness<p>Additional Resources<br>• ON2IT Threat Talks Podcast: https://www.on2it.net/threat-talks<br>• Zero Trust Resources: https://www.on2it.net/zero-trust/</p><p>Guest &amp; Host Links:<br>• Luca Cipriano, Cyber Threat Intelligence Program Lead, ON2IT: https://www.linkedin.com/in/luca-c-914973124/<br>• Rob Maas, Field CTO, ON2IT: https://www.linkedin.com/in/robmaas83/ </p><p><a href="https://share.transistor.fm/s/d51a1053/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a podcast created in collaboration with ON2IT and AMS-IX. Each episode features leading cybersecurity experts sharing real-world insights on emerging threats, trends, and defense strategies — helping organizations stay secure in today’s rapidly evolving digital world.</p><p>ON2IT website: https://on2it.net/<br>AMS-IX website: https://www.ams-ix.net/ams</p>]]>
      </content:encoded>
      <pubDate>Tue, 09 Sep 2025 08:59:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/d51a1053/6d3f63c8.mp3" length="52796063" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/pbeifibFMQKXhIWfSy4xsCKJ2B1l_aS9jQGIRkYBPzE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iYTIz/ZjE4YjJmMjgyNDBh/ZmVjZWRiZWUxMWU0/NDgyMS5qcGc.jpg"/>
      <itunes:duration>1318</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Your tools say “secure.” Your headers say “leaking.”<br>In this Threat Talks Deep Dive, ON2IT’s Luca Cipriano (CTI &amp; Red Team Lead) exposes Data Bouncing—a stealthy exfiltration trick that hides inside HTTP headers and abuses DNS lookups through trusted third parties. We show the demo, decode the psychology of the attack, and translate it into Zero Trust moves you can deploy today.</p><p></p><ul><li>(00:00) - – Why your defenses aren’t enough</li>
<li>(00:11) - – What is Data Bouncing?</li>
<li>(01:22) - – How attackers exfiltrate data via DNS &amp; headers</li>
<li>(05:20) - – Live demo: DNS lookups &amp; Burp Suite interception</li>
<li>(10:48) - – Reassembling stolen files undetected</li>
<li>(15:24) - – Can you defend against Data Bouncing?</li>
<li>(19:20) - – Testing it in your own environment</li>
<li>(21:00) - – Key takeaways &amp; call to action</li>
</ul><br>Key Topics Covered<br>•  How Data Bouncing enables covert data exfiltration<br>•  Abuse of headers like X-Forwarded-For to bypass firewalls<br>•  Live demo: attacker vs. victim scenario<br>•  Defensive measures: decryption, inspection, Zero Trust, and SOC awareness<p>Additional Resources<br>• ON2IT Threat Talks Podcast: https://www.on2it.net/threat-talks<br>• Zero Trust Resources: https://www.on2it.net/zero-trust/</p><p>Guest &amp; Host Links:<br>• Luca Cipriano, Cyber Threat Intelligence Program Lead, ON2IT: https://www.linkedin.com/in/luca-c-914973124/<br>• Rob Maas, Field CTO, ON2IT: https://www.linkedin.com/in/robmaas83/ </p><p><a href="https://share.transistor.fm/s/d51a1053/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a podcast created in collaboration with ON2IT and AMS-IX. Each episode features leading cybersecurity experts sharing real-world insights on emerging threats, trends, and defense strategies — helping organizations stay secure in today’s rapidly evolving digital world.</p><p>ON2IT website: https://on2it.net/<br>AMS-IX website: https://www.ams-ix.net/ams</p>]]>
      </itunes:summary>
      <itunes:keywords>Data Bouncing, Threat Talks, </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d51a1053/transcript.srt" type="application/x-subrip" rel="captions"/>
      <podcast:chapters url="https://share.transistor.fm/s/d51a1053/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>AI, Play It Safe: Why CISOs Are Wrong to Ban AI</title>
      <itunes:title>AI, Play It Safe: Why CISOs Are Wrong to Ban AI</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ea203b6b-ea59-45ae-b598-df5fcb5d49e8</guid>
      <link>https://share.transistor.fm/s/977f2f37</link>
      <description>
        <![CDATA[<p>Playing it safe with AI sounds smart, but is banning it really how you prevent data leaks?</p><p>In this episode of Threat Talks, ON2IT’s Lieuwe Jan Koning (ON2IT Co-Founder) sits down with Rob Maas, Field CTO at ON2IT, to tackle the hard question: How can CISOs and security leaders embrace AI safely—without exposing their organization to destructive data leaks?</p><p>From Samsung’s ChatGPT ban to real-world AI hallucinations, we unpack why “AI, play it safe” doesn’t mean blocking innovation—it means controlling it.</p><p></p><ul><li>(00:00) - 00:00 – AI, play it safe introduction</li>
<li>(00:00) - 00:41 – Customer fears: Ban AI or embrace it?</li>
<li>(00:00) - 01:13 – Real case: $1 Chevrolet Tahoe &amp; AI chatbots gone wrong</li>
<li>(00:00) - 02:46 – Samsung’s ChatGPT ban: lessons for CISOs</li>
<li>(00:00) - 06:50 – How AI transforms work &amp; productivity (coding, translation, ops)</li>
<li>(00:00) - 17:00 – Data exposure &amp; AI governance: the #1 risk</li>
<li>(00:00) - 30:21 – LLM on Prem</li>
<li>(00:00) - 33:10 – AI hallucinations &amp; unsafe outputs (dangerous examples)</li>
<li>(00:00) - 40:50 – The CISO dilemma: Fall behind or take control</li>
</ul><br>Key Topics Covered<br>• Why “banning AI” is a bigger risk than using it with the right safeguards.<br>• Real-world AI risks: hallucinations, unsafe outputs, and data exposure.<br>• Zero Trust approach to AI adoption: categorize sanctioned, tolerated, unsanctioned tools.<br>• How CISOs can transform AI fear into competitive advantage with the right strategy.<p>Additional Resources<br>• ON2IT Threat Talks Podcast: https://www.on2it.net/threat-talks<br>• Zero Trust Resources: https://www.on2it.net/zero-trust/</p><p>Guest &amp; Host Links:<br>Rob Maas (Field CTO, ON2IT): https://www.linkedin.com/in/robmaas83/ <br>Lieuwe Jan Koning (Founding Partner, ON2IT): https://www.linkedin.com/in/lieuwejan/</p><p>If you’re a CISO, CIO, or security leader navigating the AI storm, this episode is a must-watch.</p><p><a href="https://share.transistor.fm/s/977f2f37/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Playing it safe with AI sounds smart, but is banning it really how you prevent data leaks?</p><p>In this episode of Threat Talks, ON2IT’s Lieuwe Jan Koning (ON2IT Co-Founder) sits down with Rob Maas, Field CTO at ON2IT, to tackle the hard question: How can CISOs and security leaders embrace AI safely—without exposing their organization to destructive data leaks?</p><p>From Samsung’s ChatGPT ban to real-world AI hallucinations, we unpack why “AI, play it safe” doesn’t mean blocking innovation—it means controlling it.</p><p></p><ul><li>(00:00) - 00:00 – AI, play it safe introduction</li>
<li>(00:00) - 00:41 – Customer fears: Ban AI or embrace it?</li>
<li>(00:00) - 01:13 – Real case: $1 Chevrolet Tahoe &amp; AI chatbots gone wrong</li>
<li>(00:00) - 02:46 – Samsung’s ChatGPT ban: lessons for CISOs</li>
<li>(00:00) - 06:50 – How AI transforms work &amp; productivity (coding, translation, ops)</li>
<li>(00:00) - 17:00 – Data exposure &amp; AI governance: the #1 risk</li>
<li>(00:00) - 30:21 – LLM on Prem</li>
<li>(00:00) - 33:10 – AI hallucinations &amp; unsafe outputs (dangerous examples)</li>
<li>(00:00) - 40:50 – The CISO dilemma: Fall behind or take control</li>
</ul><br>Key Topics Covered<br>• Why “banning AI” is a bigger risk than using it with the right safeguards.<br>• Real-world AI risks: hallucinations, unsafe outputs, and data exposure.<br>• Zero Trust approach to AI adoption: categorize sanctioned, tolerated, unsanctioned tools.<br>• How CISOs can transform AI fear into competitive advantage with the right strategy.<p>Additional Resources<br>• ON2IT Threat Talks Podcast: https://www.on2it.net/threat-talks<br>• Zero Trust Resources: https://www.on2it.net/zero-trust/</p><p>Guest &amp; Host Links:<br>Rob Maas (Field CTO, ON2IT): https://www.linkedin.com/in/robmaas83/ <br>Lieuwe Jan Koning (Founding Partner, ON2IT): https://www.linkedin.com/in/lieuwejan/</p><p>If you’re a CISO, CIO, or security leader navigating the AI storm, this episode is a must-watch.</p><p><a href="https://share.transistor.fm/s/977f2f37/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Tue, 02 Sep 2025 07:11:48 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/977f2f37/9421baf8.mp3" length="107842476" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/7mSs65sKCCNoIw6ChZ-duS0eZxhoFRTAHUHQa4sSdqI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81MDdk/Mzg1Njc4NjdkMjMy/MmJjZWY0ZTFiMTNk/NTJiZS5qcGc.jpg"/>
      <itunes:duration>2694</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Playing it safe with AI sounds smart, but is banning it really how you prevent data leaks?</p><p>In this episode of Threat Talks, ON2IT’s Lieuwe Jan Koning (ON2IT Co-Founder) sits down with Rob Maas, Field CTO at ON2IT, to tackle the hard question: How can CISOs and security leaders embrace AI safely—without exposing their organization to destructive data leaks?</p><p>From Samsung’s ChatGPT ban to real-world AI hallucinations, we unpack why “AI, play it safe” doesn’t mean blocking innovation—it means controlling it.</p><p></p><ul><li>(00:00) - 00:00 – AI, play it safe introduction</li>
<li>(00:00) - 00:41 – Customer fears: Ban AI or embrace it?</li>
<li>(00:00) - 01:13 – Real case: $1 Chevrolet Tahoe &amp; AI chatbots gone wrong</li>
<li>(00:00) - 02:46 – Samsung’s ChatGPT ban: lessons for CISOs</li>
<li>(00:00) - 06:50 – How AI transforms work &amp; productivity (coding, translation, ops)</li>
<li>(00:00) - 17:00 – Data exposure &amp; AI governance: the #1 risk</li>
<li>(00:00) - 30:21 – LLM on Prem</li>
<li>(00:00) - 33:10 – AI hallucinations &amp; unsafe outputs (dangerous examples)</li>
<li>(00:00) - 40:50 – The CISO dilemma: Fall behind or take control</li>
</ul><br>Key Topics Covered<br>• Why “banning AI” is a bigger risk than using it with the right safeguards.<br>• Real-world AI risks: hallucinations, unsafe outputs, and data exposure.<br>• Zero Trust approach to AI adoption: categorize sanctioned, tolerated, unsanctioned tools.<br>• How CISOs can transform AI fear into competitive advantage with the right strategy.<p>Additional Resources<br>• ON2IT Threat Talks Podcast: https://www.on2it.net/threat-talks<br>• Zero Trust Resources: https://www.on2it.net/zero-trust/</p><p>Guest &amp; Host Links:<br>Rob Maas (Field CTO, ON2IT): https://www.linkedin.com/in/robmaas83/ <br>Lieuwe Jan Koning (Founding Partner, ON2IT): https://www.linkedin.com/in/lieuwejan/</p><p>If you’re a CISO, CIO, or security leader navigating the AI storm, this episode is a must-watch.</p><p><a href="https://share.transistor.fm/s/977f2f37/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </itunes:summary>
      <itunes:keywords>AI, Play it safe</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/977f2f37/transcript.srt" type="application/x-subrip" rel="captions"/>
      <podcast:chapters url="https://share.transistor.fm/s/977f2f37/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Zero Trust step 5A: Stop Breaches—Inspect Every Event Now | The Cybersecurity Podcast</title>
      <itunes:title>Zero Trust step 5A: Stop Breaches—Inspect Every Event Now | The Cybersecurity Podcast</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4405f2de-56c3-44c0-bbff-fe432905b8d7</guid>
      <link>https://share.transistor.fm/s/138f1af0</link>
      <description>
        <![CDATA[<p>Zero Trust step 5A is where monitoring turns raw logs into decisive action.<br>Hosts Lieuwe Jan Koning and Rob Maas (Field CTO, ON2IT) expose why MDR alone isn’t protection—and how context closes the gap. Learn to inspect every event, use Indicators of Good/Compromise, and set Rules of Engagement that stop lateral movement and alert fatigue.</p><p></p><ul><li>(00:00) - — Welcome &amp; Step 5A (Monitor) setup</li>
<li>(00:37) - — Steps 1–4 recap: protect surfaces, flows, architecture, policy</li>
<li>(04:12) - — MDR vs protection: why “collect all logs” fails</li>
<li>(07:28) - — Events vs logs: inspect every event &amp; retention reality</li>
<li>(10:22) - — Context from protect surfaces: mapping IPs to business systems</li>
<li>(13:41) - — IoG vs IoC vs Unknown: triage model &amp; beating alert fatigue</li>
<li>(17:59) - — Rules of Engagement: automation, kill switch &amp; blast radius (prevention first)</li>
</ul><br>Key Topics Covered<br>• MDR ≠ protection: why Step 5A only works after Steps 1–4 are in place.<br>• Events vs logs: what to keep, what to act on, and how to avoid SIEM sprawl.<br>• Context from protect surfaces: mapping IPs to business systems to triage fast.<br>• Automation with Rules of Engagement: IoG/IoC/Unknown, kill switches, and reducing blast radius.<p>If this helped sharpen your Zero Trust monitoring strategy, subscribe to Threat Talks and turn on notifications—don’t miss Step 5B (Maintain).</p><p>Additional Resources<br>• https://on2it.net/zero-trust/<br>• https://on2it.net/managed-security/protect-surface-management/<br>• https://on2it.net/wp-content/uploads/2023/02/Zero-Trust-Dictionary-EN.pdf<br>• https://on2it.net/context-is-key-the-data-challenge-of-cybersecurity/<br>• https://threat-talks.com/<br>• https://www.ams-ix.net/</p><p>Guest &amp; Host Links:<br>Rob Maas (Field CTO, ON2IT): https://www.linkedin.com/in/robmaas83/<br>Lieuwe Jan Koning (Founding Partner, ON2IT): https://www.linkedin.com/in/lieuwejan/</p><p><a href="https://share.transistor.fm/s/138f1af0/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a podcast created in collaboration with ON2IT and AMS-IX. Each episode features leading cybersecurity experts sharing real-world insights on emerging threats, trends, and defense strategies — helping organizations stay secure in today’s rapidly evolving digital world.</p><p>ON2IT website: https://on2it.net/<br>AMS-IX website: https://www.ams-ix.net/ams</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Zero Trust step 5A is where monitoring turns raw logs into decisive action.<br>Hosts Lieuwe Jan Koning and Rob Maas (Field CTO, ON2IT) expose why MDR alone isn’t protection—and how context closes the gap. Learn to inspect every event, use Indicators of Good/Compromise, and set Rules of Engagement that stop lateral movement and alert fatigue.</p><p></p><ul><li>(00:00) - — Welcome &amp; Step 5A (Monitor) setup</li>
<li>(00:37) - — Steps 1–4 recap: protect surfaces, flows, architecture, policy</li>
<li>(04:12) - — MDR vs protection: why “collect all logs” fails</li>
<li>(07:28) - — Events vs logs: inspect every event &amp; retention reality</li>
<li>(10:22) - — Context from protect surfaces: mapping IPs to business systems</li>
<li>(13:41) - — IoG vs IoC vs Unknown: triage model &amp; beating alert fatigue</li>
<li>(17:59) - — Rules of Engagement: automation, kill switch &amp; blast radius (prevention first)</li>
</ul><br>Key Topics Covered<br>• MDR ≠ protection: why Step 5A only works after Steps 1–4 are in place.<br>• Events vs logs: what to keep, what to act on, and how to avoid SIEM sprawl.<br>• Context from protect surfaces: mapping IPs to business systems to triage fast.<br>• Automation with Rules of Engagement: IoG/IoC/Unknown, kill switches, and reducing blast radius.<p>If this helped sharpen your Zero Trust monitoring strategy, subscribe to Threat Talks and turn on notifications—don’t miss Step 5B (Maintain).</p><p>Additional Resources<br>• https://on2it.net/zero-trust/<br>• https://on2it.net/managed-security/protect-surface-management/<br>• https://on2it.net/wp-content/uploads/2023/02/Zero-Trust-Dictionary-EN.pdf<br>• https://on2it.net/context-is-key-the-data-challenge-of-cybersecurity/<br>• https://threat-talks.com/<br>• https://www.ams-ix.net/</p><p>Guest &amp; Host Links:<br>Rob Maas (Field CTO, ON2IT): https://www.linkedin.com/in/robmaas83/<br>Lieuwe Jan Koning (Founding Partner, ON2IT): https://www.linkedin.com/in/lieuwejan/</p><p><a href="https://share.transistor.fm/s/138f1af0/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a podcast created in collaboration with ON2IT and AMS-IX. Each episode features leading cybersecurity experts sharing real-world insights on emerging threats, trends, and defense strategies — helping organizations stay secure in today’s rapidly evolving digital world.</p><p>ON2IT website: https://on2it.net/<br>AMS-IX website: https://www.ams-ix.net/ams</p>]]>
      </content:encoded>
      <pubDate>Tue, 26 Aug 2025 07:09:09 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/138f1af0/9b3e4751.mp3" length="60615683" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ssHHASjRTPHq_TG__xiLjeBYaXOoSSHHx7R2xgP2y5Q/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lNTE4/ODAyMDM1M2E2ZTc1/ZDY0YmNlZDIzZTc3/ODRjYy5qcGc.jpg"/>
      <itunes:duration>1516</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Zero Trust step 5A is where monitoring turns raw logs into decisive action.<br>Hosts Lieuwe Jan Koning and Rob Maas (Field CTO, ON2IT) expose why MDR alone isn’t protection—and how context closes the gap. Learn to inspect every event, use Indicators of Good/Compromise, and set Rules of Engagement that stop lateral movement and alert fatigue.</p><p></p><ul><li>(00:00) - — Welcome &amp; Step 5A (Monitor) setup</li>
<li>(00:37) - — Steps 1–4 recap: protect surfaces, flows, architecture, policy</li>
<li>(04:12) - — MDR vs protection: why “collect all logs” fails</li>
<li>(07:28) - — Events vs logs: inspect every event &amp; retention reality</li>
<li>(10:22) - — Context from protect surfaces: mapping IPs to business systems</li>
<li>(13:41) - — IoG vs IoC vs Unknown: triage model &amp; beating alert fatigue</li>
<li>(17:59) - — Rules of Engagement: automation, kill switch &amp; blast radius (prevention first)</li>
</ul><br>Key Topics Covered<br>• MDR ≠ protection: why Step 5A only works after Steps 1–4 are in place.<br>• Events vs logs: what to keep, what to act on, and how to avoid SIEM sprawl.<br>• Context from protect surfaces: mapping IPs to business systems to triage fast.<br>• Automation with Rules of Engagement: IoG/IoC/Unknown, kill switches, and reducing blast radius.<p>If this helped sharpen your Zero Trust monitoring strategy, subscribe to Threat Talks and turn on notifications—don’t miss Step 5B (Maintain).</p><p>Additional Resources<br>• https://on2it.net/zero-trust/<br>• https://on2it.net/managed-security/protect-surface-management/<br>• https://on2it.net/wp-content/uploads/2023/02/Zero-Trust-Dictionary-EN.pdf<br>• https://on2it.net/context-is-key-the-data-challenge-of-cybersecurity/<br>• https://threat-talks.com/<br>• https://www.ams-ix.net/</p><p>Guest &amp; Host Links:<br>Rob Maas (Field CTO, ON2IT): https://www.linkedin.com/in/robmaas83/<br>Lieuwe Jan Koning (Founding Partner, ON2IT): https://www.linkedin.com/in/lieuwejan/</p><p><a href="https://share.transistor.fm/s/138f1af0/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a podcast created in collaboration with ON2IT and AMS-IX. Each episode features leading cybersecurity experts sharing real-world insights on emerging threats, trends, and defense strategies — helping organizations stay secure in today’s rapidly evolving digital world.</p><p>ON2IT website: https://on2it.net/<br>AMS-IX website: https://www.ams-ix.net/ams</p>]]>
      </itunes:summary>
      <itunes:keywords>Zero Trust, The Cybersecurity Podcast, Zero Trust step 5</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/138f1af0/transcript.srt" type="application/x-subrip" rel="captions"/>
      <podcast:chapters url="https://share.transistor.fm/s/138f1af0/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>From Stealth to Wipers: Inside Russia’s APT 44 AKA Seashell Blizzard | The Cybersecurity Podcast</title>
      <itunes:title>From Stealth to Wipers: Inside Russia’s APT 44 AKA Seashell Blizzard | The Cybersecurity Podcast</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">cf31f0f1-7b43-443b-b881-0516b6729021</guid>
      <link>https://share.transistor.fm/s/38afcb23</link>
      <description>
        <![CDATA[<p>Russia’s most notorious cyber unit—Seashell Blizzard (also known as Sandworm, APT 44 and Iron Viking)—has taken down shipping giants, Olympic systems, and Ukraine’s power grid.</p><p>In this Threat Talks deep dive, Lieuwe Jan Koning, Yuri Wit (Red Team), and Rob Maas (Blue Team) reveal exactly how these attacks unfold, why they’re so hard to stop, and how Zero Trust can tip the balance back to defenders.</p><p></p><ul><li>(00:00) - – Cyber warfare in the Ukraine conflict: setting the stage</li>
<li>(01:10) - – Who is Seashell Blizzard? Names, aliases, and Russian GRU ties</li>
<li>(04:00) - – NotPetya, Olympic Games, and high-profile disruption campaigns</li>
<li>(07:31) - – Initial access: stealth exploits on edge devices</li>
<li>(11:40) - – Privilege escalation via Living-off-the-Land (LOLBin) tactics</li>
<li>(15:23) - – Weaponizing Group Policy Objects with “Tank Trap” for mass wipers</li>
<li>(19:13) - – Objectives: disruption, damage, and public bragging rights</li>
<li>(23:40) - – Zero Trust defenses, segmentation, and last-resort recovery</li>
</ul><br><strong>Key Topics Covered<br></strong>• Seashell Blizzard’s attack chain: from stealth reconnaissance to mass destruction.<br>• NotPetya &amp; global fallout: when a Ukraine-targeted attack crippled global shipping.<br>• Defense strategies: hardening edge devices, segmentation, and EDR behavior detection.<br>• Zero Trust in action: protecting critical assets before the breach happens.<p><strong>Related ON2IT Content &amp; Referenced Resources<br></strong>• ON2IT Threat Talks Playlist: https://www.youtube.com/@ThreatTalks/playlists ON2IT Zero Trust Resources: https://on2it.net/zero-trust<br>• MITRE ATT&amp;CK – Sandworm Team (APT 44): https://attack.mitre.org/groups/G0034/</p><p><a href="https://share.transistor.fm/s/38afcb23/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Russia’s most notorious cyber unit—Seashell Blizzard (also known as Sandworm, APT 44 and Iron Viking)—has taken down shipping giants, Olympic systems, and Ukraine’s power grid.</p><p>In this Threat Talks deep dive, Lieuwe Jan Koning, Yuri Wit (Red Team), and Rob Maas (Blue Team) reveal exactly how these attacks unfold, why they’re so hard to stop, and how Zero Trust can tip the balance back to defenders.</p><p></p><ul><li>(00:00) - – Cyber warfare in the Ukraine conflict: setting the stage</li>
<li>(01:10) - – Who is Seashell Blizzard? Names, aliases, and Russian GRU ties</li>
<li>(04:00) - – NotPetya, Olympic Games, and high-profile disruption campaigns</li>
<li>(07:31) - – Initial access: stealth exploits on edge devices</li>
<li>(11:40) - – Privilege escalation via Living-off-the-Land (LOLBin) tactics</li>
<li>(15:23) - – Weaponizing Group Policy Objects with “Tank Trap” for mass wipers</li>
<li>(19:13) - – Objectives: disruption, damage, and public bragging rights</li>
<li>(23:40) - – Zero Trust defenses, segmentation, and last-resort recovery</li>
</ul><br><strong>Key Topics Covered<br></strong>• Seashell Blizzard’s attack chain: from stealth reconnaissance to mass destruction.<br>• NotPetya &amp; global fallout: when a Ukraine-targeted attack crippled global shipping.<br>• Defense strategies: hardening edge devices, segmentation, and EDR behavior detection.<br>• Zero Trust in action: protecting critical assets before the breach happens.<p><strong>Related ON2IT Content &amp; Referenced Resources<br></strong>• ON2IT Threat Talks Playlist: https://www.youtube.com/@ThreatTalks/playlists ON2IT Zero Trust Resources: https://on2it.net/zero-trust<br>• MITRE ATT&amp;CK – Sandworm Team (APT 44): https://attack.mitre.org/groups/G0034/</p><p><a href="https://share.transistor.fm/s/38afcb23/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Tue, 19 Aug 2025 07:02:05 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/38afcb23/1f06ff25.mp3" length="60502338" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/8GmHNB6RCUWeett9vc9LwhNou251Bo-UO9bCC7lAygY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lOTA1/N2Q0ZDJlYTk5ZjEw/MTg0NjZkNDZkMjFl/ZjQ0NS5qcGc.jpg"/>
      <itunes:duration>1511</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Russia’s most notorious cyber unit—Seashell Blizzard (also known as Sandworm, APT 44 and Iron Viking)—has taken down shipping giants, Olympic systems, and Ukraine’s power grid.</p><p>In this Threat Talks deep dive, Lieuwe Jan Koning, Yuri Wit (Red Team), and Rob Maas (Blue Team) reveal exactly how these attacks unfold, why they’re so hard to stop, and how Zero Trust can tip the balance back to defenders.</p><p></p><ul><li>(00:00) - – Cyber warfare in the Ukraine conflict: setting the stage</li>
<li>(01:10) - – Who is Seashell Blizzard? Names, aliases, and Russian GRU ties</li>
<li>(04:00) - – NotPetya, Olympic Games, and high-profile disruption campaigns</li>
<li>(07:31) - – Initial access: stealth exploits on edge devices</li>
<li>(11:40) - – Privilege escalation via Living-off-the-Land (LOLBin) tactics</li>
<li>(15:23) - – Weaponizing Group Policy Objects with “Tank Trap” for mass wipers</li>
<li>(19:13) - – Objectives: disruption, damage, and public bragging rights</li>
<li>(23:40) - – Zero Trust defenses, segmentation, and last-resort recovery</li>
</ul><br><strong>Key Topics Covered<br></strong>• Seashell Blizzard’s attack chain: from stealth reconnaissance to mass destruction.<br>• NotPetya &amp; global fallout: when a Ukraine-targeted attack crippled global shipping.<br>• Defense strategies: hardening edge devices, segmentation, and EDR behavior detection.<br>• Zero Trust in action: protecting critical assets before the breach happens.<p><strong>Related ON2IT Content &amp; Referenced Resources<br></strong>• ON2IT Threat Talks Playlist: https://www.youtube.com/@ThreatTalks/playlists ON2IT Zero Trust Resources: https://on2it.net/zero-trust<br>• MITRE ATT&amp;CK – Sandworm Team (APT 44): https://attack.mitre.org/groups/G0034/</p><p><a href="https://share.transistor.fm/s/38afcb23/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
<br>🔔 Follow and Support our channel! 🔔<br>=== <br>► YOUTUBE: https://youtube.com/@ThreatTalks<br>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E<br>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</p><p>👕 Receive your Threat Talks T-shirt<br>https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️<br>https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </itunes:summary>
      <itunes:keywords>Seashell Blizzard, APT 44, cybersecurity podcast</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/38afcb23/transcript.vtt" type="text/vtt" rel="captions"/>
      <podcast:chapters url="https://share.transistor.fm/s/38afcb23/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Signal Gate: One Wrong Number Triggered the Largest U.S. Gov Data Leak | The Cybersecurity Podcast</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Signal Gate: One Wrong Number Triggered the Largest U.S. Gov Data Leak | The Cybersecurity Podcast</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e94513d6-2e8a-44e6-9c08-67c048302b0e</guid>
      <link>https://share.transistor.fm/s/a5027d30</link>
      <description>
        <![CDATA[<p>One mis-typed contact detonates Signal Gate, turning “secure” messaging into a classified-data leak.Host Lieuwe Jan Koning (Co-founder, ON2IT) and Thomas Manolis (Security Officer, AMS-IX) lay out the breach blow-by-blow—then drop the Zero Trust, Shadow IT and information-governance tactics every CISO needs before the next incident hits.High stakes, hard lessons—compressed into actionable steps you can brief to the board.Timestamps00:00 Cold-open: “wrong recipients” analogy00:37 What really happened in Signal Gate01:38 Mistake #1 – Choosing a consumer app over classified03:34 Mistake #2 – Human error: the mis-added journalist07:55 Shadow IT, usability &amp; Secure Messaging Apps 09:10 Information Governance, audits and technical controls12:02 Zero Trust takeaways &amp; action planKey Topics Covered• Anatomy of the Signal Gate breach &amp; timeline• Why Shadow IT sabotages secure operations• Building airtight Information Governance for secure messaging apps• Operationalizing Zero Trust: least privilege, continuous verification, human-centric trainingRelated ON2IT Content &amp; Referenced Resources• “Understanding Zero Trust – Lessons from Experts” whitepaper: https://on2it.net/resources/?• Zero Trust Readiness Assessment (PDF): https://on2it.net/wp-content/uploads/2022/05/Zero-Trust-Readiness-Assessment-EN-US.pdf• Threat Talks podcast hub: https://threat-talks.com/🔔 Follow and Support our channel! 🔔=== ► YOUTUBE: https://youtube.com/@ThreatTalks► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520👕 Receive your Threat Talks T-shirthttps://threat-talks.com/🗺️ Explore the Hack's Route in Detail 🗺️https://threat-talks.com🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>One mis-typed contact detonates Signal Gate, turning “secure” messaging into a classified-data leak.Host Lieuwe Jan Koning (Co-founder, ON2IT) and Thomas Manolis (Security Officer, AMS-IX) lay out the breach blow-by-blow—then drop the Zero Trust, Shadow IT and information-governance tactics every CISO needs before the next incident hits.High stakes, hard lessons—compressed into actionable steps you can brief to the board.Timestamps00:00 Cold-open: “wrong recipients” analogy00:37 What really happened in Signal Gate01:38 Mistake #1 – Choosing a consumer app over classified03:34 Mistake #2 – Human error: the mis-added journalist07:55 Shadow IT, usability &amp; Secure Messaging Apps 09:10 Information Governance, audits and technical controls12:02 Zero Trust takeaways &amp; action planKey Topics Covered• Anatomy of the Signal Gate breach &amp; timeline• Why Shadow IT sabotages secure operations• Building airtight Information Governance for secure messaging apps• Operationalizing Zero Trust: least privilege, continuous verification, human-centric trainingRelated ON2IT Content &amp; Referenced Resources• “Understanding Zero Trust – Lessons from Experts” whitepaper: https://on2it.net/resources/?• Zero Trust Readiness Assessment (PDF): https://on2it.net/wp-content/uploads/2022/05/Zero-Trust-Readiness-Assessment-EN-US.pdf• Threat Talks podcast hub: https://threat-talks.com/🔔 Follow and Support our channel! 🔔=== ► YOUTUBE: https://youtube.com/@ThreatTalks► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520👕 Receive your Threat Talks T-shirthttps://threat-talks.com/🗺️ Explore the Hack's Route in Detail 🗺️https://threat-talks.com🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Tue, 12 Aug 2025 06:59:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/a5027d30/c9e99b25.mp3" length="13237562" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:duration>825</itunes:duration>
      <itunes:summary>One mis-typed contact detonates Signal Gate, turning “secure” messaging into a classified-data leak.Host Lieuwe Jan Koning (Co-founder, ON2IT) and Thomas Manolis (Security Officer, AMS-IX) lay out the breach blow-by-blow—then drop the Zero Trust, Shadow IT and information-governance tactics every CISO needs before the next incident hits.High stakes, hard lessons—compressed into actionable steps you can brief to the board.Timestamps00:00 Cold-open: “wrong recipients” analogy00:37 What really happened in Signal Gate01:38 Mistake #1 – Choosing a consumer app over classified03:34 Mistake #2 – Human error: the mis-added journalist07:55 Shadow IT, usability &amp;amp; Secure Messaging Apps 09:10 Information Governance, audits and technical controls12:02 Zero Trust takeaways &amp;amp; action planKey Topics Covered• Anatomy of the Signal Gate breach &amp;amp; timeline• Why Shadow IT sabotages secure operations• Building airtight Information Governance for secure messaging apps• Operationalizing Zero Trust: least privilege, continuous verification, human-centric trainingRelated ON2IT Content &amp;amp; Referenced Resources• “Understanding Zero Trust – Lessons from Experts” whitepaper: https://on2it.net/resources/?• Zero Trust Readiness Assessment (PDF): https://on2it.net/wp-content/uploads/2022/05/Zero-Trust-Readiness-Assessment-EN-US.pdf• Threat Talks podcast hub: https://threat-talks.com/🔔 Follow and Support our channel! 🔔=== ► YOUTUBE: https://youtube.com/@ThreatTalks► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520👕 Receive your Threat Talks T-shirthttps://threat-talks.com/🗺️ Explore the Hack's Route in Detail 🗺️https://threat-talks.com🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</itunes:summary>
      <itunes:subtitle>One mis-typed contact detonates Signal Gate, turning “secure” messaging into a classified-data leak.Host Lieuwe Jan Koning (Co-founder, ON2IT) and Thomas Manolis (Security Officer, AMS-IX) lay out the breach blow-by-blow—then drop the Zero Trust, Shadow I</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Splinternet Reality Check: Zero Trust Strategies for a Fragmenting Web</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Splinternet Reality Check: Zero Trust Strategies for a Fragmenting Web</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">38bc425f-d237-496f-bdb2-f1a5e33d0fc5</guid>
      <link>https://share.transistor.fm/s/1971d92c</link>
      <description>
        <![CDATA[<p>ON2IT’s Lieuwe Jan Koning goes one-on-one with AMS-IX CEO Peter van Burgel to expose why the once-open internet is splintering into rival, firewalled regions. Discover the geopolitical forces fueling this cybersecurity trend. Learn the Zero Trust resilience moves CISOs must deploy to stay sovereign in the future of the internet.<strong>Key Topics Covered</strong>• Drivers behind the Splinternet &amp; what they mean for CISOs• Scenario-planning methodology for threat forecasting• Aligning Zero Trust with data-localization mandates• Resilience vs. redundancy: how to build real business continuity• Earth-IX concept: keeping critical flows alive amid fragmentation<strong>Related Content &amp; Resources</strong>• ON2IT Zero Trust Framework → https://on2it.net/zero-trust/• AMS-IX MORE-IP Conference insights → https://www.ams-ix.net/ams• EU Digital Services Act overview → https://digital-strategy.ec.europa.eu/en🔔 <strong>Follow and Support our channel!</strong> 🔔► YOUTUBE: https://youtube.com/@ThreatTalks► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520👕 Receive your Threat Talks T-shirthttps://threat-talks.com/🗺️ Explore the Hack's Route in Detail 🗺️https://threat-talks.com🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ON2IT’s Lieuwe Jan Koning goes one-on-one with AMS-IX CEO Peter van Burgel to expose why the once-open internet is splintering into rival, firewalled regions. Discover the geopolitical forces fueling this cybersecurity trend. Learn the Zero Trust resilience moves CISOs must deploy to stay sovereign in the future of the internet.<strong>Key Topics Covered</strong>• Drivers behind the Splinternet &amp; what they mean for CISOs• Scenario-planning methodology for threat forecasting• Aligning Zero Trust with data-localization mandates• Resilience vs. redundancy: how to build real business continuity• Earth-IX concept: keeping critical flows alive amid fragmentation<strong>Related Content &amp; Resources</strong>• ON2IT Zero Trust Framework → https://on2it.net/zero-trust/• AMS-IX MORE-IP Conference insights → https://www.ams-ix.net/ams• EU Digital Services Act overview → https://digital-strategy.ec.europa.eu/en🔔 <strong>Follow and Support our channel!</strong> 🔔► YOUTUBE: https://youtube.com/@ThreatTalks► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520👕 Receive your Threat Talks T-shirthttps://threat-talks.com/🗺️ Explore the Hack's Route in Detail 🗺️https://threat-talks.com🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Wed, 06 Aug 2025 06:59:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/1971d92c/a833a18f.mp3" length="37927911" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:duration>2371</itunes:duration>
      <itunes:summary>ON2IT’s Lieuwe Jan Koning goes one-on-one with AMS-IX CEO Peter van Burgel to expose why the once-open internet is splintering into rival, firewalled regions. Discover the geopolitical forces fueling this cybersecurity trend. Learn the Zero Trust resilience moves CISOs must deploy to stay sovereign in the future of the internet.Key Topics Covered• Drivers behind the Splinternet &amp;amp; what they mean for CISOs• Scenario-planning methodology for threat forecasting• Aligning Zero Trust with data-localization mandates• Resilience vs. redundancy: how to build real business continuity• Earth-IX concept: keeping critical flows alive amid fragmentationRelated Content &amp;amp; Resources• ON2IT Zero Trust Framework → https://on2it.net/zero-trust/• AMS-IX MORE-IP Conference insights → https://www.ams-ix.net/ams• EU Digital Services Act overview → https://digital-strategy.ec.europa.eu/en🔔 Follow and Support our channel! 🔔► YOUTUBE: https://youtube.com/@ThreatTalks► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520👕 Receive your Threat Talks T-shirthttps://threat-talks.com/🗺️ Explore the Hack's Route in Detail 🗺️https://threat-talks.com🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</itunes:summary>
      <itunes:subtitle>ON2IT’s Lieuwe Jan Koning goes one-on-one with AMS-IX CEO Peter van Burgel to expose why the once-open internet is splintering into rival, firewalled regions. Discover the geopolitical forces fueling this cybersecurity trend. Learn the Zero Trust resilien</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Zero Trust Step 4B: How to Secure Admin Access</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Zero Trust Step 4B: How to Secure Admin Access</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2867620b-9be1-42e1-a33b-83f58fa61db6</guid>
      <link>https://share.transistor.fm/s/412cee41</link>
      <description>
        <![CDATA[<p>Administrative accounts come with serious power – and serious power, comes with serious risk.<br>In part B of our deep dive into step four of Zero Trust (create Zero Trust policy), host Lieuwe Jan Koning and ON2IT Field CTO Rob Maas unpack how to build Zero Trust policies specifically for administrative access.<br> They explore:<br>1) Why admins are a high-value target – and what that means for policy<br>2) How to build secure jump hosts and enforce strict access controls<br>3) What ‘separation of identity’ really looks like in practice<br> <br>🎧 Part B builds on the policy work discussed in part A. Worth a listen if you deal with access management or design policy.<br>Shownotes<br>⁃       Zero Trust Step 1 episode: https://youtu.be/mC66i-tEEFs<br>⁃       Zero Trust Step 2 episode: https://youtu.be/wp0q9aZHuXc<br>⁃       Zero Trust Step 3 episode: https://youtu.be/eGsw2JCnrac<br>⁃       Zero Trust Step 4a episode: https://youtu.be/qT_nqbBEkVw</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Administrative accounts come with serious power – and serious power, comes with serious risk.<br>In part B of our deep dive into step four of Zero Trust (create Zero Trust policy), host Lieuwe Jan Koning and ON2IT Field CTO Rob Maas unpack how to build Zero Trust policies specifically for administrative access.<br> They explore:<br>1) Why admins are a high-value target – and what that means for policy<br>2) How to build secure jump hosts and enforce strict access controls<br>3) What ‘separation of identity’ really looks like in practice<br> <br>🎧 Part B builds on the policy work discussed in part A. Worth a listen if you deal with access management or design policy.<br>Shownotes<br>⁃       Zero Trust Step 1 episode: https://youtu.be/mC66i-tEEFs<br>⁃       Zero Trust Step 2 episode: https://youtu.be/wp0q9aZHuXc<br>⁃       Zero Trust Step 3 episode: https://youtu.be/eGsw2JCnrac<br>⁃       Zero Trust Step 4a episode: https://youtu.be/qT_nqbBEkVw</p>]]>
      </content:encoded>
      <pubDate>Tue, 29 Jul 2025 06:59:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/412cee41/b62c8456.mp3" length="13354813" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:duration>835</itunes:duration>
      <itunes:summary>Administrative accounts come with serious power – and serious power, comes with serious risk.In part B of our deep dive into step four of Zero Trust (create Zero Trust policy), host Lieuwe Jan Koning and ON2IT Field CTO Rob Maas unpack how to build Zero Trust policies specifically for administrative access. They explore:1) Why admins are a high-value target – and what that means for policy2) How to build secure jump hosts and enforce strict access controls3) What ‘separation of identity’ really looks like in practice 🎧 Part B builds on the policy work discussed in part A. Worth a listen if you deal with access management or design policy.Shownotes⁃       Zero Trust Step 1 episode: https://youtu.be/mC66i-tEEFs⁃       Zero Trust Step 2 episode: https://youtu.be/wp0q9aZHuXc⁃       Zero Trust Step 3 episode: https://youtu.be/eGsw2JCnrac⁃       Zero Trust Step 4a episode: https://youtu.be/qT_nqbBEkVw</itunes:summary>
      <itunes:subtitle>Administrative accounts come with serious power – and serious power, comes with serious risk.In part B of our deep dive into step four of Zero Trust (create Zero Trust policy), host Lieuwe Jan Koning and ON2IT Field CTO Rob Maas unpack how to build Zero T</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Mastering Step Four of Zero Trust: Policy Creation</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Mastering Step Four of Zero Trust: Policy Creation</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a54049f3-a656-41d8-9fb5-79e813acbed1</guid>
      <link>https://share.transistor.fm/s/54ca7d9f</link>
      <description>
        <![CDATA[<p>Now that you’ve defined your protect surfaces, mapped your transaction flows and built your Zero Trust architecture, it’s time for step four of Zero Trust: creating policy. In other words, it’s time to turn strategy into actual rules.<br>In this episode of Threat Talks, host Lieuwe Jan and Koning and Field CTO of ON2IT Rob Maas talk through how to create and validate Zero Trust policies.<br>They explore:<br>·      What makes a ‘good’ policy (and why broad strokes won’t cut it)<br>·      How to apply the Kipling method to policy creation<br>·      Why policies need ongoing validation to stay effective<br> <br>Make sure to stay tuned for the second part of this episode as well, where Lieuwe Jan and Rob dive into the specifics of policy for administrative access.<br>Shownotes<br>⁃       Zero Trust Step 1 episode: https://youtu.be/mC66i-tEEFs<br>⁃       Zero Trust Step 2 episode: https://youtu.be/wp0q9aZHuXc<br>⁃       Zero Trust Step 3 episode: https://youtu.be/eGsw2JCnrac</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Now that you’ve defined your protect surfaces, mapped your transaction flows and built your Zero Trust architecture, it’s time for step four of Zero Trust: creating policy. In other words, it’s time to turn strategy into actual rules.<br>In this episode of Threat Talks, host Lieuwe Jan and Koning and Field CTO of ON2IT Rob Maas talk through how to create and validate Zero Trust policies.<br>They explore:<br>·      What makes a ‘good’ policy (and why broad strokes won’t cut it)<br>·      How to apply the Kipling method to policy creation<br>·      Why policies need ongoing validation to stay effective<br> <br>Make sure to stay tuned for the second part of this episode as well, where Lieuwe Jan and Rob dive into the specifics of policy for administrative access.<br>Shownotes<br>⁃       Zero Trust Step 1 episode: https://youtu.be/mC66i-tEEFs<br>⁃       Zero Trust Step 2 episode: https://youtu.be/wp0q9aZHuXc<br>⁃       Zero Trust Step 3 episode: https://youtu.be/eGsw2JCnrac</p>]]>
      </content:encoded>
      <pubDate>Tue, 22 Jul 2025 06:59:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/54ca7d9f/583dd081.mp3" length="24733337" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:duration>1546</itunes:duration>
      <itunes:summary>Now that you’ve defined your protect surfaces, mapped your transaction flows and built your Zero Trust architecture, it’s time for step four of Zero Trust: creating policy. In other words, it’s time to turn strategy into actual rules.In this episode of Threat Talks, host Lieuwe Jan and Koning and Field CTO of ON2IT Rob Maas talk through how to create and validate Zero Trust policies.They explore:·      What makes a ‘good’ policy (and why broad strokes won’t cut it)·      How to apply the Kipling method to policy creation·      Why policies need ongoing validation to stay effective Make sure to stay tuned for the second part of this episode as well, where Lieuwe Jan and Rob dive into the specifics of policy for administrative access.Shownotes⁃       Zero Trust Step 1 episode: https://youtu.be/mC66i-tEEFs⁃       Zero Trust Step 2 episode: https://youtu.be/wp0q9aZHuXc⁃       Zero Trust Step 3 episode: https://youtu.be/eGsw2JCnrac</itunes:summary>
      <itunes:subtitle>Now that you’ve defined your protect surfaces, mapped your transaction flows and built your Zero Trust architecture, it’s time for step four of Zero Trust: creating policy. In other words, it’s time to turn strategy into actual rules.In this episode of Th</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Blockchain in a Post-Quantum World</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Blockchain in a Post-Quantum World</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e15dd934-77df-4a09-94ba-c4af12a1a7bb</guid>
      <link>https://share.transistor.fm/s/9f4e3340</link>
      <description>
        <![CDATA[<p>What does quantum computing mean for blockchain? And how should platforms respond before Q-day becomes reality? In this episode of Threat Talks, ON2IT Field CTO Rob Maas is joined by Jeroen Scheerder, who leads ON2IT's post-quantum cryptography research group. They explore how quantum algorithms interact with current blockchain designs, what makes certain cryptocurrencies more flexible than others, and where we're already seeing movement toward future-ready solutions. ⛓ How does blockchain actually work again? 🔓 What makes classical encryption vulnerable to quantum algorithms? 🧠 Why can't you just “update” Bitcoin? From cryptographic design to real-world limitations, this episode is all about understanding the risks and opportunities in a post-quantum future. Shownotes Post-Quantum Threat to Encryption episode : https://youtu.be/rimW1XJNNLo <br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>What does quantum computing mean for blockchain? And how should platforms respond before Q-day becomes reality? In this episode of Threat Talks, ON2IT Field CTO Rob Maas is joined by Jeroen Scheerder, who leads ON2IT's post-quantum cryptography research group. They explore how quantum algorithms interact with current blockchain designs, what makes certain cryptocurrencies more flexible than others, and where we're already seeing movement toward future-ready solutions. ⛓ How does blockchain actually work again? 🔓 What makes classical encryption vulnerable to quantum algorithms? 🧠 Why can't you just “update” Bitcoin? From cryptographic design to real-world limitations, this episode is all about understanding the risks and opportunities in a post-quantum future. Shownotes Post-Quantum Threat to Encryption episode : https://youtu.be/rimW1XJNNLo <br></p>]]>
      </content:encoded>
      <pubDate>Tue, 15 Jul 2025 06:59:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/9f4e3340/c71c6ddd.mp3" length="28834755" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:duration>1803</itunes:duration>
      <itunes:summary>What does quantum computing mean for blockchain? And how should platforms respond before Q-day becomes reality? In this episode of Threat Talks, ON2IT Field CTO Rob Maas is joined by Jeroen Scheerder, who leads ON2IT's post-quantum cryptography research group. They explore how quantum algorithms interact with current blockchain designs, what makes certain cryptocurrencies more flexible than others, and where we're already seeing movement toward future-ready solutions. ⛓ How does blockchain actually work again? 🔓 What makes classical encryption vulnerable to quantum algorithms? 🧠 Why can't you just “update” Bitcoin? From cryptographic design to real-world limitations, this episode is all about understanding the risks and opportunities in a post-quantum future. Shownotes Post-Quantum Threat to Encryption episode : https://youtu.be/rimW1XJNNLo </itunes:summary>
      <itunes:subtitle>What does quantum computing mean for blockchain? And how should platforms respond before Q-day becomes reality? In this episode of Threat Talks, ON2IT Field CTO Rob Maas is joined by Jeroen Scheerder, who leads ON2IT's post-quantum cryptography research g</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Windows Recall: Convenience or Catastrophe?</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Windows Recall: Convenience or Catastrophe?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1cea8d22-84e4-49ec-b637-a04868f378cf</guid>
      <link>https://share.transistor.fm/s/abd018ed</link>
      <description>
        <![CDATA[<p>Windows Recall is a new feature in Windows 11 that captures screenshots every few seconds and stores them in a local database. It’s designed to help users find what they’ve seen or done: but that convenience may come at a high cost.</p><p><br></p><p>In this episode of Threat Talks, ON2IT Field CTO Rob Maas speaks with security expert Jeroen Scheerder about the real risks of Recall. They break down how the tool works, what data it captures, and why the built-in protections may not be enough.</p><p><br></p><p>In this episode of Threat Talks:</p><p>🧠 How Recall works and what makes it so controversial</p><p>🔍 Why bolted-on security measures leave gaps</p><p>🎯 Which users and organizations are most exposed</p><p><br></p><p>Tune in to hear why Windows Recall is raising red flags and what you need to know to protect your organization.</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Windows Recall is a new feature in Windows 11 that captures screenshots every few seconds and stores them in a local database. It’s designed to help users find what they’ve seen or done: but that convenience may come at a high cost.</p><p><br></p><p>In this episode of Threat Talks, ON2IT Field CTO Rob Maas speaks with security expert Jeroen Scheerder about the real risks of Recall. They break down how the tool works, what data it captures, and why the built-in protections may not be enough.</p><p><br></p><p>In this episode of Threat Talks:</p><p>🧠 How Recall works and what makes it so controversial</p><p>🔍 Why bolted-on security measures leave gaps</p><p>🎯 Which users and organizations are most exposed</p><p><br></p><p>Tune in to hear why Windows Recall is raising red flags and what you need to know to protect your organization.</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 08 Jul 2025 06:59:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/abd018ed/d9ca60f3.mp3" length="22198826" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:duration>1388</itunes:duration>
      <itunes:summary>Windows Recall is a new feature in Windows 11 that captures screenshots every few seconds and stores them in a local database. It’s designed to help users find what they’ve seen or done: but that convenience may come at a high cost.In this episode of Threat Talks, ON2IT Field CTO Rob Maas speaks with security expert Jeroen Scheerder about the real risks of Recall. They break down how the tool works, what data it captures, and why the built-in protections may not be enough.In this episode of Threat Talks:🧠 How Recall works and what makes it so controversial🔍 Why bolted-on security measures leave gaps🎯 Which users and organizations are most exposedTune in to hear why Windows Recall is raising red flags and what you need to know to protect your organization.</itunes:summary>
      <itunes:subtitle>Windows Recall is a new feature in Windows 11 that captures screenshots every few seconds and stores them in a local database. It’s designed to help users find what they’ve seen or done: but that convenience may come at a high cost.In this episode of Thre</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Agentic AI: Hype, Hope, or Real Risk?</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Agentic AI: Hype, Hope, or Real Risk?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">31df4464-0f4b-4b04-a4e0-2520e95c72fd</guid>
      <link>https://share.transistor.fm/s/deb7ec24</link>
      <description>
        <![CDATA[<p>Andy Grotto (founder and director of the Program on Geopolitics, Technology and Governance at Stanford University) puts it plainly: there's a 5% chance that within the next 10 years, AI could rule over humans. That number might sound small, but it's enough to take seriously.</p><p><br>He joins host Lieuwe Jan Koning and guest Davis Hake (Senior Director for Cybersecurity at Venable) as they dive into the technology, governance, and risks behind autonomous AI. From system trustworthiness to liability, and market incentives to regulation, they break down what’s already happening and what needs to happen next.<br>They also discuss how humans will struggle to validate AI outcomes in areas where AI excels, why thoughtful deployment is key, and what it means to be “quick, but not in a hurry.” <br></p><p>Key topics:<br>✅ How to adopt your security and governance to the use of AI<br>🧠 Why applying existing IT risk frameworks is a smart starting point<br>⚖️ How to balance regulation, trust, and innovation<br>Can your organization keep up with AI that moves faster than human oversight?</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Andy Grotto (founder and director of the Program on Geopolitics, Technology and Governance at Stanford University) puts it plainly: there's a 5% chance that within the next 10 years, AI could rule over humans. That number might sound small, but it's enough to take seriously.</p><p><br>He joins host Lieuwe Jan Koning and guest Davis Hake (Senior Director for Cybersecurity at Venable) as they dive into the technology, governance, and risks behind autonomous AI. From system trustworthiness to liability, and market incentives to regulation, they break down what’s already happening and what needs to happen next.<br>They also discuss how humans will struggle to validate AI outcomes in areas where AI excels, why thoughtful deployment is key, and what it means to be “quick, but not in a hurry.” <br></p><p>Key topics:<br>✅ How to adopt your security and governance to the use of AI<br>🧠 Why applying existing IT risk frameworks is a smart starting point<br>⚖️ How to balance regulation, trust, and innovation<br>Can your organization keep up with AI that moves faster than human oversight?</p>]]>
      </content:encoded>
      <pubDate>Tue, 01 Jul 2025 06:59:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/deb7ec24/ac0cbea5.mp3" length="40980652" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:duration>2562</itunes:duration>
      <itunes:summary>Andy Grotto (founder and director of the Program on Geopolitics, Technology and Governance at Stanford University) puts it plainly: there's a 5% chance that within the next 10 years, AI could rule over humans. That number might sound small, but it's enough to take seriously.He joins host Lieuwe Jan Koning and guest Davis Hake (Senior Director for Cybersecurity at Venable) as they dive into the technology, governance, and risks behind autonomous AI. From system trustworthiness to liability, and market incentives to regulation, they break down what’s already happening and what needs to happen next.They also discuss how humans will struggle to validate AI outcomes in areas where AI excels, why thoughtful deployment is key, and what it means to be “quick, but not in a hurry.” Key topics:✅ How to adopt your security and governance to the use of AI🧠 Why applying existing IT risk frameworks is a smart starting point⚖️ How to balance regulation, trust, and innovationCan your organization keep up with AI that moves faster than human oversight?</itunes:summary>
      <itunes:subtitle>Andy Grotto (founder and director of the Program on Geopolitics, Technology and Governance at Stanford University) puts it plainly: there's a 5% chance that within the next 10 years, AI could rule over humans. That number might sound small, but it's enoug</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Zero Trust Step Three: Build a Zero Trust Architecture</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Zero Trust Step Three: Build a Zero Trust Architecture</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b248059b-abc5-4c46-b085-23e8b47865db</guid>
      <link>https://share.transistor.fm/s/9e4966a9</link>
      <description>
        <![CDATA[<p>It’s time to get practical. After identifying protect surfaces and mapping flows, the third step in Zero Trust is about designing the actual architecture.In this episode of Threat Talks, Lieuwe Jan and Rob Maas talk about segmentation, control selection, and why this is the most operational step in your Zero Trust journey.They cover:✅ Why segmentation is one of the most important Zero Trust measures🔒 How to choose and assign technical controls (and what matters most)📄 How frameworks like MITRE ATT&amp;CK, ISO 27001, and the Cyber Kill Chain help map risks to controlsFrom translating compliance requirements into actionable controls to whiteboarding micro-perimeters and network segments, this is where the vision meets the real world.Shownotes:⁃ Zero Trust Step 1 episode: https://youtu.be/mC66i-tEEFs ⁃ Zero Trust Step 2 episode: https://youtu.be/wp0q9aZHuXc ⁃ Rick Howard episode on the Kill Chain https://www.youtube.com/watch: v=GC8z3W2OSwQ&amp;t=1s ⁃ Outlook Web Access Deep Dive episode: https://www.youtube.com/watch?v=Bd5mhPiqT5Q 🔔 Follow and Support our channel! 🔔=== ► YOUTUBE: https://youtube.com/@ThreatTalks► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520👕 Receive your Threat Talks T-shirthttps://threat-talks.com/🗺️ Explore the Hack's Route in Detail 🗺️https://threat-talks.com🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>It’s time to get practical. After identifying protect surfaces and mapping flows, the third step in Zero Trust is about designing the actual architecture.In this episode of Threat Talks, Lieuwe Jan and Rob Maas talk about segmentation, control selection, and why this is the most operational step in your Zero Trust journey.They cover:✅ Why segmentation is one of the most important Zero Trust measures🔒 How to choose and assign technical controls (and what matters most)📄 How frameworks like MITRE ATT&amp;CK, ISO 27001, and the Cyber Kill Chain help map risks to controlsFrom translating compliance requirements into actionable controls to whiteboarding micro-perimeters and network segments, this is where the vision meets the real world.Shownotes:⁃ Zero Trust Step 1 episode: https://youtu.be/mC66i-tEEFs ⁃ Zero Trust Step 2 episode: https://youtu.be/wp0q9aZHuXc ⁃ Rick Howard episode on the Kill Chain https://www.youtube.com/watch: v=GC8z3W2OSwQ&amp;t=1s ⁃ Outlook Web Access Deep Dive episode: https://www.youtube.com/watch?v=Bd5mhPiqT5Q 🔔 Follow and Support our channel! 🔔=== ► YOUTUBE: https://youtube.com/@ThreatTalks► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520👕 Receive your Threat Talks T-shirthttps://threat-talks.com/🗺️ Explore the Hack's Route in Detail 🗺️https://threat-talks.com🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Mon, 23 Jun 2025 06:59:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/9e4966a9/5761cd2e.mp3" length="37494053" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:duration>2344</itunes:duration>
      <itunes:summary>It’s time to get practical. After identifying protect surfaces and mapping flows, the third step in Zero Trust is about designing the actual architecture.In this episode of Threat Talks, Lieuwe Jan and Rob Maas talk about segmentation, control selection, and why this is the most operational step in your Zero Trust journey.They cover:✅ Why segmentation is one of the most important Zero Trust measures🔒 How to choose and assign technical controls (and what matters most)📄 How frameworks like MITRE ATT&amp;amp;CK, ISO 27001, and the Cyber Kill Chain help map risks to controlsFrom translating compliance requirements into actionable controls to whiteboarding micro-perimeters and network segments, this is where the vision meets the real world.Shownotes:⁃ Zero Trust Step 1 episode: https://youtu.be/mC66i-tEEFs ⁃ Zero Trust Step 2 episode: https://youtu.be/wp0q9aZHuXc ⁃ Rick Howard episode on the Kill Chain https://www.youtube.com/watch: v=GC8z3W2OSwQ&amp;amp;t=1s ⁃ Outlook Web Access Deep Dive episode: https://www.youtube.com/watch?v=Bd5mhPiqT5Q 🔔 Follow and Support our channel! 🔔=== ► YOUTUBE: https://youtube.com/@ThreatTalks► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520👕 Receive your Threat Talks T-shirthttps://threat-talks.com/🗺️ Explore the Hack's Route in Detail 🗺️https://threat-talks.com🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</itunes:summary>
      <itunes:subtitle>It’s time to get practical. After identifying protect surfaces and mapping flows, the third step in Zero Trust is about designing the actual architecture.In this episode of Threat Talks, Lieuwe Jan and Rob Maas talk about segmentation, control selection, </itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Without Borders</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Cybersecurity Without Borders</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">60ec2a7b-c9ea-4ddb-9ad3-de437b738195</guid>
      <link>https://share.transistor.fm/s/a6255a78</link>
      <description>
        <![CDATA[<p>From sovereign clouds to Zero Trust, and from cross-border investments to threat intelligence sharing, cooperation between the US and Europe is crucial, but still complex. With differing policies, fragmented markets, and varying strategies, the cyber world remains anything but unified.In this special episode of Threat Talks, Davis Hake (Senior Director for Cybersecurity at Venable) leads a discussion with Lisa Hill (Director of Investor Relations at Shield Capital), Chris Painter (the US’s first cyber ambassador and founder partner of the Cyber Policy Group), Lieuwe Jan Koning (CTO and co-founder of ON2IT cybersecurity) and Peter Brown (former EU official and diplomat). Together, they explore where collaboration is gaining ground and where major obstacles still stand. 🌐 How do the US and EU differ in their approach to Zero Trust and prevention?📊 What role does private sector investment play in advancing national security?🔁 Why is threat intelligence still so difficult to share effectively across borders?Tune in for a grounded conversation that connects regulation, strategy, and industry, and shows how both sides of the Atlantic are navigating today’s cyber challenges.🔔 Follow and Support our channel! 🔔=== ► YOUTUBE: https://youtube.com/@ThreatTalks► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520👕 Receive your Threat Talks T-shirthttps://threat-talks.com/🗺️ Explore the Hack's Route in Detail 🗺️https://threat-talks.com🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>From sovereign clouds to Zero Trust, and from cross-border investments to threat intelligence sharing, cooperation between the US and Europe is crucial, but still complex. With differing policies, fragmented markets, and varying strategies, the cyber world remains anything but unified.In this special episode of Threat Talks, Davis Hake (Senior Director for Cybersecurity at Venable) leads a discussion with Lisa Hill (Director of Investor Relations at Shield Capital), Chris Painter (the US’s first cyber ambassador and founder partner of the Cyber Policy Group), Lieuwe Jan Koning (CTO and co-founder of ON2IT cybersecurity) and Peter Brown (former EU official and diplomat). Together, they explore where collaboration is gaining ground and where major obstacles still stand. 🌐 How do the US and EU differ in their approach to Zero Trust and prevention?📊 What role does private sector investment play in advancing national security?🔁 Why is threat intelligence still so difficult to share effectively across borders?Tune in for a grounded conversation that connects regulation, strategy, and industry, and shows how both sides of the Atlantic are navigating today’s cyber challenges.🔔 Follow and Support our channel! 🔔=== ► YOUTUBE: https://youtube.com/@ThreatTalks► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520👕 Receive your Threat Talks T-shirthttps://threat-talks.com/🗺️ Explore the Hack's Route in Detail 🗺️https://threat-talks.com🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Tue, 17 Jun 2025 06:59:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/a6255a78/9aeec3fc.mp3" length="32986338" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:duration>2062</itunes:duration>
      <itunes:summary>From sovereign clouds to Zero Trust, and from cross-border investments to threat intelligence sharing, cooperation between the US and Europe is crucial, but still complex. With differing policies, fragmented markets, and varying strategies, the cyber world remains anything but unified.In this special episode of Threat Talks, Davis Hake (Senior Director for Cybersecurity at Venable) leads a discussion with Lisa Hill (Director of Investor Relations at Shield Capital), Chris Painter (the US’s first cyber ambassador and founder partner of the Cyber Policy Group), Lieuwe Jan Koning (CTO and co-founder of ON2IT cybersecurity) and Peter Brown (former EU official and diplomat). Together, they explore where collaboration is gaining ground and where major obstacles still stand. 🌐 How do the US and EU differ in their approach to Zero Trust and prevention?📊 What role does private sector investment play in advancing national security?🔁 Why is threat intelligence still so difficult to share effectively across borders?Tune in for a grounded conversation that connects regulation, strategy, and industry, and shows how both sides of the Atlantic are navigating today’s cyber challenges.🔔 Follow and Support our channel! 🔔=== ► YOUTUBE: https://youtube.com/@ThreatTalks► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520👕 Receive your Threat Talks T-shirthttps://threat-talks.com/🗺️ Explore the Hack's Route in Detail 🗺️https://threat-talks.com🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</itunes:summary>
      <itunes:subtitle>From sovereign clouds to Zero Trust, and from cross-border investments to threat intelligence sharing, cooperation between the US and Europe is crucial, but still complex. With differing policies, fragmented markets, and varying strategies, the cyber worl</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Will AI Replace Human Pentesters?</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Will AI Replace Human Pentesters?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6a1505ff-66c2-4125-b575-ddf3a06f0f4b</guid>
      <link>https://share.transistor.fm/s/8bf4ee2c</link>
      <description>
        <![CDATA[<p>AI vs. Human Pentesting: Who Wins?What happens when you try to automate something that’s part science, part art? In an industry rushing to adopt AI for everything from detection to response, the real question is: can a machine truly replace the craft of a human pentester?In this episode of Threat Talks, host Lieuwe Jan Koning is joined by Melanie Rieback, co-founder and CEO of Radically Open Security, and Luca Cipriano, a red teamer and threat intel specialist. Together, they dig into what makes great pentesting work.Melanie explains why her company donates 90% of profits to open source and operates with a not-for-profit model, and how that connects with their mission to support NGOs and civil society groups. Together, she and Luca share their hands-on experience with pentesting and why creativity, gut instinct, and lateral thinking are still crucial in ethical hacking.They discuss:🤖 Can AI outsmart human red teamers?🧠 What makes great hacking truly human?🔍 What’s still too complex for automation?From tool-assisted testing to old-school intuition, this conversation offers a grounded take on the reality of modern pentesting and what AI can’t do (yet).🔔 Follow and Support our channel! 🔔=== ► YOUTUBE: https://youtube.com/@ThreatTalks► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520👕 Receive your Threat Talks T-shirthttps://threat-talks.com/🗺️ Explore the Hack's Route in Detail 🗺️https://threat-talks.com🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>AI vs. Human Pentesting: Who Wins?What happens when you try to automate something that’s part science, part art? In an industry rushing to adopt AI for everything from detection to response, the real question is: can a machine truly replace the craft of a human pentester?In this episode of Threat Talks, host Lieuwe Jan Koning is joined by Melanie Rieback, co-founder and CEO of Radically Open Security, and Luca Cipriano, a red teamer and threat intel specialist. Together, they dig into what makes great pentesting work.Melanie explains why her company donates 90% of profits to open source and operates with a not-for-profit model, and how that connects with their mission to support NGOs and civil society groups. Together, she and Luca share their hands-on experience with pentesting and why creativity, gut instinct, and lateral thinking are still crucial in ethical hacking.They discuss:🤖 Can AI outsmart human red teamers?🧠 What makes great hacking truly human?🔍 What’s still too complex for automation?From tool-assisted testing to old-school intuition, this conversation offers a grounded take on the reality of modern pentesting and what AI can’t do (yet).🔔 Follow and Support our channel! 🔔=== ► YOUTUBE: https://youtube.com/@ThreatTalks► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520👕 Receive your Threat Talks T-shirthttps://threat-talks.com/🗺️ Explore the Hack's Route in Detail 🗺️https://threat-talks.com🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Jun 2025 06:59:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/8bf4ee2c/f5df49fa.mp3" length="38785526" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:duration>2424</itunes:duration>
      <itunes:summary>AI vs. Human Pentesting: Who Wins?What happens when you try to automate something that’s part science, part art? In an industry rushing to adopt AI for everything from detection to response, the real question is: can a machine truly replace the craft of a human pentester?In this episode of Threat Talks, host Lieuwe Jan Koning is joined by Melanie Rieback, co-founder and CEO of Radically Open Security, and Luca Cipriano, a red teamer and threat intel specialist. Together, they dig into what makes great pentesting work.Melanie explains why her company donates 90% of profits to open source and operates with a not-for-profit model, and how that connects with their mission to support NGOs and civil society groups. Together, she and Luca share their hands-on experience with pentesting and why creativity, gut instinct, and lateral thinking are still crucial in ethical hacking.They discuss:🤖 Can AI outsmart human red teamers?🧠 What makes great hacking truly human?🔍 What’s still too complex for automation?From tool-assisted testing to old-school intuition, this conversation offers a grounded take on the reality of modern pentesting and what AI can’t do (yet).🔔 Follow and Support our channel! 🔔=== ► YOUTUBE: https://youtube.com/@ThreatTalks► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520👕 Receive your Threat Talks T-shirthttps://threat-talks.com/🗺️ Explore the Hack's Route in Detail 🗺️https://threat-talks.com🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</itunes:summary>
      <itunes:subtitle>AI vs. Human Pentesting: Who Wins?What happens when you try to automate something that’s part science, part art? In an industry rushing to adopt AI for everything from detection to response, the real question is: can a machine truly replace the craft of a</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Rethinking OT: It's All Just Technology</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Rethinking OT: It's All Just Technology</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">57debf96-12cf-493c-a90a-12615773c6ae</guid>
      <link>https://share.transistor.fm/s/a821951c</link>
      <description>
        <![CDATA[<p>PLCs with default passwords. Devices searchable online. Siloed asset inventories. These OT challenges are common, but they’re also fixable. In this episode of Threat Talks, host Lieuwe Jan Koning sits down with Venable’s Caitlin Clarke and Schneider Electric’s Patrick Ford to discuss why the OT side of your business deserves the same focus and attention as IT. From default passwords to exposed PLCs, they show how these ‘tech risks’ span beyond just OT and IT. They discuss:✅ How to replace "default" thinking on OT security🌐 Spotting internet-facing assets before attackers do🔍 Using CISA’s Installed Base Initiative to locate orphaned tech🤝 Building joint response plans across IT, OT, and governmentOrganizations are getting ahead of risk by building live OT inventories, applying smart controls, and partnering with federal teams to strengthen critical infrastructure. Are you ready to join them?Additional Resources:► Securing critical infrastructure: <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqblhvQTJzcWhpbWRoZ3dDZGNKZTN4VFpZV1hxUXxBQ3Jtc0tsdHl5bzFsVVNnY1ZzX3B3OEdDTmFGNGg0U3ZmSkN2bGlDRzZXdHJvYkIzXzB0S0FzSjlmc1V3QUxRdldlSnVLRE9NM0tudEMxVWMtb0R2MTd6T0dvNXViV054LXkxR3hPcTNfXzQyRHlvQmQ4Vm9rSQ&amp;q=https%3A%2F%2Fwww.se.com%2Fww%2Fen%2Fdownload%2Fdocument%2FSecure_by_Operations_Posture%2F&amp;v=dECAYCEjgb0" rel="nofollow">https://www.se.com/ww/en/download/doc...</a>🔔 Follow and Support our channel! 🔔=== ► YOUTUBE: <a href="https://www.youtube.com/channel/UCKutrBruTCCOd4p9Ob2gebQ">   / @threattalks  </a>► SPOTIFY: <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbWZobmNIa0FGYjBpMXBTXzhETF9XbzN6Snlud3xBQ3Jtc0ttRmNYb21oUTZJam5fOXJMN3Q5a2Y5ZFJ1TmZBaE1KTTAzQXJCa1RRR3duWFVVYlZzcU9TUnNhUFdTOGw1cDVENi1KNV9YX203ekdiaXRGVmNfRlVmX1VkOG1IVXh6eG5yQzVVMmI2X3prS0l3T3VKdw&amp;q=https%3A%2F%2Fopen.spotify.com%2Fshow%2F1SXUyUEndOeKYREvlAeD7E&amp;v=dECAYCEjgb0" rel="nofollow">https://open.spotify.com/show/1SXUyUE...</a>► APPLE: <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbUQ4TXVocnJiMy1lelhwSTJLYk5zSUFXVzhLZ3xBQ3Jtc0tsUDhiQk5fTmpsdWlBSDBFeVdIOW0yU09TSFQyNHJvejBBQ3ZoY1p1YTcxMXdWSzZWYlppVUlyTkZLMDJlM1J4S1lja3F2NWVkTUR6ZDJ3QXM4SGE0ajktWUpYWEswTF8ybWhvOG5kZlFmSmhoak81TQ&amp;q=https%3A%2F%2Fpodcasts.apple.com%2Fus%2Fpodcast%2Fthreat-talks-your-gateway-to-cybersecurity-insights%2Fid1725776520&amp;v=dECAYCEjgb0" rel="nofollow">https://podcasts.apple.com/us/podcast...</a>👕 Receive your Threat Talks T-shirt<a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqa2Y4aVg5eHNHQ0wwd2phc3B3TXYtbDJhaEg0Z3xBQ3Jtc0ttWnBPaDI4REI0Z0RXZTJkcG83NU1XTXJMTGJTNHZZc2xZVUVwUmlHd3NocWxBWlNfVDlPZFlTSm43bDRUN2p1VU9uUWFRbFRGOHIyTlAwcWRrZURxcHRxakhmdUx3N0FUUVpFWktiUE1XZzMxaV9tSQ&amp;q=https%3A%2F%2Fthreat-talks.com%2F&amp;v=dECAYCEjgb0" rel="nofollow">https://threat-talks.com/</a>🗺️ Explore the Hack's Route in Detail 🗺️<a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbktndnlNNFVQS3JucjlzMnBfMnRUMVJ2bmdXd3xBQ3Jtc0tsVDNCcnkzWERvTHBJLVpXNGxXdWdUQ3U0VkNIOVdGWEgzdnlYMS1KWUVBdXlEZHkybzZJVjh5czMyejhfeFF0RzJ2ZjJyUXQ0T1pCRURpRk5nMGtaZnUxWHlDbkJEYVpiSU90OW1Jd000aEpwRzU4cw&amp;q=https%3A%2F%2Fthreat-talks.com%2F&amp;v=dECAYCEjgb0" rel="nofollow">https://threat-talks.com</a>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>PLCs with default passwords. Devices searchable online. Siloed asset inventories. These OT challenges are common, but they’re also fixable. In this episode of Threat Talks, host Lieuwe Jan Koning sits down with Venable’s Caitlin Clarke and Schneider Electric’s Patrick Ford to discuss why the OT side of your business deserves the same focus and attention as IT. From default passwords to exposed PLCs, they show how these ‘tech risks’ span beyond just OT and IT. They discuss:✅ How to replace "default" thinking on OT security🌐 Spotting internet-facing assets before attackers do🔍 Using CISA’s Installed Base Initiative to locate orphaned tech🤝 Building joint response plans across IT, OT, and governmentOrganizations are getting ahead of risk by building live OT inventories, applying smart controls, and partnering with federal teams to strengthen critical infrastructure. Are you ready to join them?Additional Resources:► Securing critical infrastructure: <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqblhvQTJzcWhpbWRoZ3dDZGNKZTN4VFpZV1hxUXxBQ3Jtc0tsdHl5bzFsVVNnY1ZzX3B3OEdDTmFGNGg0U3ZmSkN2bGlDRzZXdHJvYkIzXzB0S0FzSjlmc1V3QUxRdldlSnVLRE9NM0tudEMxVWMtb0R2MTd6T0dvNXViV054LXkxR3hPcTNfXzQyRHlvQmQ4Vm9rSQ&amp;q=https%3A%2F%2Fwww.se.com%2Fww%2Fen%2Fdownload%2Fdocument%2FSecure_by_Operations_Posture%2F&amp;v=dECAYCEjgb0" rel="nofollow">https://www.se.com/ww/en/download/doc...</a>🔔 Follow and Support our channel! 🔔=== ► YOUTUBE: <a href="https://www.youtube.com/channel/UCKutrBruTCCOd4p9Ob2gebQ">   / @threattalks  </a>► SPOTIFY: <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbWZobmNIa0FGYjBpMXBTXzhETF9XbzN6Snlud3xBQ3Jtc0ttRmNYb21oUTZJam5fOXJMN3Q5a2Y5ZFJ1TmZBaE1KTTAzQXJCa1RRR3duWFVVYlZzcU9TUnNhUFdTOGw1cDVENi1KNV9YX203ekdiaXRGVmNfRlVmX1VkOG1IVXh6eG5yQzVVMmI2X3prS0l3T3VKdw&amp;q=https%3A%2F%2Fopen.spotify.com%2Fshow%2F1SXUyUEndOeKYREvlAeD7E&amp;v=dECAYCEjgb0" rel="nofollow">https://open.spotify.com/show/1SXUyUE...</a>► APPLE: <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbUQ4TXVocnJiMy1lelhwSTJLYk5zSUFXVzhLZ3xBQ3Jtc0tsUDhiQk5fTmpsdWlBSDBFeVdIOW0yU09TSFQyNHJvejBBQ3ZoY1p1YTcxMXdWSzZWYlppVUlyTkZLMDJlM1J4S1lja3F2NWVkTUR6ZDJ3QXM4SGE0ajktWUpYWEswTF8ybWhvOG5kZlFmSmhoak81TQ&amp;q=https%3A%2F%2Fpodcasts.apple.com%2Fus%2Fpodcast%2Fthreat-talks-your-gateway-to-cybersecurity-insights%2Fid1725776520&amp;v=dECAYCEjgb0" rel="nofollow">https://podcasts.apple.com/us/podcast...</a>👕 Receive your Threat Talks T-shirt<a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqa2Y4aVg5eHNHQ0wwd2phc3B3TXYtbDJhaEg0Z3xBQ3Jtc0ttWnBPaDI4REI0Z0RXZTJkcG83NU1XTXJMTGJTNHZZc2xZVUVwUmlHd3NocWxBWlNfVDlPZFlTSm43bDRUN2p1VU9uUWFRbFRGOHIyTlAwcWRrZURxcHRxakhmdUx3N0FUUVpFWktiUE1XZzMxaV9tSQ&amp;q=https%3A%2F%2Fthreat-talks.com%2F&amp;v=dECAYCEjgb0" rel="nofollow">https://threat-talks.com/</a>🗺️ Explore the Hack's Route in Detail 🗺️<a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbktndnlNNFVQS3JucjlzMnBfMnRUMVJ2bmdXd3xBQ3Jtc0tsVDNCcnkzWERvTHBJLVpXNGxXdWdUQ3U0VkNIOVdGWEgzdnlYMS1KWUVBdXlEZHkybzZJVjh5czMyejhfeFF0RzJ2ZjJyUXQ0T1pCRURpRk5nMGtaZnUxWHlDbkJEYVpiSU90OW1Jd000aEpwRzU4cw&amp;q=https%3A%2F%2Fthreat-talks.com%2F&amp;v=dECAYCEjgb0" rel="nofollow">https://threat-talks.com</a>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Tue, 03 Jun 2025 06:59:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/a821951c/658bd1b7.mp3" length="47224546" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:duration>2952</itunes:duration>
      <itunes:summary>PLCs with default passwords. Devices searchable online. Siloed asset inventories. These OT challenges are common, but they’re also fixable. In this episode of Threat Talks, host Lieuwe Jan Koning sits down with Venable’s Caitlin Clarke and Schneider Electric’s Patrick Ford to discuss why the OT side of your business deserves the same focus and attention as IT. From default passwords to exposed PLCs, they show how these ‘tech risks’ span beyond just OT and IT. They discuss:✅ How to replace "default" thinking on OT security🌐 Spotting internet-facing assets before attackers do🔍 Using CISA’s Installed Base Initiative to locate orphaned tech🤝 Building joint response plans across IT, OT, and governmentOrganizations are getting ahead of risk by building live OT inventories, applying smart controls, and partnering with federal teams to strengthen critical infrastructure. Are you ready to join them?Additional Resources:► Securing critical infrastructure: https://www.se.com/ww/en/download/doc...🔔 Follow and Support our channel! 🔔=== ► YOUTUBE:    / @threattalks  ► SPOTIFY: https://open.spotify.com/show/1SXUyUE...► APPLE: https://podcasts.apple.com/us/podcast...👕 Receive your Threat Talks T-shirthttps://threat-talks.com/🗺️ Explore the Hack's Route in Detail 🗺️https://threat-talks.com🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</itunes:summary>
      <itunes:subtitle>PLCs with default passwords. Devices searchable online. Siloed asset inventories. These OT challenges are common, but they’re also fixable. In this episode of Threat Talks, host Lieuwe Jan Koning sits down with Venable’s Caitlin Clarke and Schneider Elect</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Zero Trust Step 2: Map Transaction Flows</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Zero Trust Step 2: Map Transaction Flows</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1a80a7f3-fded-43f7-9116-b48ac4247217</guid>
      <link>https://share.transistor.fm/s/3ff9482f</link>
      <description>
        <![CDATA[<p>Once you have defined a few protect surfaces (see: ⁠Step 1 of Zero Trust-video link below⁠), the next step is to start mapping the transaction flows: how these protect surfaces communicate with one another.</p><p> </p><p>Understanding how data travels to, from and around protect surfaces is your next logical movie. Why? Because if you don’t know how your systems talk to each other, you can’t secure them.</p><p> </p><p>In this episode of Threat Talks, host Lieuwe Jan Koning and Field CTO Rob Maas discuss how to identify communication paths between protect surfaces and why this visibility is critical for both risk containment and policy validation. </p><p><br></p><p>They explore:</p><p>✅ How to identify communication paths</p><p>⛕The difference between inbound and outbound traffic (and why this matters)</p><p>🙋🏼‍♂️Why business owners and business context are essential</p><p><br></p><p>Get all the details and</p><p>insights on this second step of Zero Trust: mapping the transaction flows.</p><p><br></p><p>Additional Resources:</p><p>► Zero Trust Step One: https://youtu.be/mC66i-tEEFs<br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Once you have defined a few protect surfaces (see: ⁠Step 1 of Zero Trust-video link below⁠), the next step is to start mapping the transaction flows: how these protect surfaces communicate with one another.</p><p> </p><p>Understanding how data travels to, from and around protect surfaces is your next logical movie. Why? Because if you don’t know how your systems talk to each other, you can’t secure them.</p><p> </p><p>In this episode of Threat Talks, host Lieuwe Jan Koning and Field CTO Rob Maas discuss how to identify communication paths between protect surfaces and why this visibility is critical for both risk containment and policy validation. </p><p><br></p><p>They explore:</p><p>✅ How to identify communication paths</p><p>⛕The difference between inbound and outbound traffic (and why this matters)</p><p>🙋🏼‍♂️Why business owners and business context are essential</p><p><br></p><p>Get all the details and</p><p>insights on this second step of Zero Trust: mapping the transaction flows.</p><p><br></p><p>Additional Resources:</p><p>► Zero Trust Step One: https://youtu.be/mC66i-tEEFs<br></p>]]>
      </content:encoded>
      <pubDate>Tue, 27 May 2025 06:59:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/3ff9482f/a41831ef.mp3" length="12604988" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:duration>788</itunes:duration>
      <itunes:summary>Once you have defined a few protect surfaces (see: ⁠Step 1 of Zero Trust-video link below⁠), the next step is to start mapping the transaction flows: how these protect surfaces communicate with one another. Understanding how data travels to, from and around protect surfaces is your next logical movie. Why? Because if you don’t know how your systems talk to each other, you can’t secure them. In this episode of Threat Talks, host Lieuwe Jan Koning and Field CTO Rob Maas discuss how to identify communication paths between protect surfaces and why this visibility is critical for both risk containment and policy validation. They explore:✅ How to identify communication paths⛕The difference between inbound and outbound traffic (and why this matters)🙋🏼‍♂️Why business owners and business context are essentialGet all the details andinsights on this second step of Zero Trust: mapping the transaction flows.Additional Resources:► Zero Trust Step One: https://youtu.be/mC66i-tEEFs</itunes:summary>
      <itunes:subtitle>Once you have defined a few protect surfaces (see: ⁠Step 1 of Zero Trust-video link below⁠), the next step is to start mapping the transaction flows: how these protect surfaces communicate with one another. Understanding how data travels to, from and arou</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The OT Attack Cyber Kill Chain</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>The OT Attack Cyber Kill Chain</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">05f172a2-6e8e-41c2-ace4-20c1c5fa05c0</guid>
      <link>https://share.transistor.fm/s/ff06caf5</link>
      <description>
        <![CDATA[<p>Now that we know what a PLC, HMI and SCADA are (check out last week’s episode for a refresher if you need one!), we’re ready for part two of our OT deep dive: how does an OT attack work? In this Deep Dive, Rob Maas and Luca Cipriano break down just how complex an OT attack really is. From needing to stay hidden, to requiring access to very specific system settings and blueprints; setting up a successful OT attack (thankfully) is no easy task. But does that mean it’s easier to defend against them?Key topics:⚙️ How IT and OT attacks differ☠️ What the ICS cyber kill chain is🌎 How OT attacks can impact whole nationsJoin Rob and Luca for a discussion on the motivations behind OT attacks, how to bridge the gap between cybersecurity and engineering, and what we can do to prevent these high impact OT attacks.<br></p><p>Additional Resources:</p><p>► Operational Technology for Dummies (Previous Episode): https://youtu.be/Pdp_OCf6npQ</p><p>► Inside Volt Typhoon: China’s Silent Cyber Threat: https://youtu.be/DSalzpj59RI</p><p>► Hack the Boat - cybersecurity on the high seas 🌊 - Threat Talks Cybersecurity Podcast: https://youtu.be/Xa0TJ3eRTCw</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Now that we know what a PLC, HMI and SCADA are (check out last week’s episode for a refresher if you need one!), we’re ready for part two of our OT deep dive: how does an OT attack work? In this Deep Dive, Rob Maas and Luca Cipriano break down just how complex an OT attack really is. From needing to stay hidden, to requiring access to very specific system settings and blueprints; setting up a successful OT attack (thankfully) is no easy task. But does that mean it’s easier to defend against them?Key topics:⚙️ How IT and OT attacks differ☠️ What the ICS cyber kill chain is🌎 How OT attacks can impact whole nationsJoin Rob and Luca for a discussion on the motivations behind OT attacks, how to bridge the gap between cybersecurity and engineering, and what we can do to prevent these high impact OT attacks.<br></p><p>Additional Resources:</p><p>► Operational Technology for Dummies (Previous Episode): https://youtu.be/Pdp_OCf6npQ</p><p>► Inside Volt Typhoon: China’s Silent Cyber Threat: https://youtu.be/DSalzpj59RI</p><p>► Hack the Boat - cybersecurity on the high seas 🌊 - Threat Talks Cybersecurity Podcast: https://youtu.be/Xa0TJ3eRTCw</p>]]>
      </content:encoded>
      <pubDate>Tue, 20 May 2025 06:59:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/ff06caf5/26693b21.mp3" length="23806702" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:duration>1488</itunes:duration>
      <itunes:summary>Now that we know what a PLC, HMI and SCADA are (check out last week’s episode for a refresher if you need one!), we’re ready for part two of our OT deep dive: how does an OT attack work? In this Deep Dive, Rob Maas and Luca Cipriano break down just how complex an OT attack really is. From needing to stay hidden, to requiring access to very specific system settings and blueprints; setting up a successful OT attack (thankfully) is no easy task. But does that mean it’s easier to defend against them?Key topics:⚙️ How IT and OT attacks differ☠️ What the ICS cyber kill chain is🌎 How OT attacks can impact whole nationsJoin Rob and Luca for a discussion on the motivations behind OT attacks, how to bridge the gap between cybersecurity and engineering, and what we can do to prevent these high impact OT attacks.Additional Resources:► Operational Technology for Dummies (Previous Episode): https://youtu.be/Pdp_OCf6npQ► Inside Volt Typhoon: China’s Silent Cyber Threat: https://youtu.be/DSalzpj59RI► Hack the Boat - cybersecurity on the high seas 🌊 - Threat Talks Cybersecurity Podcast: https://youtu.be/Xa0TJ3eRTCw</itunes:summary>
      <itunes:subtitle>Now that we know what a PLC, HMI and SCADA are (check out last week’s episode for a refresher if you need one!), we’re ready for part two of our OT deep dive: how does an OT attack work? In this Deep Dive, Rob Maas and Luca Cipriano break down just how co</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Operational Technology for Dummies</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Operational Technology for Dummies</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a4607d7b-931e-42b2-bd03-d1d24f660ce9</guid>
      <link>https://share.transistor.fm/s/6a9c4c0b</link>
      <description>
        <![CDATA[<p>From heating systems in Ukraine to petrochemical plant safety controls, Operational Technology (OT) systems are the hidden workhorses behind critical infrastructure: and they're wide open to cyber threats.</p><p> </p><p>In this Deep Dive, Rob Maas sits down with Luca Cipriano to break down what OT is, why it’s different from IT, where the two overlap and how we can start securing both before it’s too late. </p><p> </p><p>Key topics:</p><p>⚙️ What OT is (and isn’t)</p><p>📉 Why IT and OT often don’t speak the same language</p><p>🛠️ Real-life OT cyberattacks (hello, FrostyGoop and TRITON)</p><p><br></p><p>Welcome to OT 101: explained in plain language, with a healthy dose of practicality.</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>From heating systems in Ukraine to petrochemical plant safety controls, Operational Technology (OT) systems are the hidden workhorses behind critical infrastructure: and they're wide open to cyber threats.</p><p> </p><p>In this Deep Dive, Rob Maas sits down with Luca Cipriano to break down what OT is, why it’s different from IT, where the two overlap and how we can start securing both before it’s too late. </p><p> </p><p>Key topics:</p><p>⚙️ What OT is (and isn’t)</p><p>📉 Why IT and OT often don’t speak the same language</p><p>🛠️ Real-life OT cyberattacks (hello, FrostyGoop and TRITON)</p><p><br></p><p>Welcome to OT 101: explained in plain language, with a healthy dose of practicality.</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 13 May 2025 06:59:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/6a9c4c0b/f7a33dd3.mp3" length="25082735" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:duration>1568</itunes:duration>
      <itunes:summary>From heating systems in Ukraine to petrochemical plant safety controls, Operational Technology (OT) systems are the hidden workhorses behind critical infrastructure: and they're wide open to cyber threats. In this Deep Dive, Rob Maas sits down with Luca Cipriano to break down what OT is, why it’s different from IT, where the two overlap and how we can start securing both before it’s too late.  Key topics:⚙️ What OT is (and isn’t)📉 Why IT and OT often don’t speak the same language🛠️ Real-life OT cyberattacks (hello, FrostyGoop and TRITON)Welcome to OT 101: explained in plain language, with a healthy dose of practicality.</itunes:summary>
      <itunes:subtitle>From heating systems in Ukraine to petrochemical plant safety controls, Operational Technology (OT) systems are the hidden workhorses behind critical infrastructure: and they're wide open to cyber threats. In this Deep Dive, Rob Maas sits down with Luca C</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>OT’s Hidden Cyber Risks</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>OT’s Hidden Cyber Risks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">17dcc544-ed07-491e-80ca-972cb4206021</guid>
      <link>https://share.transistor.fm/s/baa14e4a</link>
      <description>
        <![CDATA[<p>From ships and cities to hospitals and airports, Operational Technology (OT) keeps the world running. The problem? It was never designed with cybersecurity in mind.</p><p> </p><p>In this episode of Threat Talks, host Karin Muller is joined by TC Hoot (VP of Contracts at TAC) and Luca Cipriano (Threat Intel Specialist at ON2IT) to explore how airports, hospitals, ports, and even water systems can be compromised. </p><p> </p><p><strong>Key topics they tackle:</strong></p><p>🛳️ Why are modern ships, airports, hospitals and even cities targeted?</p><p>🛡️ What makes OT so hard to secure compared to IT?</p><p>✈ What do real-world OT threats look like and how can we defend against them?</p><p> </p><p>If you’ve ever asked “how could a fish tank lead to a casino breach?” or “can someone actually hack an airport’s baggage system?” this one’s for you.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>From ships and cities to hospitals and airports, Operational Technology (OT) keeps the world running. The problem? It was never designed with cybersecurity in mind.</p><p> </p><p>In this episode of Threat Talks, host Karin Muller is joined by TC Hoot (VP of Contracts at TAC) and Luca Cipriano (Threat Intel Specialist at ON2IT) to explore how airports, hospitals, ports, and even water systems can be compromised. </p><p> </p><p><strong>Key topics they tackle:</strong></p><p>🛳️ Why are modern ships, airports, hospitals and even cities targeted?</p><p>🛡️ What makes OT so hard to secure compared to IT?</p><p>✈ What do real-world OT threats look like and how can we defend against them?</p><p> </p><p>If you’ve ever asked “how could a fish tank lead to a casino breach?” or “can someone actually hack an airport’s baggage system?” this one’s for you.</p>]]>
      </content:encoded>
      <pubDate>Tue, 06 May 2025 06:59:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/baa14e4a/d9cb8f63.mp3" length="30393339" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:duration>1900</itunes:duration>
      <itunes:summary>From ships and cities to hospitals and airports, Operational Technology (OT) keeps the world running. The problem? It was never designed with cybersecurity in mind. In this episode of Threat Talks, host Karin Muller is joined by TC Hoot (VP of Contracts at TAC) and Luca Cipriano (Threat Intel Specialist at ON2IT) to explore how airports, hospitals, ports, and even water systems can be compromised.  Key topics they tackle:🛳️ Why are modern ships, airports, hospitals and even cities targeted?🛡️ What makes OT so hard to secure compared to IT?✈ What do real-world OT threats look like and how can we defend against them? If you’ve ever asked “how could a fish tank lead to a casino breach?” or “can someone actually hack an airport’s baggage system?” this one’s for you.</itunes:summary>
      <itunes:subtitle>From ships and cities to hospitals and airports, Operational Technology (OT) keeps the world running. The problem? It was never designed with cybersecurity in mind. In this episode of Threat Talks, host Karin Muller is joined by TC Hoot (VP of Contracts a</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Zero Trust Starts Here</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Zero Trust Starts Here</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d73ea262-539f-46b8-92ec-c25f9eaa9d6f</guid>
      <link>https://share.transistor.fm/s/2abcaea2</link>
      <description>
        <![CDATA[<p>Zero Trust is about more than just IP addresses and firewalls: it’s about understanding what truly matters to your business. </p><p>In step one of Zero Trust: define your protect surface, we focus on how to prioritize what you want to protect, how to avoid common pitfalls, and how to kick off your Zero Trust journey from a solid, business-aligned foundation.</p><p>In this episode of Threat Talks, host Lieuwe Jan Koning and Field CTO Rob Maas get down to the basics of step one of Zero Trust: defining the protect surface. </p><p>They explore:</p><p>✅ Methods for defining protect surfaces </p><p>⛨ Establishing the relevance of each protect surface </p><p>📈 How to align your cybersecurity with business needs and goals</p><p>In this second episode of a multi-part deep dive on Zero Trust, Lieuwe Jan and Rob clarify where to start with Zero Trust implementation, discuss the importance of business and board involvement and explain why starting small is key. </p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Zero Trust is about more than just IP addresses and firewalls: it’s about understanding what truly matters to your business. </p><p>In step one of Zero Trust: define your protect surface, we focus on how to prioritize what you want to protect, how to avoid common pitfalls, and how to kick off your Zero Trust journey from a solid, business-aligned foundation.</p><p>In this episode of Threat Talks, host Lieuwe Jan Koning and Field CTO Rob Maas get down to the basics of step one of Zero Trust: defining the protect surface. </p><p>They explore:</p><p>✅ Methods for defining protect surfaces </p><p>⛨ Establishing the relevance of each protect surface </p><p>📈 How to align your cybersecurity with business needs and goals</p><p>In this second episode of a multi-part deep dive on Zero Trust, Lieuwe Jan and Rob clarify where to start with Zero Trust implementation, discuss the importance of business and board involvement and explain why starting small is key. </p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 29 Apr 2025 06:58:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/2abcaea2/098cf4cf.mp3" length="21223288" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:duration>1327</itunes:duration>
      <itunes:summary>Zero Trust is about more than just IP addresses and firewalls: it’s about understanding what truly matters to your business. In step one of Zero Trust: define your protect surface, we focus on how to prioritize what you want to protect, how to avoid common pitfalls, and how to kick off your Zero Trust journey from a solid, business-aligned foundation.In this episode of Threat Talks, host Lieuwe Jan Koning and Field CTO Rob Maas get down to the basics of step one of Zero Trust: defining the protect surface. They explore:✅ Methods for defining protect surfaces ⛨ Establishing the relevance of each protect surface 📈 How to align your cybersecurity with business needs and goalsIn this second episode of a multi-part deep dive on Zero Trust, Lieuwe Jan and Rob clarify where to start with Zero Trust implementation, discuss the importance of business and board involvement and explain why starting small is key. </itunes:summary>
      <itunes:subtitle>Zero Trust is about more than just IP addresses and firewalls: it’s about understanding what truly matters to your business. In step one of Zero Trust: define your protect surface, we focus on how to prioritize what you want to protect, how to avoid commo</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Zero Trust Demystified: What is Zero Trust Really About?</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Zero Trust Demystified: What is Zero Trust Really About?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">45e5d1fd-e329-474f-8faf-764ec45161e1</guid>
      <link>https://share.transistor.fm/s/5a04fc0e</link>
      <description>
        <![CDATA[<p>Zero Trust is everywhere – but what does this actually mean? Is it a cybersecurity strategy, a set of tactics, a product you can buy, or just clever marketing? </p><p>In this kickoff episode of this Zero Trust series, Lieuwe Jan Koning and Rob Maas explore what Zero Trust actually is, how to think about it strategically, and why it’s not just about identity or buying new tools.</p><p><br></p><p>They discuss: </p><p>✅ Why Zero Trust isn’t a product, and what it actually is </p><p>🗺️ The five steps and four core principles of Zero Trust </p><p>🚧 Why business alignment – and not anything technical – is the hardest part of Zero Trust implementation</p><p>They debunk the most common myths, from “Zero Trust is identity” to “just buy a firewall,” and explain what it takes to embed Zero Trust into business operations. A must-watch, whether you’re just curious, are just starting your Zero Trust journey or are already well underway.</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Zero Trust is everywhere – but what does this actually mean? Is it a cybersecurity strategy, a set of tactics, a product you can buy, or just clever marketing? </p><p>In this kickoff episode of this Zero Trust series, Lieuwe Jan Koning and Rob Maas explore what Zero Trust actually is, how to think about it strategically, and why it’s not just about identity or buying new tools.</p><p><br></p><p>They discuss: </p><p>✅ Why Zero Trust isn’t a product, and what it actually is </p><p>🗺️ The five steps and four core principles of Zero Trust </p><p>🚧 Why business alignment – and not anything technical – is the hardest part of Zero Trust implementation</p><p>They debunk the most common myths, from “Zero Trust is identity” to “just buy a firewall,” and explain what it takes to embed Zero Trust into business operations. A must-watch, whether you’re just curious, are just starting your Zero Trust journey or are already well underway.</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 22 Apr 2025 06:59:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/5a04fc0e/e01f837c.mp3" length="19654721" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:duration>1229</itunes:duration>
      <itunes:summary>Zero Trust is everywhere – but what does this actually mean? Is it a cybersecurity strategy, a set of tactics, a product you can buy, or just clever marketing? In this kickoff episode of this Zero Trust series, Lieuwe Jan Koning and Rob Maas explore what Zero Trust actually is, how to think about it strategically, and why it’s not just about identity or buying new tools.They discuss: ✅ Why Zero Trust isn’t a product, and what it actually is 🗺️ The five steps and four core principles of Zero Trust 🚧 Why business alignment – and not anything technical – is the hardest part of Zero Trust implementationThey debunk the most common myths, from “Zero Trust is identity” to “just buy a firewall,” and explain what it takes to embed Zero Trust into business operations. A must-watch, whether you’re just curious, are just starting your Zero Trust journey or are already well underway.</itunes:summary>
      <itunes:subtitle>Zero Trust is everywhere – but what does this actually mean? Is it a cybersecurity strategy, a set of tactics, a product you can buy, or just clever marketing? In this kickoff episode of this Zero Trust series, Lieuwe Jan Koning and Rob Maas explore what </itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Inside Volt Typhoon: China’s Silent Cyber Threat</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Inside Volt Typhoon: China’s Silent Cyber Threat</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">66834d79-a206-4266-9746-156481ad9b83</guid>
      <link>https://share.transistor.fm/s/f5a6346c</link>
      <description>
        <![CDATA[<p>What happens when a cyber threat actor doesn’t want to make headlines? Volt Typhoon, a state-sponsored group tied to the People’s Republic of China, has been quietly infiltrating Western critical infrastructure, staying under the radar by avoiding malware, using native tools, and taking things slow. </p><p> </p><p>In this episode of Threat Talks, Lieuwe Jan Koning is joined by Rob Maas and Luca Cipriano to break down how these attackers operate and what their endgame might be.</p><p> </p><p>💨 What makes “low and slow” attacks so hard to detect?</p><p>🔧 How do living-off-the-land tactics help attackers blend in?</p><p>📉 What motivations do threat actors like Volt Typhoon have? </p><p> </p><p>Volt Typhoon isn’t just another cyber threat: it’s a sign that the game has changed. If you’re focused on national security, infrastructure, or advanced threat defense, you won’t want to miss this episode. </p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>What happens when a cyber threat actor doesn’t want to make headlines? Volt Typhoon, a state-sponsored group tied to the People’s Republic of China, has been quietly infiltrating Western critical infrastructure, staying under the radar by avoiding malware, using native tools, and taking things slow. </p><p> </p><p>In this episode of Threat Talks, Lieuwe Jan Koning is joined by Rob Maas and Luca Cipriano to break down how these attackers operate and what their endgame might be.</p><p> </p><p>💨 What makes “low and slow” attacks so hard to detect?</p><p>🔧 How do living-off-the-land tactics help attackers blend in?</p><p>📉 What motivations do threat actors like Volt Typhoon have? </p><p> </p><p>Volt Typhoon isn’t just another cyber threat: it’s a sign that the game has changed. If you’re focused on national security, infrastructure, or advanced threat defense, you won’t want to miss this episode. </p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 15 Apr 2025 06:59:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/f5a6346c/2fb35c24.mp3" length="32668758" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:duration>2042</itunes:duration>
      <itunes:summary>What happens when a cyber threat actor doesn’t want to make headlines? Volt Typhoon, a state-sponsored group tied to the People’s Republic of China, has been quietly infiltrating Western critical infrastructure, staying under the radar by avoiding malware, using native tools, and taking things slow.  In this episode of Threat Talks, Lieuwe Jan Koning is joined by Rob Maas and Luca Cipriano to break down how these attackers operate and what their endgame might be. 💨 What makes “low and slow” attacks so hard to detect?🔧 How do living-off-the-land tactics help attackers blend in?📉 What motivations do threat actors like Volt Typhoon have?  Volt Typhoon isn’t just another cyber threat: it’s a sign that the game has changed. If you’re focused on national security, infrastructure, or advanced threat defense, you won’t want to miss this episode. </itunes:summary>
      <itunes:subtitle>What happens when a cyber threat actor doesn’t want to make headlines? Volt Typhoon, a state-sponsored group tied to the People’s Republic of China, has been quietly infiltrating Western critical infrastructure, staying under the radar by avoiding malware</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybercrime-as-a-Service: The Disney+ of the Dark Web</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Cybercrime-as-a-Service: The Disney+ of the Dark Web</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7b1c290e-c417-404f-a627-793de7e6642d</guid>
      <link>https://share.transistor.fm/s/1fe60f66</link>
      <description>
        <![CDATA[<p>Dark Markets are making cybercrime more accessible than ever. Malware, remote access tools, phishing kits, credit cards information: all of it is readily available, and oftentimes available as a service, if you just know where to look. Subscribing to these illicit services is now as easy as signing up for Disney+. </p><p> </p><p>In this Deep Dive, host Rob Maas and special guest, cybersecurity researcher Michele Campobasso, discuss dark markets, and the rise of cybercrime-as-a-service.</p><p> </p><p>Key questions answered in this Deep Dive:</p><p>🕶️ What are dark markets, and how do they work? </p><p>🔑        How do cybercriminals (or intrepid researchers) access these dark markets? </p><p>🎬        How is cybercrime becoming as accessible as a streaming service? </p><p>⚠️  What risks do businesses face from dark markets? </p><p>🔎        What role does threat intelligence plays in monitoring these markets? </p><p> </p><p>With cybercrime as easy to access as a Netflix subscription, Rob and Michele explore how these underground marketplaces operate, how they’re changing the threat landscape, and what organizations can do to protect themselves. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Dark Markets are making cybercrime more accessible than ever. Malware, remote access tools, phishing kits, credit cards information: all of it is readily available, and oftentimes available as a service, if you just know where to look. Subscribing to these illicit services is now as easy as signing up for Disney+. </p><p> </p><p>In this Deep Dive, host Rob Maas and special guest, cybersecurity researcher Michele Campobasso, discuss dark markets, and the rise of cybercrime-as-a-service.</p><p> </p><p>Key questions answered in this Deep Dive:</p><p>🕶️ What are dark markets, and how do they work? </p><p>🔑        How do cybercriminals (or intrepid researchers) access these dark markets? </p><p>🎬        How is cybercrime becoming as accessible as a streaming service? </p><p>⚠️  What risks do businesses face from dark markets? </p><p>🔎        What role does threat intelligence plays in monitoring these markets? </p><p> </p><p>With cybercrime as easy to access as a Netflix subscription, Rob and Michele explore how these underground marketplaces operate, how they’re changing the threat landscape, and what organizations can do to protect themselves. </p>]]>
      </content:encoded>
      <pubDate>Tue, 08 Apr 2025 06:59:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/1fe60f66/df5132c4.mp3" length="29977891" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:duration>1874</itunes:duration>
      <itunes:summary>Dark Markets are making cybercrime more accessible than ever. Malware, remote access tools, phishing kits, credit cards information: all of it is readily available, and oftentimes available as a service, if you just know where to look. Subscribing to these illicit services is now as easy as signing up for Disney+.  In this Deep Dive, host Rob Maas and special guest, cybersecurity researcher Michele Campobasso, discuss dark markets, and the rise of cybercrime-as-a-service. Key questions answered in this Deep Dive:🕶️ What are dark markets, and how do they work? 🔑        How do cybercriminals (or intrepid researchers) access these dark markets? 🎬        How is cybercrime becoming as accessible as a streaming service? ⚠️  What risks do businesses face from dark markets? 🔎        What role does threat intelligence plays in monitoring these markets?  With cybercrime as easy to access as a Netflix subscription, Rob and Michele explore how these underground marketplaces operate, how they’re changing the threat landscape, and what organizations can do to protect themselves. </itunes:summary>
      <itunes:subtitle>Dark Markets are making cybercrime more accessible than ever. Malware, remote access tools, phishing kits, credit cards information: all of it is readily available, and oftentimes available as a service, if you just know where to look. Subscribing to thes</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Inside the Dark Web Economy: $10 for Your Identity &amp; Corporate Access?</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Inside the Dark Web Economy: $10 for Your Identity &amp; Corporate Access?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5e527d07-b542-4c7c-bb9f-76bbd6b63053</guid>
      <link>https://share.transistor.fm/s/bcd55d15</link>
      <description>
        <![CDATA[<p><strong>The Dark Web Economy: Hacks for $10?</strong></p><p>Would you pay $10 for access to a corporate system? Because someone on the dark web already has. In this episode of <strong>Threat Talks</strong>, host <strong>Lieuwe Jan Koning</strong> talks to cybersecurity researcher <strong>Michele Campobasso </strong>about the business of cybercrime. From ransomware services to stolen credentials, the dark web is thriving.</p><p> </p><p>💰 How much is YOUR data worth on the dark web?<br>🚨What’s for sale—and who’s buying?<br>🛒 How is hacking becoming a subscription-based service?</p><p> </p><p>Cybercriminals operate like well-run businesses, offering hacking tools, stolen credentials, and even customer support. But if cybercrime is getting more sophisticated, what can individuals and businesses do to fight back? </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>The Dark Web Economy: Hacks for $10?</strong></p><p>Would you pay $10 for access to a corporate system? Because someone on the dark web already has. In this episode of <strong>Threat Talks</strong>, host <strong>Lieuwe Jan Koning</strong> talks to cybersecurity researcher <strong>Michele Campobasso </strong>about the business of cybercrime. From ransomware services to stolen credentials, the dark web is thriving.</p><p> </p><p>💰 How much is YOUR data worth on the dark web?<br>🚨What’s for sale—and who’s buying?<br>🛒 How is hacking becoming a subscription-based service?</p><p> </p><p>Cybercriminals operate like well-run businesses, offering hacking tools, stolen credentials, and even customer support. But if cybercrime is getting more sophisticated, what can individuals and businesses do to fight back? </p>]]>
      </content:encoded>
      <pubDate>Tue, 01 Apr 2025 06:59:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/bcd55d15/d5cc2742.mp3" length="36422004" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:duration>2277</itunes:duration>
      <itunes:summary>The Dark Web Economy: Hacks for $10?Would you pay $10 for access to a corporate system? Because someone on the dark web already has. In this episode of Threat Talks, host Lieuwe Jan Koning talks to cybersecurity researcher Michele Campobasso about the business of cybercrime. From ransomware services to stolen credentials, the dark web is thriving. 💰 How much is YOUR data worth on the dark web?🚨What’s for sale—and who’s buying?🛒 How is hacking becoming a subscription-based service? Cybercriminals operate like well-run businesses, offering hacking tools, stolen credentials, and even customer support. But if cybercrime is getting more sophisticated, what can individuals and businesses do to fight back? </itunes:summary>
      <itunes:subtitle>The Dark Web Economy: Hacks for $10?Would you pay $10 for access to a corporate system? Because someone on the dark web already has. In this episode of Threat Talks, host Lieuwe Jan Koning talks to cybersecurity researcher Michele Campobasso about the bus</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Why Precision Time Matters in Cybersecurity | PTP vs NTP Explained</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Why Precision Time Matters in Cybersecurity | PTP vs NTP Explained</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c2f8fc43-567c-48e9-8e20-7f14ec628bb0</guid>
      <link>https://share.transistor.fm/s/146161f1</link>
      <description>
        <![CDATA[<p>⏳ <em>What happens when time goeswrong?</em></p><p> </p><p>Time synchronizationis an overlooked but essential part of cybersecurity. A few microseconds ofdrift can lead to failed transactions, inaccurate forensic logs, or evensecurity breaches.</p><p> </p><p>In this episode of <em>ThreatTalks</em>, host Rob Maas (Field CTO, ON2IT) and guest Jan van Boesschoten(Innovation Manager, AMS-IX) discuss:</p><p> </p><p>·      <em>How does time impact cybersecurity, and whathappens when it drifts?</em></p><p>·      <em>Why is NTP no longer sufficient for high-speeddigital transactions?</em></p><p>·      <em>How does Precision Time Protocol (PTP) providemicrosecond accuracy (and why does that matter)?</em></p><p>·      <em>Could time manipulation be an attack vector,and how do organizations mitigate this risk?</em></p><p> </p><p>From financialtransactions to forensic log analysis, knowing <em>exactly</em> when an eventoccurs can make or break an organization’s security posture.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>⏳ <em>What happens when time goeswrong?</em></p><p> </p><p>Time synchronizationis an overlooked but essential part of cybersecurity. A few microseconds ofdrift can lead to failed transactions, inaccurate forensic logs, or evensecurity breaches.</p><p> </p><p>In this episode of <em>ThreatTalks</em>, host Rob Maas (Field CTO, ON2IT) and guest Jan van Boesschoten(Innovation Manager, AMS-IX) discuss:</p><p> </p><p>·      <em>How does time impact cybersecurity, and whathappens when it drifts?</em></p><p>·      <em>Why is NTP no longer sufficient for high-speeddigital transactions?</em></p><p>·      <em>How does Precision Time Protocol (PTP) providemicrosecond accuracy (and why does that matter)?</em></p><p>·      <em>Could time manipulation be an attack vector,and how do organizations mitigate this risk?</em></p><p> </p><p>From financialtransactions to forensic log analysis, knowing <em>exactly</em> when an eventoccurs can make or break an organization’s security posture.</p>]]>
      </content:encoded>
      <pubDate>Tue, 25 Mar 2025 06:59:00 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/146161f1/325d4a3e.mp3" length="21617468" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:duration>1351</itunes:duration>
      <itunes:summary>⏳ What happens when time goeswrong? Time synchronizationis an overlooked but essential part of cybersecurity. A few microseconds ofdrift can lead to failed transactions, inaccurate forensic logs, or evensecurity breaches. In this episode of ThreatTalks, host Rob Maas (Field CTO, ON2IT) and guest Jan van Boesschoten(Innovation Manager, AMS-IX) discuss: ·      How does time impact cybersecurity, and whathappens when it drifts?·      Why is NTP no longer sufficient for high-speeddigital transactions?·      How does Precision Time Protocol (PTP) providemicrosecond accuracy (and why does that matter)?·      Could time manipulation be an attack vector,and how do organizations mitigate this risk? From financialtransactions to forensic log analysis, knowing exactly when an eventoccurs can make or break an organization’s security posture.</itunes:summary>
      <itunes:subtitle>⏳ What happens when time goeswrong? Time synchronizationis an overlooked but essential part of cybersecurity. A few microseconds ofdrift can lead to failed transactions, inaccurate forensic logs, or evensecurity breaches. In this episode of ThreatTalks, h</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Why SSL Decryption Matters</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Why SSL Decryption Matters</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f1325287-8684-4c02-b6e5-e82a275f4b33</guid>
      <link>https://share.transistor.fm/s/414f9c15</link>
      <description>
        <![CDATA[<p>Many organizations hesitate to implement SSL decryption due to concerns over complexity, privacy, and performance. However, the reality is that failing to decrypt means failing to see threats.In this Deep Dive, host Lieuwe Jan Koning and Rob Maas (Field CTO at ON2IT) explore why decrypting SSL traffic is critical for cybersecurity. </p><ul><li>Why is SSL decryption necessary, and what are the risks of ignoring encrypted traffic?</li><li>How do modern malware and attacks leverage encryption to bypass traditional security measures?</li><li>What are the top three things organizations must do to implement SSL decryption effectively?</li><li>Why do only 3.5% of organizations have an active SSL decryption policy, and how can this change?</li></ul><p>Rob Maas explains how decrypting SSL traffic allows security teams to detect and stop threats at an early stage, preventing malware downloads, phishing attempts, and web-based attacks before they reach endpoints.<br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Many organizations hesitate to implement SSL decryption due to concerns over complexity, privacy, and performance. However, the reality is that failing to decrypt means failing to see threats.In this Deep Dive, host Lieuwe Jan Koning and Rob Maas (Field CTO at ON2IT) explore why decrypting SSL traffic is critical for cybersecurity. </p><ul><li>Why is SSL decryption necessary, and what are the risks of ignoring encrypted traffic?</li><li>How do modern malware and attacks leverage encryption to bypass traditional security measures?</li><li>What are the top three things organizations must do to implement SSL decryption effectively?</li><li>Why do only 3.5% of organizations have an active SSL decryption policy, and how can this change?</li></ul><p>Rob Maas explains how decrypting SSL traffic allows security teams to detect and stop threats at an early stage, preventing malware downloads, phishing attempts, and web-based attacks before they reach endpoints.<br></p>]]>
      </content:encoded>
      <pubDate>Tue, 18 Mar 2025 06:59:00 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/414f9c15/a5773d60.mp3" length="46283707" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:duration>2893</itunes:duration>
      <itunes:summary>Many organizations hesitate to implement SSL decryption due to concerns over complexity, privacy, and performance. However, the reality is that failing to decrypt means failing to see threats.In this Deep Dive, host Lieuwe Jan Koning and Rob Maas (Field CTO at ON2IT) explore why decrypting SSL traffic is critical for cybersecurity. Why is SSL decryption necessary, and what are the risks of ignoring encrypted traffic?How do modern malware and attacks leverage encryption to bypass traditional security measures?What are the top three things organizations must do to implement SSL decryption effectively?Why do only 3.5% of organizations have an active SSL decryption policy, and how can this change?Rob Maas explains how decrypting SSL traffic allows security teams to detect and stop threats at an early stage, preventing malware downloads, phishing attempts, and web-based attacks before they reach endpoints.</itunes:summary>
      <itunes:subtitle>Many organizations hesitate to implement SSL decryption due to concerns over complexity, privacy, and performance. However, the reality is that failing to decrypt means failing to see threats.In this Deep Dive, host Lieuwe Jan Koning and Rob Maas (Field C</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Intrusion Kill Chain: Stop Playing Defense with Rick Howard</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Intrusion Kill Chain: Stop Playing Defense with Rick Howard</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2cb4f2ee-66e7-4f23-a3e3-f8e75f5b8627</guid>
      <link>https://share.transistor.fm/s/bc7624ad</link>
      <description>
        <![CDATA[<p>Cybersecurity shouldn’t always be about playing <strong>defense</strong> – it can also be about disrupting attackers before they succeed. In this Deep Dive, host Lieuwe Jan Koning and cybersecurity expert Rick Howard break down the <strong>Intrusion Kill Chain</strong> and the <strong>strategic shift</strong> it introduced in the world of cybersecurity. </p><p><br></p><ul><li> How does the Intrusion Kill Chain flip the script on cyberattacks?</li><li>The 250 active adversary campaigns that security teams must track</li><li>How MITRE ATT&amp;CK and the Diamond Model strengthen modern defense strategies</li><li>Why global governments and intelligence <strong>agencies</strong> aren’t doing more to share cyber threat intelligence</li></ul><p> </p><p>Despite decades of talk about intelligence sharing, <strong>most information is still exchanged manually</strong>, often via spreadsheets. As Howard points out, a <strong>true global threat-sharing framework</strong> could give defenders the upper hand. </p><p>Don’t miss this deep dive into adversary strategies and what they mean for the future of cybersecurity.</p><p><br></p><p>👕 Receive your Threat Talks T-shirt via https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️ via https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Cybersecurity shouldn’t always be about playing <strong>defense</strong> – it can also be about disrupting attackers before they succeed. In this Deep Dive, host Lieuwe Jan Koning and cybersecurity expert Rick Howard break down the <strong>Intrusion Kill Chain</strong> and the <strong>strategic shift</strong> it introduced in the world of cybersecurity. </p><p><br></p><ul><li> How does the Intrusion Kill Chain flip the script on cyberattacks?</li><li>The 250 active adversary campaigns that security teams must track</li><li>How MITRE ATT&amp;CK and the Diamond Model strengthen modern defense strategies</li><li>Why global governments and intelligence <strong>agencies</strong> aren’t doing more to share cyber threat intelligence</li></ul><p> </p><p>Despite decades of talk about intelligence sharing, <strong>most information is still exchanged manually</strong>, often via spreadsheets. As Howard points out, a <strong>true global threat-sharing framework</strong> could give defenders the upper hand. </p><p>Don’t miss this deep dive into adversary strategies and what they mean for the future of cybersecurity.</p><p><br></p><p>👕 Receive your Threat Talks T-shirt via https://threat-talks.com/</p><p>🗺️ Explore the Hack's Route in Detail 🗺️ via https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Tue, 11 Mar 2025 06:59:00 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/bc7624ad/b948b50a.mp3" length="27236922" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:duration>1703</itunes:duration>
      <itunes:summary>Cybersecurity shouldn’t always be about playing defense – it can also be about disrupting attackers before they succeed. In this Deep Dive, host Lieuwe Jan Koning and cybersecurity expert Rick Howard break down the Intrusion Kill Chain and the strategic shift it introduced in the world of cybersecurity.  How does the Intrusion Kill Chain flip the script on cyberattacks?The 250 active adversary campaigns that security teams must trackHow MITRE ATT&amp;amp;CK and the Diamond Model strengthen modern defense strategiesWhy global governments and intelligence agencies aren’t doing more to share cyber threat intelligence Despite decades of talk about intelligence sharing, most information is still exchanged manually, often via spreadsheets. As Howard points out, a true global threat-sharing framework could give defenders the upper hand. Don’t miss this deep dive into adversary strategies and what they mean for the future of cybersecurity.👕 Receive your Threat Talks T-shirt via https://threat-talks.com/🗺️ Explore the Hack's Route in Detail 🗺️ via https://threat-talks.com🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</itunes:summary>
      <itunes:subtitle>Cybersecurity shouldn’t always be about playing defense – it can also be about disrupting attackers before they succeed. In this Deep Dive, host Lieuwe Jan Koning and cybersecurity expert Rick Howard break down the Intrusion Kill Chain and the strategic s</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Reboot of Strategy: Back to cybersecurity basics with Rick Howard</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Reboot of Strategy: Back to cybersecurity basics with Rick Howard</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e7f206a9-1e39-431c-b7db-2c0ee83c06f5</guid>
      <link>https://share.transistor.fm/s/dc018a50</link>
      <description>
        <![CDATA[<p>I think, therefore I am, is René Descartes’first principle. But how does that relate to cybersecurity? </p><p> </p><p>In this episode of Threat Talks, hostLieuwe Jan Koning is joined by Rick Howard – former Commander of the US Army’sComputer Emergency Response Team and former CSO of Palo Alto Networks – todiscuss the first principle of cybersecurity. </p><p> </p><p>❓What’s the difference between cybersecurity strategy and tactics?</p><p>❓How come some random geezers are better at cybersecurity forecastingthan industry pros?</p><p>❓Is resilience the ultimate cybersecurity strategy?</p><p>❓Why does Rick Howard think Zero Trust is a passive strategy?  </p><p> </p><p>And for the book lovers amongst us – over500 cybersecurity books are published each year. Wanna know which are worthyour time? </p><p> </p><p>Rick Howard’s Cybersecurity Canon has gotyou covered: <a href="https://icdt.osu.edu/about-cybersecurity-canon">https://icdt.osu.edu/about-cybersecurity-canon</a></p><p>👕 Receive your Threat Talks T-shirthttps://threat-talks.com/🗺️ Explore the Hack's Route in Detail 🗺️https://threat-talks.com🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>I think, therefore I am, is René Descartes’first principle. But how does that relate to cybersecurity? </p><p> </p><p>In this episode of Threat Talks, hostLieuwe Jan Koning is joined by Rick Howard – former Commander of the US Army’sComputer Emergency Response Team and former CSO of Palo Alto Networks – todiscuss the first principle of cybersecurity. </p><p> </p><p>❓What’s the difference between cybersecurity strategy and tactics?</p><p>❓How come some random geezers are better at cybersecurity forecastingthan industry pros?</p><p>❓Is resilience the ultimate cybersecurity strategy?</p><p>❓Why does Rick Howard think Zero Trust is a passive strategy?  </p><p> </p><p>And for the book lovers amongst us – over500 cybersecurity books are published each year. Wanna know which are worthyour time? </p><p> </p><p>Rick Howard’s Cybersecurity Canon has gotyou covered: <a href="https://icdt.osu.edu/about-cybersecurity-canon">https://icdt.osu.edu/about-cybersecurity-canon</a></p><p>👕 Receive your Threat Talks T-shirthttps://threat-talks.com/🗺️ Explore the Hack's Route in Detail 🗺️https://threat-talks.com🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Tue, 04 Mar 2025 08:00:00 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/dc018a50/5bc8671a.mp3" length="47953911" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:duration>2998</itunes:duration>
      <itunes:summary>I think, therefore I am, is René Descartes’first principle. But how does that relate to cybersecurity?  In this episode of Threat Talks, hostLieuwe Jan Koning is joined by Rick Howard – former Commander of the US Army’sComputer Emergency Response Team and former CSO of Palo Alto Networks – todiscuss the first principle of cybersecurity.  ❓What’s the difference between cybersecurity strategy and tactics?❓How come some random geezers are better at cybersecurity forecastingthan industry pros?❓Is resilience the ultimate cybersecurity strategy?❓Why does Rick Howard think Zero Trust is a passive strategy?   And for the book lovers amongst us – over500 cybersecurity books are published each year. Wanna know which are worthyour time?  Rick Howard’s Cybersecurity Canon has gotyou covered: https://icdt.osu.edu/about-cybersecurity-canon👕 Receive your Threat Talks T-shirthttps://threat-talks.com/🗺️ Explore the Hack's Route in Detail 🗺️https://threat-talks.com🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</itunes:summary>
      <itunes:subtitle>I think, therefore I am, is René Descartes’first principle. But how does that relate to cybersecurity?  In this episode of Threat Talks, hostLieuwe Jan Koning is joined by Rick Howard – former Commander of the US Army’sComputer Emergency Response Team and</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Rising Threat of Deepfakes - Threat Talks Cybersecurity Podcast</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>The Rising Threat of Deepfakes - Threat Talks Cybersecurity Podcast</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">56555e9c-c897-463b-8c13-2fab1426188e</guid>
      <link>https://share.transistor.fm/s/d9b1c11f</link>
      <description>
        <![CDATA[<p>🚨 Can you still trust what you see? 🚨</p><p><br></p><p>Deepfakes aren’t just for entertainment anymore: they’re now an increasingly powerful tool for cybercriminals. With AI advancing rapidly, attackers can clone voices, fake identities, and manipulate live video in real time.</p><p>In this episode of Threat Talks, we explore how deepfake scams have already cost companies millions. </p><p>From CEO voice fraud to bypassing identity checks, the risks are rising.</p><p>👥 How do deepfakes work?</p><p>👥 What makes them so dangerous?</p><p>👥 How can organizations protect themselves?</p><p><br></p><p>Join host Rob Maas and ON2IT SOC analyst Yuri Wit as they break down the latest deepfake threats and what you can do to stay ahead.</p><p>👕 Receive your Threat Talks T-shirt https://threat-talks.com/🗺️ Explore the Hack's Route in Detail </p><p>🗺️https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>🚨 Can you still trust what you see? 🚨</p><p><br></p><p>Deepfakes aren’t just for entertainment anymore: they’re now an increasingly powerful tool for cybercriminals. With AI advancing rapidly, attackers can clone voices, fake identities, and manipulate live video in real time.</p><p>In this episode of Threat Talks, we explore how deepfake scams have already cost companies millions. </p><p>From CEO voice fraud to bypassing identity checks, the risks are rising.</p><p>👥 How do deepfakes work?</p><p>👥 What makes them so dangerous?</p><p>👥 How can organizations protect themselves?</p><p><br></p><p>Join host Rob Maas and ON2IT SOC analyst Yuri Wit as they break down the latest deepfake threats and what you can do to stay ahead.</p><p>👕 Receive your Threat Talks T-shirt https://threat-talks.com/🗺️ Explore the Hack's Route in Detail </p><p>🗺️https://threat-talks.com</p><p>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Tue, 25 Feb 2025 08:00:00 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/d9b1c11f/61c6f867.mp3" length="19518060" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:duration>1220</itunes:duration>
      <itunes:summary>🚨 Can you still trust what you see? 🚨Deepfakes aren’t just for entertainment anymore: they’re now an increasingly powerful tool for cybercriminals. With AI advancing rapidly, attackers can clone voices, fake identities, and manipulate live video in real time.In this episode of Threat Talks, we explore how deepfake scams have already cost companies millions. From CEO voice fraud to bypassing identity checks, the risks are rising.👥 How do deepfakes work?👥 What makes them so dangerous?👥 How can organizations protect themselves?Join host Rob Maas and ON2IT SOC analyst Yuri Wit as they break down the latest deepfake threats and what you can do to stay ahead.👕 Receive your Threat Talks T-shirt https://threat-talks.com/🗺️ Explore the Hack's Route in Detail 🗺️https://threat-talks.com🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</itunes:summary>
      <itunes:subtitle>🚨 Can you still trust what you see? 🚨Deepfakes aren’t just for entertainment anymore: they’re now an increasingly powerful tool for cybercriminals. With AI advancing rapidly, attackers can clone voices, fake identities, and manipulate live video in real t</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Post-Quantum Threat to Encryption: Are You Ready? - Threat Talks Cybersecurity Podcast</title>
      <itunes:season>3</itunes:season>
      <podcast:season>3</podcast:season>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>Post-Quantum Threat to Encryption: Are You Ready? - Threat Talks Cybersecurity Podcast</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">bd571e89-a826-4edb-9e88-7a2aa8cc1d24</guid>
      <link>https://share.transistor.fm/s/d520fba1</link>
      <description>
        <![CDATA[<p>Quantum computing promises unprecedented computational power, but it also threatens the encryption standards we trust today.</p><p>In this episode of Threat Talks, Jeroen Scheerder from ON2IT delves into post-quantum cryptography and answers key questions:</p><ul><li>What is Quantum Computing?</li><li>Why does it challenge RSA and other encryption standards?</li><li>What is Q-Day, and when will it happen?</li><li>How can companies prepare for the post-quantum era?</li></ul><p><br></p><p><strong>🎯 Key Takeaways</strong></p><p>🛡 Data minimization and post-quantum cryptographic algorithms are essential.</p><p>📈 Start planning your migration strategy now.</p><p>🚨 Don’t procrastinate – quantum computing is coming sooner than you think.</p><p>💻 More Resources: Visit Threat-Talks.com to stay informed on quantum computing and its impact on cybersecurity.</p><p><br></p><p>📢 Like, Subscribe &amp; Share – Help us spread the word about preparing for the quantum age!=== ► YOUTUBE: https://youtube.com/@ThreatTalks► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520👕 Receive your Threat Talks T-shirt<a href="https://threat-talks.com/post-quantum-threat-to-encryption/" rel="ugc noopener noreferrer">https://threat-talks.com/post-quantum-threat-to-encryption/</a>🗺️ Explore the Hack's Route in Detail 🗺️<a href="https://threat-talks.com/downloads/" rel="ugc noopener noreferrer">https://threat-talks.com/downloads/</a>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Quantum computing promises unprecedented computational power, but it also threatens the encryption standards we trust today.</p><p>In this episode of Threat Talks, Jeroen Scheerder from ON2IT delves into post-quantum cryptography and answers key questions:</p><ul><li>What is Quantum Computing?</li><li>Why does it challenge RSA and other encryption standards?</li><li>What is Q-Day, and when will it happen?</li><li>How can companies prepare for the post-quantum era?</li></ul><p><br></p><p><strong>🎯 Key Takeaways</strong></p><p>🛡 Data minimization and post-quantum cryptographic algorithms are essential.</p><p>📈 Start planning your migration strategy now.</p><p>🚨 Don’t procrastinate – quantum computing is coming sooner than you think.</p><p>💻 More Resources: Visit Threat-Talks.com to stay informed on quantum computing and its impact on cybersecurity.</p><p><br></p><p>📢 Like, Subscribe &amp; Share – Help us spread the word about preparing for the quantum age!=== ► YOUTUBE: https://youtube.com/@ThreatTalks► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520👕 Receive your Threat Talks T-shirt<a href="https://threat-talks.com/post-quantum-threat-to-encryption/" rel="ugc noopener noreferrer">https://threat-talks.com/post-quantum-threat-to-encryption/</a>🗺️ Explore the Hack's Route in Detail 🗺️<a href="https://threat-talks.com/downloads/" rel="ugc noopener noreferrer">https://threat-talks.com/downloads/</a>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Tue, 18 Feb 2025 08:00:00 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/d520fba1/2ebdf86f.mp3" length="20514493" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/sS_QTcAynb7ZcYAt3_2jwQwmEKOUmmmb1I0Ohjt1yiA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yZTA4/MDI2NDM2YzMyZmJi/OGI0NjgwZGU1Zjc3/MmE2My5qcGc.jpg"/>
      <itunes:duration>1283</itunes:duration>
      <itunes:summary>Quantum computing promises unprecedented computational power, but it also threatens the encryption standards we trust today.In this episode of Threat Talks, Jeroen Scheerder from ON2IT delves into post-quantum cryptography and answers key questions:What is Quantum Computing?Why does it challenge RSA and other encryption standards?What is Q-Day, and when will it happen?How can companies prepare for the post-quantum era?🎯 Key Takeaways🛡 Data minimization and post-quantum cryptographic algorithms are essential.📈 Start planning your migration strategy now.🚨 Don’t procrastinate – quantum computing is coming sooner than you think.💻 More Resources: Visit Threat-Talks.com to stay informed on quantum computing and its impact on cybersecurity.📢 Like, Subscribe &amp;amp; Share – Help us spread the word about preparing for the quantum age!=== ► YOUTUBE: https://youtube.com/@ThreatTalks► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520👕 Receive your Threat Talks T-shirthttps://threat-talks.com/post-quantum-threat-to-encryption/🗺️ Explore the Hack's Route in Detail 🗺️https://threat-talks.com/downloads/🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</itunes:summary>
      <itunes:subtitle>Quantum computing promises unprecedented computational power, but it also threatens the encryption standards we trust today.In this episode of Threat Talks, Jeroen Scheerder from ON2IT delves into post-quantum cryptography and answers key questions:What i</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Breaking the Defenses: EDR Bypass - Threat Talks Cybersecurity Podcast</title>
      <itunes:season>3</itunes:season>
      <podcast:season>3</podcast:season>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>Breaking the Defenses: EDR Bypass - Threat Talks Cybersecurity Podcast</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e4c8dbe6-b240-46cc-b052-5aadee4ee499</guid>
      <link>https://share.transistor.fm/s/6abea2a3</link>
      <description>
        <![CDATA[<p>🔒 Are endpoint protection solutions enough to safeguard your organization?</p><p>In this episode of Threat Talks – The Deep Dive, Rob Maas hosts Luca Cipriano, ON2IT’s Cyber Threat Specialist, to uncover the truth.</p><p><br></p><p><strong>Learn</strong>✅ The differences between AVs, EDRs, and XDRs</p><p>✅ Common bypass techniques used by attackers</p><p>✅ Why defense-in-depth and Zero Trust are must-haves for any cybersecurity strategy</p><p><br></p><p><strong>💡 Key Insights</strong></p><ul><li>EDRs are essential but not invincible</li><li>Combining smart tools with robust security practices is the winning strategy</li></ul><p><br></p><p>📩 Have questions or thoughts?</p><p>Reach out at team@threat-talks.com!</p><p>🎙️<strong> Follow Threat Talks for weekly cybersecurity insights.</strong>=== ► YOUTUBE: https://youtube.com/@ThreatTalks► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520👕 Receive your Threat Talks T-shirt<a href="https://threat-talks.com/breaking-the-defenses-edr-bypass/" rel="ugc noopener noreferrer">https://threat-talks.com/breaking-the-defenses-edr-bypass/</a>🗺️ Explore the Hack's Route in Detail 🗺️<a href="https://threat-talks.com/downloads/" rel="ugc noopener noreferrer">https://threat-talks.com/downloads/</a>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>🔒 Are endpoint protection solutions enough to safeguard your organization?</p><p>In this episode of Threat Talks – The Deep Dive, Rob Maas hosts Luca Cipriano, ON2IT’s Cyber Threat Specialist, to uncover the truth.</p><p><br></p><p><strong>Learn</strong>✅ The differences between AVs, EDRs, and XDRs</p><p>✅ Common bypass techniques used by attackers</p><p>✅ Why defense-in-depth and Zero Trust are must-haves for any cybersecurity strategy</p><p><br></p><p><strong>💡 Key Insights</strong></p><ul><li>EDRs are essential but not invincible</li><li>Combining smart tools with robust security practices is the winning strategy</li></ul><p><br></p><p>📩 Have questions or thoughts?</p><p>Reach out at team@threat-talks.com!</p><p>🎙️<strong> Follow Threat Talks for weekly cybersecurity insights.</strong>=== ► YOUTUBE: https://youtube.com/@ThreatTalks► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520👕 Receive your Threat Talks T-shirt<a href="https://threat-talks.com/breaking-the-defenses-edr-bypass/" rel="ugc noopener noreferrer">https://threat-talks.com/breaking-the-defenses-edr-bypass/</a>🗺️ Explore the Hack's Route in Detail 🗺️<a href="https://threat-talks.com/downloads/" rel="ugc noopener noreferrer">https://threat-talks.com/downloads/</a>🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Tue, 11 Feb 2025 08:00:00 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/6abea2a3/c240edbf.mp3" length="24261481" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/iOXE2insSJ1PzJxk7q82_1bwfhqIssZuDrWogcZoS6I/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jZjg0/ZTFkOWQxNmYwODg0/MzFjNmNkMDkwYWE3/ZDc1My5qcGc.jpg"/>
      <itunes:duration>1517</itunes:duration>
      <itunes:summary>🔒 Are endpoint protection solutions enough to safeguard your organization?In this episode of Threat Talks – The Deep Dive, Rob Maas hosts Luca Cipriano, ON2IT’s Cyber Threat Specialist, to uncover the truth.Learn✅ The differences between AVs, EDRs, and XDRs✅ Common bypass techniques used by attackers✅ Why defense-in-depth and Zero Trust are must-haves for any cybersecurity strategy💡 Key InsightsEDRs are essential but not invincibleCombining smart tools with robust security practices is the winning strategy📩 Have questions or thoughts?Reach out at team@threat-talks.com!🎙️ Follow Threat Talks for weekly cybersecurity insights.=== ► YOUTUBE: https://youtube.com/@ThreatTalks► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520👕 Receive your Threat Talks T-shirthttps://threat-talks.com/breaking-the-defenses-edr-bypass/🗺️ Explore the Hack's Route in Detail 🗺️https://threat-talks.com/downloads/🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</itunes:summary>
      <itunes:subtitle>🔒 Are endpoint protection solutions enough to safeguard your organization?In this episode of Threat Talks – The Deep Dive, Rob Maas hosts Luca Cipriano, ON2IT’s Cyber Threat Specialist, to uncover the truth.Learn✅ The differences between AVs, EDRs, and XD</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Inside the Hackers Mind with Tom van de Wiele - Threat Talks Cybersecurity Podcast</title>
      <itunes:season>3</itunes:season>
      <podcast:season>3</podcast:season>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Inside the Hackers Mind with Tom van de Wiele - Threat Talks Cybersecurity Podcast</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e6577e30-2017-4dd3-a4c5-abf23fee3bcd</guid>
      <link>https://share.transistor.fm/s/5f457f86</link>
      <description>
        <![CDATA[<p>Ever wondered what it’s like to see cybersecurity through a hacker’s eyes? In this episode of Threat Talks, Lieuwe Jan Koning talks with Tom van der Wiele, ethical hacker and founder of Hacker Minded, about how cybercriminals operate and how businesses can defend themselves.</p>
<p><br></p>
<p>📌 What You’ll Learn:</p>
<ul>
 <li>The psychology and strategies of hackers•	How AI enhances attacks and its implications for defenders</li>
 <li>Common vulnerabilities organizations overlook</li>
  <li>Why Zero Trust is critical for modern security</li>
  <li>Building a proactive security culture in your organization</li>
</ul>
<p><br></p>
<p>With over two decades of experience, Tom offers unique perspectives on staying one step ahead in the ever-evolving world of cybersecurity.</p>
<p>🎯 Don’t forget to like, share, and subscribe to stay informed on the latest cybersecurity insights. New episodes every Tuesday!
=== 
► YOUTUBE: https://youtube.com/@ThreatTalks
► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E
► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520

👕 Receive your Threat Talks T-shirt
<a href="https://threat-talks.com/inside-the-hackers-mind/" rel="noopener noreferer">https://threat-talks.com/inside-the-hackers-mind/</a></p>
<p>
🗺️ Explore the Hack's Route in Detail 🗺️
<a href="https://threat-talks.com/downloads/" rel="noopener noreferer">https://threat-talks.com/downloads/</a>

🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Ever wondered what it’s like to see cybersecurity through a hacker’s eyes? In this episode of Threat Talks, Lieuwe Jan Koning talks with Tom van der Wiele, ethical hacker and founder of Hacker Minded, about how cybercriminals operate and how businesses can defend themselves.</p>
<p><br></p>
<p>📌 What You’ll Learn:</p>
<ul>
 <li>The psychology and strategies of hackers•	How AI enhances attacks and its implications for defenders</li>
 <li>Common vulnerabilities organizations overlook</li>
  <li>Why Zero Trust is critical for modern security</li>
  <li>Building a proactive security culture in your organization</li>
</ul>
<p><br></p>
<p>With over two decades of experience, Tom offers unique perspectives on staying one step ahead in the ever-evolving world of cybersecurity.</p>
<p>🎯 Don’t forget to like, share, and subscribe to stay informed on the latest cybersecurity insights. New episodes every Tuesday!
=== 
► YOUTUBE: https://youtube.com/@ThreatTalks
► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E
► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520

👕 Receive your Threat Talks T-shirt
<a href="https://threat-talks.com/inside-the-hackers-mind/" rel="noopener noreferer">https://threat-talks.com/inside-the-hackers-mind/</a></p>
<p>
🗺️ Explore the Hack's Route in Detail 🗺️
<a href="https://threat-talks.com/downloads/" rel="noopener noreferer">https://threat-talks.com/downloads/</a>

🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Tue, 04 Feb 2025 08:00:00 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/5f457f86/ce734674.mp3" length="56482803" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/sTyg1WSWBVksL-nLUOSWBP1cAvB4xj5AVyWzFV7PqN0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wYjU3/NjNhOTBhNTVmMDY3/MmFhMjcxNWZlMmI2/ZGY3ZC5qcGc.jpg"/>
      <itunes:duration>3531</itunes:duration>
      <itunes:summary>Ever wondered what it’s like to see cybersecurity through a hacker’s eyes? In this episode of Threat Talks, Lieuwe Jan Koning talks with Tom van der Wiele, ethical hacker and founder of Hacker Minded, about how cybercriminals operate and how businesses can defend themselves.

📌 What You’ll Learn:

 The psychology and strategies of hackers•	How AI enhances attacks and its implications for defenders
 Common vulnerabilities organizations overlook
  Why Zero Trust is critical for modern security
  Building a proactive security culture in your organization


With over two decades of experience, Tom offers unique perspectives on staying one step ahead in the ever-evolving world of cybersecurity.
🎯 Don’t forget to like, share, and subscribe to stay informed on the latest cybersecurity insights. New episodes every Tuesday!
=== 
► YOUTUBE: https://youtube.com/@ThreatTalks
► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E
► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520

👕 Receive your Threat Talks T-shirt
https://threat-talks.com/inside-the-hackers-mind/

🗺️ Explore the Hack's Route in Detail 🗺️
https://threat-talks.com/downloads/

🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</itunes:summary>
      <itunes:subtitle>Ever wondered what it’s like to see cybersecurity through a hacker’s eyes? In this episode of Threat Talks, Lieuwe Jan Koning talks with Tom van der Wiele, ethical hacker and founder of Hacker Minded, about how cybercriminals operate and how businesses ca</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Salt Typhoon: How Nine Telecom Providers were Compromised - Threat Talks Cybersecurity Podcast - Threat Talks Cybersecurity Podcast</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Salt Typhoon: How Nine Telecom Providers were Compromised - Threat Talks Cybersecurity Podcast - Threat Talks Cybersecurity Podcast</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8c395c1f-5308-4797-ab62-5b6513517f9d</guid>
      <link>https://share.transistor.fm/s/c2335be2</link>
      <description>
        <![CDATA[<p><strong>Salt Typhoon: Inside the Coordinated Breach of Nine Telecom Providers</strong></p>
<p>
A sweeping cyberattack, known as Salt Typhoon, has exposed the vulnerabilities of nine major telcos, leaving sensitive communications and surveillance data in the hands of attackers. How did this happen, and what lessons can we learn?</p>
<p>
In this Threat Talks Deep Dive, host Lieuwe Jan Koning teams up with ON2IT’s Rob Maas (Field CTO) and Jeroen Scheerder (Security Researcher) to dissect every aspect of this high-profile breach.
</p>
<p>🔍 What you’ll learn:</p>
<ul>
 <li>How attackers exploited known vulnerabilities in Exchange servers, VPNs, and firewalls to infiltrate systems.</li>
 <li>The risks associated with lawful interception systems and the exposure of call detail records (CDRs).</li>
  <li>Why legacy infrastructure remains a significant cybersecurity challenge for telecom providers.</li>
  <li>Actionable steps organizations can take to enhance defenses, including segmentation, behavioral monitoring, and Zero Trust frameworks.</li>
</ul>
<p><br></p>
<p>This episode dives into the attack’s technical anatomy, discusses its implications for both governments and private organizations, and explores how individuals can secure their communications in an era of increasing surveillance.</p>
<p>Join us to understand how Salt Typhoon unfolded—and what it means for the future of telecom security.</p>
<p>
🔔 Follow and Support our channel! 🔔
=== 
► YOUTUBE: https://youtube.com/@ThreatTalks
► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E
► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520

👕 Receive your Threat Talks T-shirt
<a href="https://threat-talks.com/salt-typhoon-how-nine-telcos-were-compromised/" rel="noopener noreferer">https://threat-talks.com/salt-typhoon-how-nine-telcos-were-compromised/
</a>
🗺️ Explore the Hack's Route in Detail 🗺️
<a href="https://threat-talks.com/downloads/" rel="noopener noreferer">https://threat-talks.com/downloads/</a></p>
<p>
🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Salt Typhoon: Inside the Coordinated Breach of Nine Telecom Providers</strong></p>
<p>
A sweeping cyberattack, known as Salt Typhoon, has exposed the vulnerabilities of nine major telcos, leaving sensitive communications and surveillance data in the hands of attackers. How did this happen, and what lessons can we learn?</p>
<p>
In this Threat Talks Deep Dive, host Lieuwe Jan Koning teams up with ON2IT’s Rob Maas (Field CTO) and Jeroen Scheerder (Security Researcher) to dissect every aspect of this high-profile breach.
</p>
<p>🔍 What you’ll learn:</p>
<ul>
 <li>How attackers exploited known vulnerabilities in Exchange servers, VPNs, and firewalls to infiltrate systems.</li>
 <li>The risks associated with lawful interception systems and the exposure of call detail records (CDRs).</li>
  <li>Why legacy infrastructure remains a significant cybersecurity challenge for telecom providers.</li>
  <li>Actionable steps organizations can take to enhance defenses, including segmentation, behavioral monitoring, and Zero Trust frameworks.</li>
</ul>
<p><br></p>
<p>This episode dives into the attack’s technical anatomy, discusses its implications for both governments and private organizations, and explores how individuals can secure their communications in an era of increasing surveillance.</p>
<p>Join us to understand how Salt Typhoon unfolded—and what it means for the future of telecom security.</p>
<p>
🔔 Follow and Support our channel! 🔔
=== 
► YOUTUBE: https://youtube.com/@ThreatTalks
► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E
► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520

👕 Receive your Threat Talks T-shirt
<a href="https://threat-talks.com/salt-typhoon-how-nine-telcos-were-compromised/" rel="noopener noreferer">https://threat-talks.com/salt-typhoon-how-nine-telcos-were-compromised/
</a>
🗺️ Explore the Hack's Route in Detail 🗺️
<a href="https://threat-talks.com/downloads/" rel="noopener noreferer">https://threat-talks.com/downloads/</a></p>
<p>
🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Tue, 28 Jan 2025 08:00:00 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/c2335be2/0c6e983e.mp3" length="28676445" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/TNLdixH5oXoNOf3wL524YIyHR-CTPnfXj67LaXSK6-U/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mN2Uw/ZDhhZjQ5YzI0MGYz/YzA1ZmVhNjRkMGQ3/YWUxMC5qcGc.jpg"/>
      <itunes:duration>1793</itunes:duration>
      <itunes:summary>Salt Typhoon: Inside the Coordinated Breach of Nine Telecom Providers

A sweeping cyberattack, known as Salt Typhoon, has exposed the vulnerabilities of nine major telcos, leaving sensitive communications and surveillance data in the hands of attackers. How did this happen, and what lessons can we learn?

In this Threat Talks Deep Dive, host Lieuwe Jan Koning teams up with ON2IT’s Rob Maas (Field CTO) and Jeroen Scheerder (Security Researcher) to dissect every aspect of this high-profile breach.

🔍 What you’ll learn:

 How attackers exploited known vulnerabilities in Exchange servers, VPNs, and firewalls to infiltrate systems.
 The risks associated with lawful interception systems and the exposure of call detail records (CDRs).
  Why legacy infrastructure remains a significant cybersecurity challenge for telecom providers.
  Actionable steps organizations can take to enhance defenses, including segmentation, behavioral monitoring, and Zero Trust frameworks.


This episode dives into the attack’s technical anatomy, discusses its implications for both governments and private organizations, and explores how individuals can secure their communications in an era of increasing surveillance.
Join us to understand how Salt Typhoon unfolded—and what it means for the future of telecom security.

🔔 Follow and Support our channel! 🔔
=== 
► YOUTUBE: https://youtube.com/@ThreatTalks
► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E
► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520

👕 Receive your Threat Talks T-shirt
https://threat-talks.com/salt-typhoon-how-nine-telcos-were-compromised/

🗺️ Explore the Hack's Route in Detail 🗺️
https://threat-talks.com/downloads/

🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</itunes:summary>
      <itunes:subtitle>Salt Typhoon: Inside the Coordinated Breach of Nine Telecom Providers

A sweeping cyberattack, known as Salt Typhoon, has exposed the vulnerabilities of nine major telcos, leaving sensitive communications and surveillance data in the hands of attackers. H</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>ONCD: The Cyber Catalyst with Davis Hake - Threat Talks Cybersecurity Podcast</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>ONCD: The Cyber Catalyst with Davis Hake - Threat Talks Cybersecurity Podcast</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d968ea74-1813-44f3-8454-d8da7b506f6b</guid>
      <link>https://share.transistor.fm/s/e1377f7f</link>
      <description>
        <![CDATA[<p><strong>ONCD: The Cyber Catalyst with Davis Hake</strong></p>
<p><br></p>
<p>How can governments lead the charge in global cybersecurity efforts? In this compelling episode of Threat Talks, host Lieuwe Jan Koning sits down with returning guest Davis Hake, cybersecurity expert and advisor, to explore the critical role governments play in the cyber landscape.</p>
<p>👾 The ONCD’s mission and its role in U.S. cybersecurity.</p>
<p>👾 Lessons from the Biden administration’s approach to combating ransomware and cybercrime.</p>
<p>👾 Why global collaboration is key to countering modern threats.</p>
<p>Watch now to uncover how governments and businesses can work together to secure the digital future.</p>
<p><br></p>
<p>🔔 <strong>Follow and Support our channel!</strong> 🔔
=== 
► YOUTUBE: <a href="https://youtube.com/@ThreatTalks" rel="noopener noreferer">https://youtube.com/@ThreatTalks</a>
► SPOTIFY: <a href="https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E" rel="noopener noreferer">https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E</a>
► APPLE: <a href="https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520" rel="noopener noreferer">https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</a>

👕 Receive your Threat Talks T-shirt 👕
<a href="https://threat-talks.com/oncd-the-cyber-catalyst/" rel="noopener noreferer">https://threat-talks.com/oncd-the-cyber-catalyst/</a>

🗺️ Explore 2024's Hack's Routes in Detail 🗺️
<a href="https://threat-talks.com/downloads/" rel="noopener noreferer">https://threat-talks.com/downloads/</a>

🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>ONCD: The Cyber Catalyst with Davis Hake</strong></p>
<p><br></p>
<p>How can governments lead the charge in global cybersecurity efforts? In this compelling episode of Threat Talks, host Lieuwe Jan Koning sits down with returning guest Davis Hake, cybersecurity expert and advisor, to explore the critical role governments play in the cyber landscape.</p>
<p>👾 The ONCD’s mission and its role in U.S. cybersecurity.</p>
<p>👾 Lessons from the Biden administration’s approach to combating ransomware and cybercrime.</p>
<p>👾 Why global collaboration is key to countering modern threats.</p>
<p>Watch now to uncover how governments and businesses can work together to secure the digital future.</p>
<p><br></p>
<p>🔔 <strong>Follow and Support our channel!</strong> 🔔
=== 
► YOUTUBE: <a href="https://youtube.com/@ThreatTalks" rel="noopener noreferer">https://youtube.com/@ThreatTalks</a>
► SPOTIFY: <a href="https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E" rel="noopener noreferer">https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E</a>
► APPLE: <a href="https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520" rel="noopener noreferer">https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</a>

👕 Receive your Threat Talks T-shirt 👕
<a href="https://threat-talks.com/oncd-the-cyber-catalyst/" rel="noopener noreferer">https://threat-talks.com/oncd-the-cyber-catalyst/</a>

🗺️ Explore 2024's Hack's Routes in Detail 🗺️
<a href="https://threat-talks.com/downloads/" rel="noopener noreferer">https://threat-talks.com/downloads/</a>

🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Jan 2025 08:00:00 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/e1377f7f/5fa3ad3f.mp3" length="43562008" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/6_RYA909qYFh-V8ej2Vxtv3Tj_LGCHvdzV0T5B-q0FE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lZDkx/ZjJlY2E5MmFlOTQ4/NDQ1YzA2OGIwMzU5/MjkzNy5qcGc.jpg"/>
      <itunes:duration>2723</itunes:duration>
      <itunes:summary>ONCD: The Cyber Catalyst with Davis Hake

How can governments lead the charge in global cybersecurity efforts? In this compelling episode of Threat Talks, host Lieuwe Jan Koning sits down with returning guest Davis Hake, cybersecurity expert and advisor, to explore the critical role governments play in the cyber landscape.
👾 The ONCD’s mission and its role in U.S. cybersecurity.
👾 Lessons from the Biden administration’s approach to combating ransomware and cybercrime.
👾 Why global collaboration is key to countering modern threats.
Watch now to uncover how governments and businesses can work together to secure the digital future.

🔔 Follow and Support our channel! 🔔
=== 
► YOUTUBE: https://youtube.com/@ThreatTalks
► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E
► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520

👕 Receive your Threat Talks T-shirt 👕
https://threat-talks.com/oncd-the-cyber-catalyst/

🗺️ Explore 2024's Hack's Routes in Detail 🗺️
https://threat-talks.com/downloads/

🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</itunes:summary>
      <itunes:subtitle>ONCD: The Cyber Catalyst with Davis Hake

How can governments lead the charge in global cybersecurity efforts? In this compelling episode of Threat Talks, host Lieuwe Jan Koning sits down with returning guest Davis Hake, cybersecurity expert and advisor, </itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The State of Cybersecurity in the European Union with Hans de Vries - Threat Talks</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>The State of Cybersecurity in the European Union with Hans de Vries - Threat Talks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">bebde4e0-4aa5-4937-8caa-5c5e802a2c37</guid>
      <link>https://share.transistor.fm/s/81612fd9</link>
      <description>
        <![CDATA[<p>The State of Cybersecurity in the European Union</p>
<p>Cyber threats know no borders, and in the European Union, harmonizing cybersecurity efforts across 27 member states is no small feat. In this episode of Threat Talks, host Lieuwe Jan Koning speaks with Hans de Vries, Chief Cybersecurity and Operational Officer at ENISA, about the critical work being done to secure Europe’s digital future.</p>
<p><strong>📌 Topics covered</strong></p>
<ul>
 <li>How ENISA supports EU member states in managing cyber incidents and crisis responses.</li>
 <li>The implementation of the NIS2 directive and upcoming Cyber Resilience Act.</li>
  <li>The role of trust and collaboration in cross-border cybersecurity.</li>
  <li>Why public-private partnerships are key to tackling cybersecurity challenges.
</li>
</ul>
<p>🎥 Watch now to explore how Europe is building a safer digital environment for its citizens and businesses.</p>
<p>👉 Don’t forget to like, subscribe, and share to help us spread the word!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The State of Cybersecurity in the European Union</p>
<p>Cyber threats know no borders, and in the European Union, harmonizing cybersecurity efforts across 27 member states is no small feat. In this episode of Threat Talks, host Lieuwe Jan Koning speaks with Hans de Vries, Chief Cybersecurity and Operational Officer at ENISA, about the critical work being done to secure Europe’s digital future.</p>
<p><strong>📌 Topics covered</strong></p>
<ul>
 <li>How ENISA supports EU member states in managing cyber incidents and crisis responses.</li>
 <li>The implementation of the NIS2 directive and upcoming Cyber Resilience Act.</li>
  <li>The role of trust and collaboration in cross-border cybersecurity.</li>
  <li>Why public-private partnerships are key to tackling cybersecurity challenges.
</li>
</ul>
<p>🎥 Watch now to explore how Europe is building a safer digital environment for its citizens and businesses.</p>
<p>👉 Don’t forget to like, subscribe, and share to help us spread the word!</p>]]>
      </content:encoded>
      <pubDate>Mon, 13 Jan 2025 08:45:44 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/81612fd9/1a63acb8.mp3" length="36805284" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/nyTZjfCn6xF3Qgk2iJnsxJPgEjMxIC22ux3dUAgqPw0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jZDhm/ZDJmZGE0MTg4NGU5/OWU4OGJjZDUxNDZj/ZjQ0MS5qcGc.jpg"/>
      <itunes:duration>2301</itunes:duration>
      <itunes:summary>The State of Cybersecurity in the European Union
Cyber threats know no borders, and in the European Union, harmonizing cybersecurity efforts across 27 member states is no small feat. In this episode of Threat Talks, host Lieuwe Jan Koning speaks with Hans de Vries, Chief Cybersecurity and Operational Officer at ENISA, about the critical work being done to secure Europe’s digital future.
📌 Topics covered

 How ENISA supports EU member states in managing cyber incidents and crisis responses.
 The implementation of the NIS2 directive and upcoming Cyber Resilience Act.
  The role of trust and collaboration in cross-border cybersecurity.
  Why public-private partnerships are key to tackling cybersecurity challenges.


🎥 Watch now to explore how Europe is building a safer digital environment for its citizens and businesses.
👉 Don’t forget to like, subscribe, and share to help us spread the word!</itunes:summary>
      <itunes:subtitle>The State of Cybersecurity in the European Union
Cyber threats know no borders, and in the European Union, harmonizing cybersecurity efforts across 27 member states is no small feat. In this episode of Threat Talks, host Lieuwe Jan Koning speaks with Hans</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cyber Outlook 2025 - One Year of Threat Talks</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Cyber Outlook 2025 - One Year of Threat Talks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b01d2ef4-664a-4563-85b1-7591e29b9bbd</guid>
      <link>https://share.transistor.fm/s/247d9640</link>
      <description>
        <![CDATA[<p><strong>2025: The Year of AI and Cybersecurity Evolution</strong></p>
<p>Kick off 2025 with the latest insights from Threat Talks! In this episode, host Lieuwe Jan Koning sits down with Peter van Burgel, CEO of AMS-IX, to discuss how AI and cybersecurity are reshaping the landscape this year.</p>
<p><br></p>
<p><strong>🚀 What’s inside this episode?</strong></p>
<p>🔹 A sneak peek into AI advancements: Could we see virtual CEOs?</p>
<p>🔹 The rise of Zero Trust supply chain strategies.</p>
<p>🔹 Navigating the skills gap in an evolving digital world.</p>
<p>🔹 AI in cybersecurity: Opportunities, risks, and where to focus.</p>
<p>🔹 Power consumption and sustainability in AI’s rapid growth.</p>
<p>AMS-IX's role as a critical part of internet infrastructure and its cybersecurity responsibilities highlight the importance of collaboration and awareness in today’s complex geopolitical climate. </p>
<p><br></p>
<p><strong>Follow and Support our channel! 🔔</strong>
=== 
► YOUTUBE: <a href="https://youtube.com/@ThreatTalks" rel="ugc noopener noreferrer">https://youtube.com/@ThreatTalks</a>
► SPOTIFY: <a href="https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E" rel="ugc noopener noreferrer">https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E</a>
► APPLE: <a href="https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520" rel="ugc noopener noreferrer">https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</a>

👕 Receive your Threat Talks T-shirt
<a href="https://threat-talks.com/cyber-outlook-2025-one-year-of-threat-talks/" rel="ugc noopener noreferrer">https://threat-talks.com/cyber-outlook-2025-one-year-of-threat-talks/</a>

🗺️ Explore all 2024's Hack's in Detail 🗺️
<a href="https://threat-talks.com/downloads/" rel="ugc noopener noreferrer">https://threat-talks.com/downloads/</a>

🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>2025: The Year of AI and Cybersecurity Evolution</strong></p>
<p>Kick off 2025 with the latest insights from Threat Talks! In this episode, host Lieuwe Jan Koning sits down with Peter van Burgel, CEO of AMS-IX, to discuss how AI and cybersecurity are reshaping the landscape this year.</p>
<p><br></p>
<p><strong>🚀 What’s inside this episode?</strong></p>
<p>🔹 A sneak peek into AI advancements: Could we see virtual CEOs?</p>
<p>🔹 The rise of Zero Trust supply chain strategies.</p>
<p>🔹 Navigating the skills gap in an evolving digital world.</p>
<p>🔹 AI in cybersecurity: Opportunities, risks, and where to focus.</p>
<p>🔹 Power consumption and sustainability in AI’s rapid growth.</p>
<p>AMS-IX's role as a critical part of internet infrastructure and its cybersecurity responsibilities highlight the importance of collaboration and awareness in today’s complex geopolitical climate. </p>
<p><br></p>
<p><strong>Follow and Support our channel! 🔔</strong>
=== 
► YOUTUBE: <a href="https://youtube.com/@ThreatTalks" rel="ugc noopener noreferrer">https://youtube.com/@ThreatTalks</a>
► SPOTIFY: <a href="https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E" rel="ugc noopener noreferrer">https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E</a>
► APPLE: <a href="https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520" rel="ugc noopener noreferrer">https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</a>

👕 Receive your Threat Talks T-shirt
<a href="https://threat-talks.com/cyber-outlook-2025-one-year-of-threat-talks/" rel="ugc noopener noreferrer">https://threat-talks.com/cyber-outlook-2025-one-year-of-threat-talks/</a>

🗺️ Explore all 2024's Hack's in Detail 🗺️
<a href="https://threat-talks.com/downloads/" rel="ugc noopener noreferrer">https://threat-talks.com/downloads/</a>

🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Tue, 07 Jan 2025 08:00:00 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/247d9640/7ebeb6b5.mp3" length="40035236" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ZCOzuCovQ72rx2Fhd7iqTIzy02_CA4eaXh5kmvW6Im4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iMGQ0/YTM2OTZjNjczOTU0/OGE3MGQ5MjUxNTBm/Y2JhYS5qcGc.jpg"/>
      <itunes:duration>2503</itunes:duration>
      <itunes:summary>2025: The Year of AI and Cybersecurity Evolution
Kick off 2025 with the latest insights from Threat Talks! In this episode, host Lieuwe Jan Koning sits down with Peter van Burgel, CEO of AMS-IX, to discuss how AI and cybersecurity are reshaping the landscape this year.

🚀 What’s inside this episode?
🔹 A sneak peek into AI advancements: Could we see virtual CEOs?
🔹 The rise of Zero Trust supply chain strategies.
🔹 Navigating the skills gap in an evolving digital world.
🔹 AI in cybersecurity: Opportunities, risks, and where to focus.
🔹 Power consumption and sustainability in AI’s rapid growth.
AMS-IX's role as a critical part of internet infrastructure and its cybersecurity responsibilities highlight the importance of collaboration and awareness in today’s complex geopolitical climate. 

Follow and Support our channel! 🔔
=== 
► YOUTUBE: https://youtube.com/@ThreatTalks
► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E
► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520

👕 Receive your Threat Talks T-shirt
https://threat-talks.com/cyber-outlook-2025-one-year-of-threat-talks/

🗺️ Explore all 2024's Hack's in Detail 🗺️
https://threat-talks.com/downloads/

🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</itunes:summary>
      <itunes:subtitle>2025: The Year of AI and Cybersecurity Evolution
Kick off 2025 with the latest insights from Threat Talks! In this episode, host Lieuwe Jan Koning sits down with Peter van Burgel, CEO of AMS-IX, to discuss how AI and cybersecurity are reshaping the landsc</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>2024: The Breaking Point - One Year of Threat Talks</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>46</itunes:episode>
      <podcast:episode>46</podcast:episode>
      <itunes:title>2024: The Breaking Point - One Year of Threat Talks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">40d98b72-5d2e-4dac-9f96-0463f5c749b4</guid>
      <link>https://share.transistor.fm/s/781c9c62</link>
      <description>
        <![CDATA[<p>🎥 Threat Talks - One Year of Insights with Peter van Burgel, CEO of AMS-IX

As 2024 comes to a close, we’re celebrating a year of transformative conversations with a special edition of Threat Talks! Join Lieuwe Jan Koning and Peter van Burgel, CEO of AMS-IX, as they reflect on the past year’s most significant developments in cybersecurity and the lessons learned.

<strong>In this Threat Talk, we:</strong>
👾 Look back at the major trends and threats of 2024.
👾 Discuss how organizations adapted to an ever-changing security landscape.
👾 Highlight key moments from Threat Talks throughout the year.

Whether you're a cybersecurity enthusiast, a tech professional, or simply curious about how to safeguard the digital future, this episode is packed with insights you won't want to miss!

🔔 Don’t forget to like, subscribe, and hit the notification bell to stay updated with future episodes of Threat Talks.

<em>👉Best way to support the channel: give us a like! </em><strong>

🎧 Available on all major podcast platforms. </strong>
► YOUTUBE: <a href="https://youtube.com/@ThreatTalks%20" rel="ugc noopener noreferrer">⁠https://youtube.com/@ThreatTalks ⁠</a>
► SPOTIFY: <a href="https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E%20" rel="ugc noopener noreferrer">⁠https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E ⁠</a>
► APPLE: <a href="https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520%20" rel="ugc noopener noreferrer">⁠https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520 ⁠</a>

👕 <strong>Receive your Threat Talks T-shirt </strong>👕 
<a href="%E2%81%A0https://threat-talks.com/2024-the-breaking-point/%E2%81%A0%E2%81%A0%20" rel="ugc noopener noreferrer">⁠https://threat-talks.com/2024-the-breaking-point/</a><strong></strong></p>
<p><br></p>
<p><strong>🗺️ Explore all 2024's infographics </strong>🗺️ 
<a href="https://threat-talks.com/downloads/" rel="ugc noopener noreferrer">https://threat-talks.com/downloads/</a>

🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>🎥 Threat Talks - One Year of Insights with Peter van Burgel, CEO of AMS-IX

As 2024 comes to a close, we’re celebrating a year of transformative conversations with a special edition of Threat Talks! Join Lieuwe Jan Koning and Peter van Burgel, CEO of AMS-IX, as they reflect on the past year’s most significant developments in cybersecurity and the lessons learned.

<strong>In this Threat Talk, we:</strong>
👾 Look back at the major trends and threats of 2024.
👾 Discuss how organizations adapted to an ever-changing security landscape.
👾 Highlight key moments from Threat Talks throughout the year.

Whether you're a cybersecurity enthusiast, a tech professional, or simply curious about how to safeguard the digital future, this episode is packed with insights you won't want to miss!

🔔 Don’t forget to like, subscribe, and hit the notification bell to stay updated with future episodes of Threat Talks.

<em>👉Best way to support the channel: give us a like! </em><strong>

🎧 Available on all major podcast platforms. </strong>
► YOUTUBE: <a href="https://youtube.com/@ThreatTalks%20" rel="ugc noopener noreferrer">⁠https://youtube.com/@ThreatTalks ⁠</a>
► SPOTIFY: <a href="https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E%20" rel="ugc noopener noreferrer">⁠https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E ⁠</a>
► APPLE: <a href="https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520%20" rel="ugc noopener noreferrer">⁠https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520 ⁠</a>

👕 <strong>Receive your Threat Talks T-shirt </strong>👕 
<a href="%E2%81%A0https://threat-talks.com/2024-the-breaking-point/%E2%81%A0%E2%81%A0%20" rel="ugc noopener noreferrer">⁠https://threat-talks.com/2024-the-breaking-point/</a><strong></strong></p>
<p><br></p>
<p><strong>🗺️ Explore all 2024's infographics </strong>🗺️ 
<a href="https://threat-talks.com/downloads/" rel="ugc noopener noreferrer">https://threat-talks.com/downloads/</a>

🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Tue, 31 Dec 2024 08:00:00 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/781c9c62/ad9446bf.mp3" length="45158587" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/7agKRsr0HLyuTjmtldfol2A508E_9O3-sjDcl0ZVQBk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85ZjI0/ZTQyYTc3Mzc0NWE1/MDA0OGYxZDdkOTEz/NmI3NS5qcGc.jpg"/>
      <itunes:duration>2823</itunes:duration>
      <itunes:summary>🎥 Threat Talks - One Year of Insights with Peter van Burgel, CEO of AMS-IX

As 2024 comes to a close, we’re celebrating a year of transformative conversations with a special edition of Threat Talks! Join Lieuwe Jan Koning and Peter van Burgel, CEO of AMS-IX, as they reflect on the past year’s most significant developments in cybersecurity and the lessons learned.

In this Threat Talk, we:
👾 Look back at the major trends and threats of 2024.
👾 Discuss how organizations adapted to an ever-changing security landscape.
👾 Highlight key moments from Threat Talks throughout the year.

Whether you're a cybersecurity enthusiast, a tech professional, or simply curious about how to safeguard the digital future, this episode is packed with insights you won't want to miss!

🔔 Don’t forget to like, subscribe, and hit the notification bell to stay updated with future episodes of Threat Talks.

👉Best way to support the channel: give us a like! 

🎧 Available on all major podcast platforms. 
► YOUTUBE: ⁠https://youtube.com/@ThreatTalks ⁠
► SPOTIFY: ⁠https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E ⁠
► APPLE: ⁠https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520 ⁠

👕 Receive your Threat Talks T-shirt 👕 
⁠https://threat-talks.com/2024-the-breaking-point/

🗺️ Explore all 2024's infographics 🗺️ 
https://threat-talks.com/downloads/

🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX</itunes:summary>
      <itunes:subtitle>🎥 Threat Talks - One Year of Insights with Peter van Burgel, CEO of AMS-IX

As 2024 comes to a close, we’re celebrating a year of transformative conversations with a special edition of Threat Talks! Join Lieuwe Jan Koning and Peter van Burgel, CEO of AMS-</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Dutch Law Enforcement Data Breach - Threat Talks Cybersecurity Podcast</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>48</itunes:episode>
      <podcast:episode>48</podcast:episode>
      <itunes:title>Dutch Law Enforcement Data Breach - Threat Talks Cybersecurity Podcast</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8f23718d-0848-42db-8888-80433d7b17b5</guid>
      <link>https://share.transistor.fm/s/ab0ac074</link>
      <description>
        <![CDATA[<p>Imagine the names, job functions, email addresses and phone numbers of police officers, DAs, and even critical key witnesses being hacked and leaked to the public. This isn’t the opening to some spy novel – it’s what actually happened when the Dutch Law Enforcement suffered a serious data breach in September of this year. 

Initially reported as a breach ‘only’ involving personal data of 65.000 law enforcement employees, it later became clear that much more data was leaked - and not just data from law enforcement personnel. 

In this Deep Dive, host Lieuwe Jan Koning, Security Expert Jeroen Scheerder and Field CTO Rob Maas take an in-depth look at how this breach unfolded, the poor security track record of the software that was used and what the Dutch Law Enforcement could’ve done better when it comes to handling the publicity of a data breach. 

<em>👉Best way to support the channel: give us a like! </em><strong>

🎧 Available on all major podcast platforms. </strong>
► YOUTUBE: <a href="https://youtube.com/@ThreatTalks%20" rel="ugc noopener noreferrer">https://youtube.com/@ThreatTalks </a>
► SPOTIFY: <a href="https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E%20" rel="ugc noopener noreferrer">https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E </a>
► APPLE: <a href="https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520%20" rel="ugc noopener noreferrer">https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520 </a>

👕 <strong>Receive your Threat Talks T-shirt </strong>👕 
<a href="https://threat-talks.com/prevent-pay-or-insure/" rel="ugc noopener noreferrer">https://threat-talks.com/prevent-pay-or-insure/</a> 

<strong>🗺️ Explore the Hack's Route in Detail </strong>🗺️ 
<a href="https://on2it.s3.us-east-1.amazonaws.com/Threat-Talks-Prevent-Pay-or-Insure.pdf%20" rel="ugc noopener noreferrer">https://on2it.s3.us-east-1.amazonaws.com/Threat-Talks-Prevent-Pay-or-Insure.pdf </a>

🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Imagine the names, job functions, email addresses and phone numbers of police officers, DAs, and even critical key witnesses being hacked and leaked to the public. This isn’t the opening to some spy novel – it’s what actually happened when the Dutch Law Enforcement suffered a serious data breach in September of this year. 

Initially reported as a breach ‘only’ involving personal data of 65.000 law enforcement employees, it later became clear that much more data was leaked - and not just data from law enforcement personnel. 

In this Deep Dive, host Lieuwe Jan Koning, Security Expert Jeroen Scheerder and Field CTO Rob Maas take an in-depth look at how this breach unfolded, the poor security track record of the software that was used and what the Dutch Law Enforcement could’ve done better when it comes to handling the publicity of a data breach. 

<em>👉Best way to support the channel: give us a like! </em><strong>

🎧 Available on all major podcast platforms. </strong>
► YOUTUBE: <a href="https://youtube.com/@ThreatTalks%20" rel="ugc noopener noreferrer">https://youtube.com/@ThreatTalks </a>
► SPOTIFY: <a href="https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E%20" rel="ugc noopener noreferrer">https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E </a>
► APPLE: <a href="https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520%20" rel="ugc noopener noreferrer">https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520 </a>

👕 <strong>Receive your Threat Talks T-shirt </strong>👕 
<a href="https://threat-talks.com/prevent-pay-or-insure/" rel="ugc noopener noreferrer">https://threat-talks.com/prevent-pay-or-insure/</a> 

<strong>🗺️ Explore the Hack's Route in Detail </strong>🗺️ 
<a href="https://on2it.s3.us-east-1.amazonaws.com/Threat-Talks-Prevent-Pay-or-Insure.pdf%20" rel="ugc noopener noreferrer">https://on2it.s3.us-east-1.amazonaws.com/Threat-Talks-Prevent-Pay-or-Insure.pdf </a>

🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Tue, 24 Dec 2024 08:00:00 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/ab0ac074/239ff948.mp3" length="19108464" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/pJ6QT0afMemxQzvK2DC4evpRk8zdalwkvHYJXxdf5N4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81ZDk1/OGRiNTlhYWE1YWM2/NGZmMTdhMzVhNTU5/MjBlZi5qcGc.jpg"/>
      <itunes:duration>1195</itunes:duration>
      <itunes:summary>Imagine the names, job functions, email addresses and phone numbers of police officers, DAs, and even critical key witnesses being hacked and leaked to the public. This isn’t the opening to some spy novel – it’s what actually happened when the Dutch Law Enforcement suffered a serious data breach in September of this year. 

Initially reported as a breach ‘only’ involving personal data of 65.000 law enforcement employees, it later became clear that much more data was leaked - and not just data from law enforcement personnel. 

In this Deep Dive, host Lieuwe Jan Koning, Security Expert Jeroen Scheerder and Field CTO Rob Maas take an in-depth look at how this breach unfolded, the poor security track record of the software that was used and what the Dutch Law Enforcement could’ve done better when it comes to handling the publicity of a data breach. 

👉Best way to support the channel: give us a like! 

🎧 Available on all major podcast platforms. 
► YOUTUBE: https://youtube.com/@ThreatTalks 
► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E 
► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520 

👕 Receive your Threat Talks T-shirt 👕 
https://threat-talks.com/prevent-pay-or-insure/ 

🗺️ Explore the Hack's Route in Detail 🗺️ 
https://on2it.s3.us-east-1.amazonaws.com/Threat-Talks-Prevent-Pay-or-Insure.pdf 

🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX</itunes:summary>
      <itunes:subtitle>Imagine the names, job functions, email addresses and phone numbers of police officers, DAs, and even critical key witnesses being hacked and leaked to the public. This isn’t the opening to some spy novel – it’s what actually happened when the Dutch Law E</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Conti Ransomware Attack on Costarican Government - Threat Talks Cybersecurity Podcast</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>42</itunes:episode>
      <podcast:episode>42</podcast:episode>
      <itunes:title>Conti Ransomware Attack on Costarican Government - Threat Talks Cybersecurity Podcast</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f86cce63-64b8-473f-ae16-041de7b51e17</guid>
      <link>https://share.transistor.fm/s/ecb6fffa</link>
      <description>
        <![CDATA[<p><strong>🌎 Conti Attack on Costa Rica: When Ransomware Halts a Nation 🌎</strong></p>
<p>What happens when a ransomware group attacks an entire country? In this Threat Talk, we dive deep into the Conti ransomware attack that crippled the Costa Rican government. From healthcare systems shutting down to unpaid government salaries and even tax collection grinding to a halt—this unprecedented cyberattack became a national emergency with global implications.</p>
<p>Join Lieuwe Jan Koning as he unpacks the timeline, impact, and lessons learned from this catastrophic event. Discover the vulnerabilities that allowed this to happen, the strategies used by Conti, and how governments and organizations worldwide can prepare for such sophisticated cyber threats.</p>
<p><br></p>
<p><strong>💡 What You’ll Learn in This Episode</strong></p>
<ul>
 <li>✔️ The inner workings of the Conti ransomware group</li>
 <li>✔️ How critical infrastructure became a target</li>
 <li>✔️ The economic and societal ripple effects of a national cyberattack</li>
 <li>✔️ Best practices for defending against ransomware threats</li>
</ul>
<p><br></p>
<p>🔒<strong> Who Should Watch?</strong></p>
<ul>
  <li>↠ Cybersecurity experts</li>
  <li>↠ IT professionals</li>
  <li>↠ Government leaders</li>
  <li>↠ Business executives</li>
  <li>↠ Anyone passionate about protecting digital assets and critical systems</li>
</ul>
<p><br></p>
<p>🚀 Don’t miss this in-depth analysis of one of the most talked-about ransomware attacks in recent history! Subscribe now to Threat Talks for more cutting-edge discussions on cybersecurity, threat intelligence, and digital defense strategies.</p>
<p><br></p>
<p>👉 <strong>Support the channel: give us a like! </strong></p>
<p>🎧 Available on all major podcast platforms. </p>
<p>► YOUTUBE: https://youtube.com/@ThreatTalks </p>
<p>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E </p>
<p>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520 </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>🌎 Conti Attack on Costa Rica: When Ransomware Halts a Nation 🌎</strong></p>
<p>What happens when a ransomware group attacks an entire country? In this Threat Talk, we dive deep into the Conti ransomware attack that crippled the Costa Rican government. From healthcare systems shutting down to unpaid government salaries and even tax collection grinding to a halt—this unprecedented cyberattack became a national emergency with global implications.</p>
<p>Join Lieuwe Jan Koning as he unpacks the timeline, impact, and lessons learned from this catastrophic event. Discover the vulnerabilities that allowed this to happen, the strategies used by Conti, and how governments and organizations worldwide can prepare for such sophisticated cyber threats.</p>
<p><br></p>
<p><strong>💡 What You’ll Learn in This Episode</strong></p>
<ul>
 <li>✔️ The inner workings of the Conti ransomware group</li>
 <li>✔️ How critical infrastructure became a target</li>
 <li>✔️ The economic and societal ripple effects of a national cyberattack</li>
 <li>✔️ Best practices for defending against ransomware threats</li>
</ul>
<p><br></p>
<p>🔒<strong> Who Should Watch?</strong></p>
<ul>
  <li>↠ Cybersecurity experts</li>
  <li>↠ IT professionals</li>
  <li>↠ Government leaders</li>
  <li>↠ Business executives</li>
  <li>↠ Anyone passionate about protecting digital assets and critical systems</li>
</ul>
<p><br></p>
<p>🚀 Don’t miss this in-depth analysis of one of the most talked-about ransomware attacks in recent history! Subscribe now to Threat Talks for more cutting-edge discussions on cybersecurity, threat intelligence, and digital defense strategies.</p>
<p><br></p>
<p>👉 <strong>Support the channel: give us a like! </strong></p>
<p>🎧 Available on all major podcast platforms. </p>
<p>► YOUTUBE: https://youtube.com/@ThreatTalks </p>
<p>► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E </p>
<p>► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520 </p>]]>
      </content:encoded>
      <pubDate>Tue, 17 Dec 2024 08:00:00 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/ecb6fffa/aa071a7a.mp3" length="21028165" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/2lPNDGZlhI8C7N7hs6VUCJ-aQT1Igkdf6JNeJyp9Ivo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84OTMx/M2YzNDc5MGNjOTMy/MDgyMjhkN2I5NzFm/ZTU2Ni5qcGc.jpg"/>
      <itunes:duration>1315</itunes:duration>
      <itunes:summary>🌎 Conti Attack on Costa Rica: When Ransomware Halts a Nation 🌎
What happens when a ransomware group attacks an entire country? In this Threat Talk, we dive deep into the Conti ransomware attack that crippled the Costa Rican government. From healthcare systems shutting down to unpaid government salaries and even tax collection grinding to a halt—this unprecedented cyberattack became a national emergency with global implications.
Join Lieuwe Jan Koning as he unpacks the timeline, impact, and lessons learned from this catastrophic event. Discover the vulnerabilities that allowed this to happen, the strategies used by Conti, and how governments and organizations worldwide can prepare for such sophisticated cyber threats.

💡 What You’ll Learn in This Episode

 ✔️ The inner workings of the Conti ransomware group
 ✔️ How critical infrastructure became a target
 ✔️ The economic and societal ripple effects of a national cyberattack
 ✔️ Best practices for defending against ransomware threats


🔒 Who Should Watch?

  ↠ Cybersecurity experts
  ↠ IT professionals
  ↠ Government leaders
  ↠ Business executives
  ↠ Anyone passionate about protecting digital assets and critical systems


🚀 Don’t miss this in-depth analysis of one of the most talked-about ransomware attacks in recent history! Subscribe now to Threat Talks for more cutting-edge discussions on cybersecurity, threat intelligence, and digital defense strategies.

👉 Support the channel: give us a like! 
🎧 Available on all major podcast platforms. 
► YOUTUBE: https://youtube.com/@ThreatTalks 
► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E 
► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520 </itunes:summary>
      <itunes:subtitle>🌎 Conti Attack on Costa Rica: When Ransomware Halts a Nation 🌎
What happens when a ransomware group attacks an entire country? In this Threat Talk, we dive deep into the Conti ransomware attack that crippled the Costa Rican government. From healthcare sys</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>MGM Resorts ALPHV/BlackCat Ransomware Attack - Threat Talks Cybersecurity Podcast</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>41</itunes:episode>
      <podcast:episode>41</podcast:episode>
      <itunes:title>MGM Resorts ALPHV/BlackCat Ransomware Attack - Threat Talks Cybersecurity Podcast</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c464297a-2555-4d69-834b-d493d4b1d9f4</guid>
      <link>https://share.transistor.fm/s/1a42f443</link>
      <description>
        <![CDATA[<p><strong>🎙 Threat Talks: Unpacking the MGM Resorts ALPHV/BlackCat Ransomware Attack 🕵️‍♂️</strong></p>
<p>In this Threat Talk, we dive deep into a cybersecurity incident in 2023: the MGM Resorts ransomware attack by ALPHV/BlackCat and Scattered Spider. From sophisticated social engineering tactics to deploying a shadow identity provider for persistence, this attack demonstrates the capabilities of collaborating ransomware groups. </p>
<p><br></p>
<p>Join cybersecurity experts Lieuwe Jan Koning, Luca Cipriano
(Threat Intel Specialist), and Rob Maas (Field CTO) as they break down: </p>
<ul>
 <li>🔒 How attackers exploited MGM’s Okta environment. </li>
 <li>🎯 The role of phishing and advanced persistence techniques. </li>
</ul>
<ul>
 <li>🚨 Lessons learned and actionable steps to prevent such attacks. </li>
</ul>
<p> </p>
<p><strong>Key Insights</strong></p>
<ul>
 <li>➡ Why Zero Trust and network segmentation are critical. </li>
 <li>➡ The dilemma of paying ransoms vs. operational downtime. </li>
 <li>➡ Practical steps to improve your organization’s ransomware defense strategy. </li>
</ul>
<p><br></p>
<p>If you’re a cybersecurity professional or just curious about the latest in cyber threats, this episode is a must-watch. Stay informed, stay secure! 💻</p>
<p> </p>
<p> 👉 Support the channel: don’t forget to LIKE, COMMENT, and SUBSCRIBE :). </p>
<p><strong>🎧 Available on all major podcast platforms.</strong></p>
<p>► <a href="https://youtube.com/@ThreatTalks" rel="ugc noopener noreferrer">YOUTUBE</a>: <a href="https://youtube.com/@ThreatTalks" rel="ugc noopener noreferrer">https://youtube.com/@ThreatTalks</a> 
► <a href="https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E" rel="ugc noopener noreferrer">SPOTIFY</a>: <a href="https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E" rel="ugc noopener noreferrer">https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E</a>
► <a href="https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520" rel="ugc noopener noreferrer">APPLE</a>: <a href="https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520" rel="ugc noopener noreferrer">https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</a></p>

<p>👕 Receive your Threat Talks T-shirt 👕</p>
<p><a href="https://threat-talks.com/prevent-pay-or-insure/" rel="ugc noopener noreferrer">https://threat-talks.com/prevent-pay-or-insure/</a> </p>

<p>🗺️ Explore the Hack's Route in Detail 🗺️</p>
<p><a href="https://on2it.s3.us-east-1.amazonaws.com/Threat-Talks-Prevent-Pay-or-Insure.pdf" rel="ugc noopener noreferrer">https://on2it.s3.us-east-1.amazonaws.com/Threat-Talks-Prevent-Pay-or-Insure.pdf</a></p>

<p>🕵️ Threat Talks is a collaboration between <a href="https://on2it.net/" rel="ugc noopener noreferrer">ON2IT</a> and <a href="https://www.ams-ix.net/ams" rel="ugc noopener noreferrer">AMS-IX</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>🎙 Threat Talks: Unpacking the MGM Resorts ALPHV/BlackCat Ransomware Attack 🕵️‍♂️</strong></p>
<p>In this Threat Talk, we dive deep into a cybersecurity incident in 2023: the MGM Resorts ransomware attack by ALPHV/BlackCat and Scattered Spider. From sophisticated social engineering tactics to deploying a shadow identity provider for persistence, this attack demonstrates the capabilities of collaborating ransomware groups. </p>
<p><br></p>
<p>Join cybersecurity experts Lieuwe Jan Koning, Luca Cipriano
(Threat Intel Specialist), and Rob Maas (Field CTO) as they break down: </p>
<ul>
 <li>🔒 How attackers exploited MGM’s Okta environment. </li>
 <li>🎯 The role of phishing and advanced persistence techniques. </li>
</ul>
<ul>
 <li>🚨 Lessons learned and actionable steps to prevent such attacks. </li>
</ul>
<p> </p>
<p><strong>Key Insights</strong></p>
<ul>
 <li>➡ Why Zero Trust and network segmentation are critical. </li>
 <li>➡ The dilemma of paying ransoms vs. operational downtime. </li>
 <li>➡ Practical steps to improve your organization’s ransomware defense strategy. </li>
</ul>
<p><br></p>
<p>If you’re a cybersecurity professional or just curious about the latest in cyber threats, this episode is a must-watch. Stay informed, stay secure! 💻</p>
<p> </p>
<p> 👉 Support the channel: don’t forget to LIKE, COMMENT, and SUBSCRIBE :). </p>
<p><strong>🎧 Available on all major podcast platforms.</strong></p>
<p>► <a href="https://youtube.com/@ThreatTalks" rel="ugc noopener noreferrer">YOUTUBE</a>: <a href="https://youtube.com/@ThreatTalks" rel="ugc noopener noreferrer">https://youtube.com/@ThreatTalks</a> 
► <a href="https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E" rel="ugc noopener noreferrer">SPOTIFY</a>: <a href="https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E" rel="ugc noopener noreferrer">https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E</a>
► <a href="https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520" rel="ugc noopener noreferrer">APPLE</a>: <a href="https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520" rel="ugc noopener noreferrer">https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</a></p>

<p>👕 Receive your Threat Talks T-shirt 👕</p>
<p><a href="https://threat-talks.com/prevent-pay-or-insure/" rel="ugc noopener noreferrer">https://threat-talks.com/prevent-pay-or-insure/</a> </p>

<p>🗺️ Explore the Hack's Route in Detail 🗺️</p>
<p><a href="https://on2it.s3.us-east-1.amazonaws.com/Threat-Talks-Prevent-Pay-or-Insure.pdf" rel="ugc noopener noreferrer">https://on2it.s3.us-east-1.amazonaws.com/Threat-Talks-Prevent-Pay-or-Insure.pdf</a></p>

<p>🕵️ Threat Talks is a collaboration between <a href="https://on2it.net/" rel="ugc noopener noreferrer">ON2IT</a> and <a href="https://www.ams-ix.net/ams" rel="ugc noopener noreferrer">AMS-IX</a></p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Dec 2024 08:27:00 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/1a42f443/28bc6e7e.mp3" length="28123436" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/9uN53qXNFtWUb8QPnHdfh39KxDgOLyEQLJXjbSIRBUs/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81ZTgw/NDkwZTJjMDg3NTgy/ODJiOTYwYTkwMTBh/ZjFlOS5qcGc.jpg"/>
      <itunes:duration>1758</itunes:duration>
      <itunes:summary>🎙 Threat Talks: Unpacking the MGM Resorts ALPHV/BlackCat Ransomware Attack 🕵️‍♂️
In this Threat Talk, we dive deep into a cybersecurity incident in 2023: the MGM Resorts ransomware attack by ALPHV/BlackCat and Scattered Spider. From sophisticated social engineering tactics to deploying a shadow identity provider for persistence, this attack demonstrates the capabilities of collaborating ransomware groups. 

Join cybersecurity experts Lieuwe Jan Koning, Luca Cipriano
(Threat Intel Specialist), and Rob Maas (Field CTO) as they break down: 

 🔒 How attackers exploited MGM’s Okta environment. 
 🎯 The role of phishing and advanced persistence techniques. 


 🚨 Lessons learned and actionable steps to prevent such attacks. 

 
Key Insights

 ➡ Why Zero Trust and network segmentation are critical. 
 ➡ The dilemma of paying ransoms vs. operational downtime. 
 ➡ Practical steps to improve your organization’s ransomware defense strategy. 


If you’re a cybersecurity professional or just curious about the latest in cyber threats, this episode is a must-watch. Stay informed, stay secure! 💻
 
 👉 Support the channel: don’t forget to LIKE, COMMENT, and SUBSCRIBE :). 
🎧 Available on all major podcast platforms.
► YOUTUBE: https://youtube.com/@ThreatTalks 
► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E
► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520
 
👕 Receive your Threat Talks T-shirt 👕
https://threat-talks.com/prevent-pay-or-insure/ 
 
🗺️ Explore the Hack's Route in Detail 🗺️
https://on2it.s3.us-east-1.amazonaws.com/Threat-Talks-Prevent-Pay-or-Insure.pdf
 
🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX</itunes:summary>
      <itunes:subtitle>🎙 Threat Talks: Unpacking the MGM Resorts ALPHV/BlackCat Ransomware Attack 🕵️‍♂️
In this Threat Talk, we dive deep into a cybersecurity incident in 2023: the MGM Resorts ransomware attack by ALPHV/BlackCat and Scattered Spider. From sophisticated social e</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Prevent, Pay or Insure - Threat Talks Cybersecurity Podcast</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>42</itunes:episode>
      <podcast:episode>42</podcast:episode>
      <itunes:title>Prevent, Pay or Insure - Threat Talks Cybersecurity Podcast</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">487658e1-c97d-4673-971a-a580ef9eeb61</guid>
      <link>https://share.transistor.fm/s/7a6a69be</link>
      <description>
        <![CDATA[<p>💰<strong>Prevent, Pay or Insure? </strong>💰</p>
<p>Days before MGM’s computer systems were taken down in a cyberattack, fellow casino operator Caesars paid a $15 million ransom to attackers who infiltrated its systems.</p>
<p>MGM chose not to pay and dealt with different costs because of it - did the two casino giants wind up paying similar amounts down the line? And what role does cybersecurity insurance play in these scenarios?</p>
<p>In this episode of Threat Talks, host Lieuwe Jan Koning and special guest David Hake (co-founder of Resilience, professor of Cyber Risk Management at UC Berkeley and advisor at Venable LLP) discuss these cyberattacks on MGM and Caesars, exploring how organizations can better prepare for and respond to ransomware incidents.</p>
<p>Dialing in to the conversation, Threat Intel Specialist Luca Cipriano offers a preview of our Deep Dives into three critical threats relevant to these attacks, providing valuable technical insights.</p>

<p>The by now age-old dilemma remains: should companies pay ransom or refuse? But beyond that, how can they focus on prevention? And where does cybersecurity insurance fit into
the equation? </p>
<p>If businesses insure their personnel, facilities, and revenue, isn’t it time to also insure their cybersecurity?</p>
<p><br></p>
<p><strong>🔔 Follow and Support our channel! 🔔</strong>
=== 
► YOUTUBE: <a href="https://youtube.com/@ThreatTalks" rel="ugc noopener noreferrer">https://youtube.com/@ThreatTalks</a>
► SPOTIFY: <a href="https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E" rel="ugc noopener noreferrer">https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E</a>
► APPLE: <a href="https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520" rel="ugc noopener noreferrer">https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</a></p>
<p>
👕<strong> Receive your Threat Talks T-shirt </strong>👕<strong> </strong><a href="https://threat-talks.com/prevent-pay-or-insure/" rel="ugc noopener noreferrer">https://threat-talks.com/prevent-pay-or-insure/</a></p>
<p>
🗺️ <strong>Explore the Hack's Route in Detail 🗺️</strong><a href="https://on2it.s3.us-east-1.amazonaws.com/Threat-Talks-Prevent-Pay-or-Insure.pdf" rel="ugc noopener noreferrer">https://on2it.s3.us-east-1.amazonaws.com/Threat-Talks-Prevent-Pay-or-Insure.pdf</a></p>
<p>
🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>💰<strong>Prevent, Pay or Insure? </strong>💰</p>
<p>Days before MGM’s computer systems were taken down in a cyberattack, fellow casino operator Caesars paid a $15 million ransom to attackers who infiltrated its systems.</p>
<p>MGM chose not to pay and dealt with different costs because of it - did the two casino giants wind up paying similar amounts down the line? And what role does cybersecurity insurance play in these scenarios?</p>
<p>In this episode of Threat Talks, host Lieuwe Jan Koning and special guest David Hake (co-founder of Resilience, professor of Cyber Risk Management at UC Berkeley and advisor at Venable LLP) discuss these cyberattacks on MGM and Caesars, exploring how organizations can better prepare for and respond to ransomware incidents.</p>
<p>Dialing in to the conversation, Threat Intel Specialist Luca Cipriano offers a preview of our Deep Dives into three critical threats relevant to these attacks, providing valuable technical insights.</p>

<p>The by now age-old dilemma remains: should companies pay ransom or refuse? But beyond that, how can they focus on prevention? And where does cybersecurity insurance fit into
the equation? </p>
<p>If businesses insure their personnel, facilities, and revenue, isn’t it time to also insure their cybersecurity?</p>
<p><br></p>
<p><strong>🔔 Follow and Support our channel! 🔔</strong>
=== 
► YOUTUBE: <a href="https://youtube.com/@ThreatTalks" rel="ugc noopener noreferrer">https://youtube.com/@ThreatTalks</a>
► SPOTIFY: <a href="https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E" rel="ugc noopener noreferrer">https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E</a>
► APPLE: <a href="https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520" rel="ugc noopener noreferrer">https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</a></p>
<p>
👕<strong> Receive your Threat Talks T-shirt </strong>👕<strong> </strong><a href="https://threat-talks.com/prevent-pay-or-insure/" rel="ugc noopener noreferrer">https://threat-talks.com/prevent-pay-or-insure/</a></p>
<p>
🗺️ <strong>Explore the Hack's Route in Detail 🗺️</strong><a href="https://on2it.s3.us-east-1.amazonaws.com/Threat-Talks-Prevent-Pay-or-Insure.pdf" rel="ugc noopener noreferrer">https://on2it.s3.us-east-1.amazonaws.com/Threat-Talks-Prevent-Pay-or-Insure.pdf</a></p>
<p>
🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Tue, 03 Dec 2024 08:00:00 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/7a6a69be/06fb6d91.mp3" length="56066076" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Z-3RXQlPAAdHlmyj34RerYoP7EUDWXYmHE6bpy__7f8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85Njgz/Zjk2YTYwMzRmYWVk/ZWExZDBmZjcyMDY5/Y2IxZi5qcGc.jpg"/>
      <itunes:duration>3505</itunes:duration>
      <itunes:summary>💰Prevent, Pay or Insure? 💰
Days before MGM’s computer systems were taken down in a cyberattack, fellow casino operator Caesars paid a $15 million ransom to attackers who infiltrated its systems.
MGM chose not to pay and dealt with different costs because of it - did the two casino giants wind up paying similar amounts down the line? And what role does cybersecurity insurance play in these scenarios?
In this episode of Threat Talks, host Lieuwe Jan Koning and special guest David Hake (co-founder of Resilience, professor of Cyber Risk Management at UC Berkeley and advisor at Venable LLP) discuss these cyberattacks on MGM and Caesars, exploring how organizations can better prepare for and respond to ransomware incidents.
Dialing in to the conversation, Threat Intel Specialist Luca Cipriano offers a preview of our Deep Dives into three critical threats relevant to these attacks, providing valuable technical insights.
 
The by now age-old dilemma remains: should companies pay ransom or refuse? But beyond that, how can they focus on prevention? And where does cybersecurity insurance fit into
the equation? 
If businesses insure their personnel, facilities, and revenue, isn’t it time to also insure their cybersecurity?

🔔 Follow and Support our channel! 🔔
=== 
► YOUTUBE: https://youtube.com/@ThreatTalks
► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E
► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520

👕 Receive your Threat Talks T-shirt 👕 https://threat-talks.com/prevent-pay-or-insure/

🗺️ Explore the Hack's Route in Detail 🗺️https://on2it.s3.us-east-1.amazonaws.com/Threat-Talks-Prevent-Pay-or-Insure.pdf

🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX</itunes:summary>
      <itunes:subtitle>💰Prevent, Pay or Insure? 💰
Days before MGM’s computer systems were taken down in a cyberattack, fellow casino operator Caesars paid a $15 million ransom to attackers who infiltrated its systems.
MGM chose not to pay and dealt with different costs because </itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>UNIX CUPS Remote Code Execution - The Fallacy of Default Trust - Threat Talks Cybersecurity Podcast</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>41</itunes:episode>
      <podcast:episode>41</podcast:episode>
      <itunes:title>UNIX CUPS Remote Code Execution - The Fallacy of Default Trust - Threat Talks Cybersecurity Podcast</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">12f7e437-1e5d-49c0-ab27-c85662fb876f</guid>
      <link>https://share.transistor.fm/s/895bd722</link>
      <description>
        <![CDATA[<p><strong>"Hello! I'm a Printer! Please Let Me In!"</strong></p>
<p>“Hello! I’m a printer! Please let me enter, thank you!” – It may sound absurd, but this is how attackers can trick your Linux systems through the cups-browsed service..</p>
<p> </p>
<p>In this latest <em>Threat Talk</em>, Lieuwe-Jan Koning reveals, with ON2IT’s Rob Maas and Luca Cipriano how a seemingly harmless printer can turn into a hacker’s gateway to your network. </p>
<p> </p>
<p>With open ports and weak default configurations, your Linux environment could be more exposed than you think.</p>
<p> </p>
<p>🔒 Tune in to learn how these vulnerabilities can be exploited and, more importantly, what steps you can take to secure your systems. Don’t wait until it’s too late!</p>
<p> </p>
<p>📊 <strong>Bonus Resource</strong>: We’ve created an in-depth <strong>infographic</strong> breaking down these hacks in detailed illustrations—an invaluable tool for all security information professionals!</p>
<p><a href="https://on2it.s3.us-east-1.amazonaws.com/Infographic-security-fallacies.pdf" rel="ugc noopener noreferrer">https://on2it.s3.us-east-1.amazonaws.com/Infographic-security-fallacies.pdf</a></p>
<p><br></p>
<p>🔔<strong> Hit that subscribe button and show your support! </strong>🔔 
=== 
► YOUTUBE: <a href="https://youtube.com/@ThreatTalks" rel="ugc noopener noreferrer">https://youtube.com/@ThreatTalks</a>
► SPOTIFY: <a href="https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E" rel="ugc noopener noreferrer">https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E</a>
► APPLE: <a href="https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520" rel="ugc noopener noreferrer">https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</a>

👕 Receive your Threat Talks T-shirt
<a href="https://threat-talks.com/breaking-the-illusion-exposing-security-fallacies/" rel="ugc noopener noreferrer">https://threat-talks.com/breaking-the-illusion-exposing-security-fallacies/</a>


🕵️ Threat Talks is a collaboration between <a href="https://on2it.net" rel="ugc noopener noreferrer">ON2IT</a> and <a href="https://www.ams-ix.net/ams" rel="ugc noopener noreferrer">AMS-IX</a>

#CUPS #cybersecurityexperts #printers #threattalks eatTalks #techsafety #securitymatters #threatintelligence #cybersecurityexperts #unix</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>"Hello! I'm a Printer! Please Let Me In!"</strong></p>
<p>“Hello! I’m a printer! Please let me enter, thank you!” – It may sound absurd, but this is how attackers can trick your Linux systems through the cups-browsed service..</p>
<p> </p>
<p>In this latest <em>Threat Talk</em>, Lieuwe-Jan Koning reveals, with ON2IT’s Rob Maas and Luca Cipriano how a seemingly harmless printer can turn into a hacker’s gateway to your network. </p>
<p> </p>
<p>With open ports and weak default configurations, your Linux environment could be more exposed than you think.</p>
<p> </p>
<p>🔒 Tune in to learn how these vulnerabilities can be exploited and, more importantly, what steps you can take to secure your systems. Don’t wait until it’s too late!</p>
<p> </p>
<p>📊 <strong>Bonus Resource</strong>: We’ve created an in-depth <strong>infographic</strong> breaking down these hacks in detailed illustrations—an invaluable tool for all security information professionals!</p>
<p><a href="https://on2it.s3.us-east-1.amazonaws.com/Infographic-security-fallacies.pdf" rel="ugc noopener noreferrer">https://on2it.s3.us-east-1.amazonaws.com/Infographic-security-fallacies.pdf</a></p>
<p><br></p>
<p>🔔<strong> Hit that subscribe button and show your support! </strong>🔔 
=== 
► YOUTUBE: <a href="https://youtube.com/@ThreatTalks" rel="ugc noopener noreferrer">https://youtube.com/@ThreatTalks</a>
► SPOTIFY: <a href="https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E" rel="ugc noopener noreferrer">https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E</a>
► APPLE: <a href="https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520" rel="ugc noopener noreferrer">https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</a>

👕 Receive your Threat Talks T-shirt
<a href="https://threat-talks.com/breaking-the-illusion-exposing-security-fallacies/" rel="ugc noopener noreferrer">https://threat-talks.com/breaking-the-illusion-exposing-security-fallacies/</a>


🕵️ Threat Talks is a collaboration between <a href="https://on2it.net" rel="ugc noopener noreferrer">ON2IT</a> and <a href="https://www.ams-ix.net/ams" rel="ugc noopener noreferrer">AMS-IX</a>

#CUPS #cybersecurityexperts #printers #threattalks eatTalks #techsafety #securitymatters #threatintelligence #cybersecurityexperts #unix</p>]]>
      </content:encoded>
      <pubDate>Tue, 26 Nov 2024 08:00:00 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/895bd722/0ab83300.mp3" length="19707428" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Hnp69McxA7Iu6zNnJTSSEzCHNAzHRt9qm9xgrr7KGK0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kMDRh/ZjMyMGFlY2Y3NTI3/M2E1ZjAxNWVhNzIy/MTRhMS5qcGc.jpg"/>
      <itunes:duration>1232</itunes:duration>
      <itunes:summary>"Hello! I'm a Printer! Please Let Me In!"
“Hello! I’m a printer! Please let me enter, thank you!” – It may sound absurd, but this is how attackers can trick your Linux systems through the cups-browsed service..
 
In this latest Threat Talk, Lieuwe-Jan Koning reveals, with ON2IT’s Rob Maas and Luca Cipriano how a seemingly harmless printer can turn into a hacker’s gateway to your network. 
 
With open ports and weak default configurations, your Linux environment could be more exposed than you think.
 
🔒 Tune in to learn how these vulnerabilities can be exploited and, more importantly, what steps you can take to secure your systems. Don’t wait until it’s too late!
 
📊 Bonus Resource: We’ve created an in-depth infographic breaking down these hacks in detailed illustrations—an invaluable tool for all security information professionals!
https://on2it.s3.us-east-1.amazonaws.com/Infographic-security-fallacies.pdf

🔔 Hit that subscribe button and show your support! 🔔 
=== 
► YOUTUBE: https://youtube.com/@ThreatTalks
► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E
► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520

👕 Receive your Threat Talks T-shirt
https://threat-talks.com/breaking-the-illusion-exposing-security-fallacies/


🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX

#CUPS #cybersecurityexperts #printers #threattalks eatTalks #techsafety #securitymatters #threatintelligence #cybersecurityexperts #unix</itunes:summary>
      <itunes:subtitle>"Hello! I'm a Printer! Please Let Me In!"
“Hello! I’m a printer! Please let me enter, thank you!” – It may sound absurd, but this is how attackers can trick your Linux systems through the cups-browsed service..
 
In this latest Threat Talk, Lieuwe-Jan Kon</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>XZ Utils Critical Backdoor (CVE- 2024-3094) - The Fallacy of Secure Open Source Code</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>40</itunes:episode>
      <podcast:episode>40</podcast:episode>
      <itunes:title>XZ Utils Critical Backdoor (CVE- 2024-3094) - The Fallacy of Secure Open Source Code</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b6bc9684-67bb-4511-9bee-a1fd25af3531</guid>
      <link>https://share.transistor.fm/s/d3168d1c</link>
      <description>
        <![CDATA[<p>⏰ <strong>How much time would </strong><em><strong>you</strong></em><strong> spend on executing the perfect hack? </strong>⏰<strong> </strong> </p>
<p>The user going by the name of ‘JIAT75’ spent almost three years infiltrating and contributing to a GitHub repo for one singular reason – access to release manager rights for the next XZ Utils update. </p>
<p><br></p>
<p>In this episode of Threat Talks, host Lieuwe Jan Koning is joined by Thomas Manolis, Information Security Officer at AMS-IX, and Jeroen Scheerder, Security Specialist at ON2IT, to discuss this meticulously executed breach in the open-source community.</p>
<p> </p>
<p>Using clever social engineering tactics, Jia Tan (JIAT75) built a credible reputation within said community, gaining trust and access to introduce malicious code undetected. The breach was only discovered by chance when Andres Freund, an engineer at Microsoft, traced unusual system latency back to XZ Utils and uncovered the backdoor.</p>
<p> </p>
<p>What exactly happened? </p>
<p>How lucky did we get with Freund discovering the backdoor? And how do we know that something like this hasn’t happened before? </p>
<p>
🔔 <strong>Follow to Support our channel! </strong>🔔
► YOUTUBE: <a href="https://youtube.com/@ThreatTalks" rel="ugc noopener noreferrer">https://youtube.com/@ThreatTalks</a></p>
<p>► SPOTIFY: <a href="https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E" rel="ugc noopener noreferrer">https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E</a></p>
<p>► APPLE: <a href="https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520" rel="ugc noopener noreferrer">https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</a></p>
<p><br></p>
<p>🗾 <strong>Explore the XZ Utils Critical Backdoor Details </strong>🗾</p>
<p><br><a href="https://on2it.s3.us-east-1.amazonaws.com/Infographic-security-fallacies.pdf" rel="ugc noopener noreferrer">https://on2it.s3.us-east-1.amazonaws.com/Infographic-security-fallacies.pdf</a></p>
<p>Our exclusive infographic <strong>maps out the step-by-step tactics</strong> hackers use to exploit these vulnerabilities. <strong>Perfect for IT teams and Information Security Officers</strong>, it’s designed to help you stay one step ahead.</p>
<p> </p>
<p><strong>👕 Get your own Threat Talks T-shirt </strong></p>
<p><a href="https://threat-talks.com/breaking-the-illusion-exposing-security-fallacies/" rel="ugc noopener noreferrer">https://threat-talks.com/breaking-the-illusion-exposing-security-fallacies/</a></p>
<p> </p>
<p>🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX </p>
<p>=== </p>
<p>#ThreatTalks #ON2IT #Cybersecurity #Fallacies #CrowdStrike #SecurityMatters </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>⏰ <strong>How much time would </strong><em><strong>you</strong></em><strong> spend on executing the perfect hack? </strong>⏰<strong> </strong> </p>
<p>The user going by the name of ‘JIAT75’ spent almost three years infiltrating and contributing to a GitHub repo for one singular reason – access to release manager rights for the next XZ Utils update. </p>
<p><br></p>
<p>In this episode of Threat Talks, host Lieuwe Jan Koning is joined by Thomas Manolis, Information Security Officer at AMS-IX, and Jeroen Scheerder, Security Specialist at ON2IT, to discuss this meticulously executed breach in the open-source community.</p>
<p> </p>
<p>Using clever social engineering tactics, Jia Tan (JIAT75) built a credible reputation within said community, gaining trust and access to introduce malicious code undetected. The breach was only discovered by chance when Andres Freund, an engineer at Microsoft, traced unusual system latency back to XZ Utils and uncovered the backdoor.</p>
<p> </p>
<p>What exactly happened? </p>
<p>How lucky did we get with Freund discovering the backdoor? And how do we know that something like this hasn’t happened before? </p>
<p>
🔔 <strong>Follow to Support our channel! </strong>🔔
► YOUTUBE: <a href="https://youtube.com/@ThreatTalks" rel="ugc noopener noreferrer">https://youtube.com/@ThreatTalks</a></p>
<p>► SPOTIFY: <a href="https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E" rel="ugc noopener noreferrer">https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E</a></p>
<p>► APPLE: <a href="https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520" rel="ugc noopener noreferrer">https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</a></p>
<p><br></p>
<p>🗾 <strong>Explore the XZ Utils Critical Backdoor Details </strong>🗾</p>
<p><br><a href="https://on2it.s3.us-east-1.amazonaws.com/Infographic-security-fallacies.pdf" rel="ugc noopener noreferrer">https://on2it.s3.us-east-1.amazonaws.com/Infographic-security-fallacies.pdf</a></p>
<p>Our exclusive infographic <strong>maps out the step-by-step tactics</strong> hackers use to exploit these vulnerabilities. <strong>Perfect for IT teams and Information Security Officers</strong>, it’s designed to help you stay one step ahead.</p>
<p> </p>
<p><strong>👕 Get your own Threat Talks T-shirt </strong></p>
<p><a href="https://threat-talks.com/breaking-the-illusion-exposing-security-fallacies/" rel="ugc noopener noreferrer">https://threat-talks.com/breaking-the-illusion-exposing-security-fallacies/</a></p>
<p> </p>
<p>🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX </p>
<p>=== </p>
<p>#ThreatTalks #ON2IT #Cybersecurity #Fallacies #CrowdStrike #SecurityMatters </p>]]>
      </content:encoded>
      <pubDate>Tue, 19 Nov 2024 08:00:00 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/d3168d1c/aa974b58.mp3" length="28405980" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/bhRHoAGOPsVRfppOCFWGYb8cH5FkvaB6fiWjse2Kw_E/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lNGEx/MTVmYjAwZWU5ZWQz/N2YxYjRlMWI0NGJm/YjE1Yy5qcGc.jpg"/>
      <itunes:duration>1776</itunes:duration>
      <itunes:summary>⏰ How much time would you spend on executing the perfect hack? ⏰  
The user going by the name of ‘JIAT75’ spent almost three years infiltrating and contributing to a GitHub repo for one singular reason – access to release manager rights for the next XZ Utils update. 

In this episode of Threat Talks, host Lieuwe Jan Koning is joined by Thomas Manolis, Information Security Officer at AMS-IX, and Jeroen Scheerder, Security Specialist at ON2IT, to discuss this meticulously executed breach in the open-source community.
 
Using clever social engineering tactics, Jia Tan (JIAT75) built a credible reputation within said community, gaining trust and access to introduce malicious code undetected. The breach was only discovered by chance when Andres Freund, an engineer at Microsoft, traced unusual system latency back to XZ Utils and uncovered the backdoor.
 
What exactly happened? 
How lucky did we get with Freund discovering the backdoor? And how do we know that something like this hasn’t happened before? 

🔔 Follow to Support our channel! 🔔
► YOUTUBE: https://youtube.com/@ThreatTalks
► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E
► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520

🗾 Explore the XZ Utils Critical Backdoor Details 🗾
https://on2it.s3.us-east-1.amazonaws.com/Infographic-security-fallacies.pdf
Our exclusive infographic maps out the step-by-step tactics hackers use to exploit these vulnerabilities. Perfect for IT teams and Information Security Officers, it’s designed to help you stay one step ahead.
 
👕 Get your own Threat Talks T-shirt 
https://threat-talks.com/breaking-the-illusion-exposing-security-fallacies/
 
🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX 
=== 
#ThreatTalks #ON2IT #Cybersecurity #Fallacies #CrowdStrike #SecurityMatters </itunes:summary>
      <itunes:subtitle>⏰ How much time would you spend on executing the perfect hack? ⏰  
The user going by the name of ‘JIAT75’ spent almost three years infiltrating and contributing to a GitHub repo for one singular reason – access to release manager rights for the next XZ Ut</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>CrowdStrike Auto-Update Disaster - Threat Talks Cybersecurity Podcast</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>39</itunes:episode>
      <podcast:episode>39</podcast:episode>
      <itunes:title>CrowdStrike Auto-Update Disaster - Threat Talks Cybersecurity Podcast</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2193d72c-a312-4525-8db2-c6ec10cc7d13</guid>
      <link>https://share.transistor.fm/s/276318fd</link>
      <description>
        <![CDATA[<p>☠️<strong> CrowdStrike: 8.5 million blue screens of death </strong>☠️</p>
<p>Did you know that last July’s CrowdStrike outage led to closed airports, inaccessible bank accounts and hospitals that were only delivering emergency care that did not require any computers?</p>
<p> </p>
<p>In this <em>Threat Talk</em>, Lieuwe Jan Koning is joined by Rob Maas and Jeroen Scheerder as they discuss the CrowdStrike outage and, more importantly, what could have been done to prevent such an impactful event from happening in the first place. </p>
<p> </p>
<p>What exactly are the inherent risks of automatic updates? And can they be set up in such a way that what happened with CrowdStrike won’t happen again?</p>
<p>
🔔 <strong>Follow and Support our channel! </strong>🔔
=== 
► YOUTUBE: <a href="https://youtube.com/@ThreatTalks" rel="ugc noopener noreferrer">https://youtube.com/@ThreatTalks</a>
► SPOTIFY: <a href="https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E" rel="ugc noopener noreferrer">https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E</a>
► APPLE: <a href="https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520" rel="ugc noopener noreferrer">https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</a>

👕 <strong>Get your own Threat Talks T-shirt</strong></p>
<p><strong></strong><a href="https://threat-talks.com/breaking-the-illusion-exposing-security-fallacies/" rel="ugc noopener noreferrer">https://threat-talks.com/breaking-the-illusion-exposing-security-fallacies/</a></p>
<p><br></p>
<p>🗾 <strong>Explore the CrowdStrike Outage's Details </strong>🗾<br>Our exclusive infographic <strong>maps out the step-by-step tactics</strong> hackers use to exploit these vulnerabilities. <strong>Perfect for IT teams and Information Security Officers</strong>, it’s designed to help you stay one step ahead.</p>
<p><a href="https://on2it.s3.us-east-1.amazonaws.com/Infographic-security-fallacies.pdf" rel="ugc noopener noreferrer">https://on2it.s3.us-east-1.amazonaws.com/Infographic-security-fallacies.pdf</a>

🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>☠️<strong> CrowdStrike: 8.5 million blue screens of death </strong>☠️</p>
<p>Did you know that last July’s CrowdStrike outage led to closed airports, inaccessible bank accounts and hospitals that were only delivering emergency care that did not require any computers?</p>
<p> </p>
<p>In this <em>Threat Talk</em>, Lieuwe Jan Koning is joined by Rob Maas and Jeroen Scheerder as they discuss the CrowdStrike outage and, more importantly, what could have been done to prevent such an impactful event from happening in the first place. </p>
<p> </p>
<p>What exactly are the inherent risks of automatic updates? And can they be set up in such a way that what happened with CrowdStrike won’t happen again?</p>
<p>
🔔 <strong>Follow and Support our channel! </strong>🔔
=== 
► YOUTUBE: <a href="https://youtube.com/@ThreatTalks" rel="ugc noopener noreferrer">https://youtube.com/@ThreatTalks</a>
► SPOTIFY: <a href="https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E" rel="ugc noopener noreferrer">https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E</a>
► APPLE: <a href="https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520" rel="ugc noopener noreferrer">https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520</a>

👕 <strong>Get your own Threat Talks T-shirt</strong></p>
<p><strong></strong><a href="https://threat-talks.com/breaking-the-illusion-exposing-security-fallacies/" rel="ugc noopener noreferrer">https://threat-talks.com/breaking-the-illusion-exposing-security-fallacies/</a></p>
<p><br></p>
<p>🗾 <strong>Explore the CrowdStrike Outage's Details </strong>🗾<br>Our exclusive infographic <strong>maps out the step-by-step tactics</strong> hackers use to exploit these vulnerabilities. <strong>Perfect for IT teams and Information Security Officers</strong>, it’s designed to help you stay one step ahead.</p>
<p><a href="https://on2it.s3.us-east-1.amazonaws.com/Infographic-security-fallacies.pdf" rel="ugc noopener noreferrer">https://on2it.s3.us-east-1.amazonaws.com/Infographic-security-fallacies.pdf</a>

🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Tue, 12 Nov 2024 08:00:00 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/276318fd/cfbaa3f7.mp3" length="21637952" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/4T1W8gtehdFYHlETr9Fj61rDYOCMTOaZML3NDn46OlQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zMDAy/ODVkZGEwMWFkZWQx/OGYwZDM2Y2Q2ZDhh/MzY0Yi5qcGc.jpg"/>
      <itunes:duration>1353</itunes:duration>
      <itunes:summary>☠️ CrowdStrike: 8.5 million blue screens of death ☠️
Did you know that last July’s CrowdStrike outage led to closed airports, inaccessible bank accounts and hospitals that were only delivering emergency care that did not require any computers?
 
In this Threat Talk, Lieuwe Jan Koning is joined by Rob Maas and Jeroen Scheerder as they discuss the CrowdStrike outage and, more importantly, what could have been done to prevent such an impactful event from happening in the first place. 
 
What exactly are the inherent risks of automatic updates? And can they be set up in such a way that what happened with CrowdStrike won’t happen again?

🔔 Follow and Support our channel! 🔔
=== 
► YOUTUBE: https://youtube.com/@ThreatTalks
► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E
► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520

👕 Get your own Threat Talks T-shirt
https://threat-talks.com/breaking-the-illusion-exposing-security-fallacies/

🗾 Explore the CrowdStrike Outage's Details 🗾Our exclusive infographic maps out the step-by-step tactics hackers use to exploit these vulnerabilities. Perfect for IT teams and Information Security Officers, it’s designed to help you stay one step ahead.
https://on2it.s3.us-east-1.amazonaws.com/Infographic-security-fallacies.pdf

🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX</itunes:summary>
      <itunes:subtitle>☠️ CrowdStrike: 8.5 million blue screens of death ☠️
Did you know that last July’s CrowdStrike outage led to closed airports, inaccessible bank accounts and hospitals that were only delivering emergency care that did not require any computers?
 
In this T</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Breaking the Illusion: Exposing Security Fallacies - Threat Talks Cybersecurity Podcast</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>38</itunes:episode>
      <podcast:episode>38</podcast:episode>
      <itunes:title>Breaking the Illusion: Exposing Security Fallacies - Threat Talks Cybersecurity Podcast</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">91e48a3a-ac0e-40a1-9df5-b13bb38729d4</guid>
      <link>https://share.transistor.fm/s/c4306ed5</link>
      <description>
        <![CDATA[<p><strong>🔍 Breaking the Illusion: Confronting Cybersecurity’s Biggest Fallacies 🔍</strong></p>
<p>Think you know the route a hacker might take? Think
again! In this eye-opening <em>Threat Talk</em>, Lieuwe Jan Koning dives into the critical fallacies of cybersecurity with top experts Fleur van Leusden, CISO and host of <em>CISO Praat</em>, and Jeroen Scheerder.</p>

<p>✨ Fleur unpacks one of the industry’s biggest blind spots: the heavy reliance on user awareness as a defense mechanism. While user education has its place, she argues it’s not enough to withstand today’s sophisticated threats. Instead, Fleur and Jeroen explore the essential need for technical controls and resilient systems that go beyond awareness alone.</p>
<p>🔥 Rethink conventional strategies, dissect the recent CrowdStrike auto-update disaster, the XZ Utils backdoor (CVE-2024-3094), and a UNIX CUPS vulnerability 🖨️—revealing why proactive, layered defenses are the only way forward.</p>
<p>Don’t miss this essential discussion on the true foundations of cybersecurity! 🛠️🔒</p>
<p>=== </p>
<p>🗺️ <strong>Explore the Hack's Route in Detail</strong> 🗺️
Our exclusive infographic <strong>maps out the step-by-step tactics</strong> hackers. <strong>Perfect for IT teams and Information Security Officers.</strong></p>
<p>https://on2it.s3.us-east-1.amazonaws.com/Infographic-security-fallacies.pdf</p>
<p><br></p>
<p>👕 Receive your Threat Talks T-shirt
https://threat-talks.com/breaking-the-illusion-exposing-security-fallacies/</p>
<p>
#ThreatTalks #ON2IT #Cybersecurity #Fallacies #CrowdStrike #UNIXCUPS #XZUtils #SecurityMatters </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>🔍 Breaking the Illusion: Confronting Cybersecurity’s Biggest Fallacies 🔍</strong></p>
<p>Think you know the route a hacker might take? Think
again! In this eye-opening <em>Threat Talk</em>, Lieuwe Jan Koning dives into the critical fallacies of cybersecurity with top experts Fleur van Leusden, CISO and host of <em>CISO Praat</em>, and Jeroen Scheerder.</p>

<p>✨ Fleur unpacks one of the industry’s biggest blind spots: the heavy reliance on user awareness as a defense mechanism. While user education has its place, she argues it’s not enough to withstand today’s sophisticated threats. Instead, Fleur and Jeroen explore the essential need for technical controls and resilient systems that go beyond awareness alone.</p>
<p>🔥 Rethink conventional strategies, dissect the recent CrowdStrike auto-update disaster, the XZ Utils backdoor (CVE-2024-3094), and a UNIX CUPS vulnerability 🖨️—revealing why proactive, layered defenses are the only way forward.</p>
<p>Don’t miss this essential discussion on the true foundations of cybersecurity! 🛠️🔒</p>
<p>=== </p>
<p>🗺️ <strong>Explore the Hack's Route in Detail</strong> 🗺️
Our exclusive infographic <strong>maps out the step-by-step tactics</strong> hackers. <strong>Perfect for IT teams and Information Security Officers.</strong></p>
<p>https://on2it.s3.us-east-1.amazonaws.com/Infographic-security-fallacies.pdf</p>
<p><br></p>
<p>👕 Receive your Threat Talks T-shirt
https://threat-talks.com/breaking-the-illusion-exposing-security-fallacies/</p>
<p>
#ThreatTalks #ON2IT #Cybersecurity #Fallacies #CrowdStrike #UNIXCUPS #XZUtils #SecurityMatters </p>]]>
      </content:encoded>
      <pubDate>Tue, 05 Nov 2024 08:00:00 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/c4306ed5/eb32fbab.mp3" length="51387468" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/MsuU-7eXahYvS7kBNlSH0kUzCoQL5N56MeQK2hCMOMw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xZWRl/MWM1NzM4ZjJmZjgz/ZTYzNWEwNTUxYjNi/MjQwMC5qcGc.jpg"/>
      <itunes:duration>3212</itunes:duration>
      <itunes:summary>🔍 Breaking the Illusion: Confronting Cybersecurity’s Biggest Fallacies 🔍
Think you know the route a hacker might take? Think
again! In this eye-opening Threat Talk, Lieuwe Jan Koning dives into the critical fallacies of cybersecurity with top experts Fleur van Leusden, CISO and host of CISO Praat, and Jeroen Scheerder.
 
✨ Fleur unpacks one of the industry’s biggest blind spots: the heavy reliance on user awareness as a defense mechanism. While user education has its place, she argues it’s not enough to withstand today’s sophisticated threats. Instead, Fleur and Jeroen explore the essential need for technical controls and resilient systems that go beyond awareness alone.
🔥 Rethink conventional strategies, dissect the recent CrowdStrike auto-update disaster, the XZ Utils backdoor (CVE-2024-3094), and a UNIX CUPS vulnerability 🖨️—revealing why proactive, layered defenses are the only way forward.
Don’t miss this essential discussion on the true foundations of cybersecurity! 🛠️🔒
=== 
🗺️ Explore the Hack's Route in Detail 🗺️
Our exclusive infographic maps out the step-by-step tactics hackers. Perfect for IT teams and Information Security Officers.
https://on2it.s3.us-east-1.amazonaws.com/Infographic-security-fallacies.pdf

👕 Receive your Threat Talks T-shirt
https://threat-talks.com/breaking-the-illusion-exposing-security-fallacies/

#ThreatTalks #ON2IT #Cybersecurity #Fallacies #CrowdStrike #UNIXCUPS #XZUtils #SecurityMatters </itunes:summary>
      <itunes:subtitle>🔍 Breaking the Illusion: Confronting Cybersecurity’s Biggest Fallacies 🔍
Think you know the route a hacker might take? Think
again! In this eye-opening Threat Talk, Lieuwe Jan Koning dives into the critical fallacies of cybersecurity with top experts Fleu</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Binance BNB Smartchain Attack - Deep Dive - Threat Talks Cybersecurity Podcast</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>37</itunes:episode>
      <podcast:episode>37</podcast:episode>
      <itunes:title>Binance BNB Smartchain Attack - Deep Dive - Threat Talks Cybersecurity Podcast</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">98df72e9-a995-43e4-ad4d-77f7e3c7f1bf</guid>
      <link>https://share.transistor.fm/s/91276365</link>
      <description>
        <![CDATA[<p><strong>Imagine creating millions in cryptocurrency…without spending a cent. 💸</strong></p>

<p>🔍 Explore the Binance BNB Chain Attack, where attackers used cross-chain bridges to create crypto assets out of thin air.</p>

<p>👾 Dive into the exploit’s details, from blockchain’s cryptographic structures to vulnerabilities in cross-chain transfers. With breakdowns of Merkle trees and validation flaws, this discussion reveals how even minor misconfigurations can lead to massive security gaps.</p>
<p>
🔍 Curious about blockchain risks and crypto asset security? Want to gain insight into safeguarding assets in a digital-first world? &gt;&gt; Check this episode!</p>
<p><br></p>
<p>===
📈 <strong>Download the infographic </strong></p>
<p><a href="https://on2it.s3.amazonaws.com/Infographic-breaking-the-bank.pdf" rel="ugc noopener noreferrer">https://on2it.s3.amazonaws.com/Infographic-breaking-the-bank.pdf</a></p>
<p>👕 <strong>Request your own Threat Talks T-shirt</strong></p>
<p><a href="https://threat-talks.com/breaking-the-bank/" rel="ugc noopener noreferrer">⁠https://threat-talks.com/breaking-the-bank/</a></p>
<p><br></p>
<p>🕵️ Threat Talks is a collaboration between <a href="https://on2it.net" rel="ugc noopener noreferrer">ON2IT</a> and <a href="https://www.ams-ix.net/ams" rel="ugc noopener noreferrer">AMS-IX</a>.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Imagine creating millions in cryptocurrency…without spending a cent. 💸</strong></p>

<p>🔍 Explore the Binance BNB Chain Attack, where attackers used cross-chain bridges to create crypto assets out of thin air.</p>

<p>👾 Dive into the exploit’s details, from blockchain’s cryptographic structures to vulnerabilities in cross-chain transfers. With breakdowns of Merkle trees and validation flaws, this discussion reveals how even minor misconfigurations can lead to massive security gaps.</p>
<p>
🔍 Curious about blockchain risks and crypto asset security? Want to gain insight into safeguarding assets in a digital-first world? &gt;&gt; Check this episode!</p>
<p><br></p>
<p>===
📈 <strong>Download the infographic </strong></p>
<p><a href="https://on2it.s3.amazonaws.com/Infographic-breaking-the-bank.pdf" rel="ugc noopener noreferrer">https://on2it.s3.amazonaws.com/Infographic-breaking-the-bank.pdf</a></p>
<p>👕 <strong>Request your own Threat Talks T-shirt</strong></p>
<p><a href="https://threat-talks.com/breaking-the-bank/" rel="ugc noopener noreferrer">⁠https://threat-talks.com/breaking-the-bank/</a></p>
<p><br></p>
<p>🕵️ Threat Talks is a collaboration between <a href="https://on2it.net" rel="ugc noopener noreferrer">ON2IT</a> and <a href="https://www.ams-ix.net/ams" rel="ugc noopener noreferrer">AMS-IX</a>.</p>]]>
      </content:encoded>
      <pubDate>Tue, 29 Oct 2024 08:00:00 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/91276365/a713db5e.mp3" length="24979126" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/gLSn6qBdiYPPct3OnZFy-vzlgxB_whOnVBxNhIS4Z9Q/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85MDRh/MTI5ZjVlMDZjOWFl/YWQ1MzM2Yzg5M2Rm/NjI4Ni5qcGc.jpg"/>
      <itunes:duration>1562</itunes:duration>
      <itunes:summary>Imagine creating millions in cryptocurrency…without spending a cent. 💸
 
🔍 Explore the Binance BNB Chain Attack, where attackers used cross-chain bridges to create crypto assets out of thin air.
 
👾 Dive into the exploit’s details, from blockchain’s cryptographic structures to vulnerabilities in cross-chain transfers. With breakdowns of Merkle trees and validation flaws, this discussion reveals how even minor misconfigurations can lead to massive security gaps.

🔍 Curious about blockchain risks and crypto asset security? Want to gain insight into safeguarding assets in a digital-first world? &amp;gt;&amp;gt; Check this episode!

===
📈 Download the infographic 
https://on2it.s3.amazonaws.com/Infographic-breaking-the-bank.pdf
👕 Request your own Threat Talks T-shirt
⁠https://threat-talks.com/breaking-the-bank/

🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX.</itunes:summary>
      <itunes:subtitle>Imagine creating millions in cryptocurrency…without spending a cent. 💸
 
🔍 Explore the Binance BNB Chain Attack, where attackers used cross-chain bridges to create crypto assets out of thin air.
 
👾 Dive into the exploit’s details, from blockchain’s crypt</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Hack the Boat Ballast System - Deep Dive - Threat Talks Cybersecurity Podcast</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>36</itunes:episode>
      <podcast:episode>36</podcast:episode>
      <itunes:title>Hack the Boat Ballast System - Deep Dive - Threat Talks Cybersecurity Podcast</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">43f8bdfc-36e6-443d-b676-b056d620b4e1</guid>
      <link>https://share.transistor.fm/s/c141e40d</link>
      <description>
        <![CDATA[<p>𝐄𝐯𝐞𝐫 𝐛𝐞𝐞𝐧 𝐚𝐬𝐤𝐞𝐝 𝐭𝐨 𝐡𝐚𝐜𝐤 𝐚 𝐛𝐨𝐚𝐭?

When Luca Cipriano and Jeroen Scheerder were given the challenge, they took an unexpected approach—step one: build the boat themselves.

It was a scale model, but they made sure it closely mirrored a real boat’s systems. With help from Damen Shipyards engineers, they even included a working ballast system.

Of course the next step was to hack said ballast system.

In this Threat Talks episode, Lieuwe Jan Koning chats with Luca and Jeroen about building the boat, why they did it, the fun they had along the way and whether or not their plan worked. They also dive into how they hacked the ballast system and how such an attack could’ve been prevented.

𝐃𝐨𝐧’𝐭 𝐦𝐢𝐬𝐬 𝐨𝐮𝐭! 
🔔 𝘚𝘶𝘣𝘴𝘤𝘳𝘪𝘣𝘦 🔔 and stay tuned for fascinating deep dives into the world of cybersecurity. 

===
-- 🌎 -- <a href="https://threat-talks.com" rel="ugc noopener noreferrer">threat-talks.com</a>
-- 📈 -- Threat Talks infographics 
-- 👕 -- Receive your own Threat Talks T-shirt

🕵️ Threat Talks is a collaboration between <a href="https://on2it.net" rel="ugc noopener noreferrer">ON2IT</a> and <a href="https://ams-ix.net/ams" rel="ugc noopener noreferrer">AMS-IX</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>𝐄𝐯𝐞𝐫 𝐛𝐞𝐞𝐧 𝐚𝐬𝐤𝐞𝐝 𝐭𝐨 𝐡𝐚𝐜𝐤 𝐚 𝐛𝐨𝐚𝐭?

When Luca Cipriano and Jeroen Scheerder were given the challenge, they took an unexpected approach—step one: build the boat themselves.

It was a scale model, but they made sure it closely mirrored a real boat’s systems. With help from Damen Shipyards engineers, they even included a working ballast system.

Of course the next step was to hack said ballast system.

In this Threat Talks episode, Lieuwe Jan Koning chats with Luca and Jeroen about building the boat, why they did it, the fun they had along the way and whether or not their plan worked. They also dive into how they hacked the ballast system and how such an attack could’ve been prevented.

𝐃𝐨𝐧’𝐭 𝐦𝐢𝐬𝐬 𝐨𝐮𝐭! 
🔔 𝘚𝘶𝘣𝘴𝘤𝘳𝘪𝘣𝘦 🔔 and stay tuned for fascinating deep dives into the world of cybersecurity. 

===
-- 🌎 -- <a href="https://threat-talks.com" rel="ugc noopener noreferrer">threat-talks.com</a>
-- 📈 -- Threat Talks infographics 
-- 👕 -- Receive your own Threat Talks T-shirt

🕵️ Threat Talks is a collaboration between <a href="https://on2it.net" rel="ugc noopener noreferrer">ON2IT</a> and <a href="https://ams-ix.net/ams" rel="ugc noopener noreferrer">AMS-IX</a></p>]]>
      </content:encoded>
      <pubDate>Tue, 22 Oct 2024 08:00:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/c141e40d/351cf6c7.mp3" length="24091380" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/uMlJYeDWjBUdMydmp44NjUUH2wTjyoRlsO_aDKqr4OE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80N2M5/NmY1ZDc0N2Q5YWU3/YTk1MDk4YjA1ZDgw/YzU4NC5qcGc.jpg"/>
      <itunes:duration>1506</itunes:duration>
      <itunes:summary>𝐄𝐯𝐞𝐫 𝐛𝐞𝐞𝐧 𝐚𝐬𝐤𝐞𝐝 𝐭𝐨 𝐡𝐚𝐜𝐤 𝐚 𝐛𝐨𝐚𝐭?

When Luca Cipriano and Jeroen Scheerder were given the challenge, they took an unexpected approach—step one: build the boat themselves.

It was a scale model, but they made sure it closely mirrored a real boat’s systems. With help from Damen Shipyards engineers, they even included a working ballast system.

Of course the next step was to hack said ballast system.

In this Threat Talks episode, Lieuwe Jan Koning chats with Luca and Jeroen about building the boat, why they did it, the fun they had along the way and whether or not their plan worked. They also dive into how they hacked the ballast system and how such an attack could’ve been prevented.

𝐃𝐨𝐧’𝐭 𝐦𝐢𝐬𝐬 𝐨𝐮𝐭! 
🔔 𝘚𝘶𝘣𝘴𝘤𝘳𝘪𝘣𝘦 🔔 and stay tuned for fascinating deep dives into the world of cybersecurity. 

===
-- 🌎 -- threat-talks.com
-- 📈 -- Threat Talks infographics 
-- 👕 -- Receive your own Threat Talks T-shirt

🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX</itunes:summary>
      <itunes:subtitle>𝐄𝐯𝐞𝐫 𝐛𝐞𝐞𝐧 𝐚𝐬𝐤𝐞𝐝 𝐭𝐨 𝐡𝐚𝐜𝐤 𝐚 𝐛𝐨𝐚𝐭?

When Luca Cipriano and Jeroen Scheerder were given the challenge, they took an unexpected approach—step one: build the boat themselves.

It was a scale model, but they made sure it closely mirrored a real boat’s systems. W</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Securing AIS - Deep Dive - Threat Talks Cybersecurity Podcast</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>35</itunes:episode>
      <podcast:episode>35</podcast:episode>
      <itunes:title>Securing AIS - Deep Dive - Threat Talks Cybersecurity Podcast</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8a7291ff-5429-47a1-897e-0e85f5532b45</guid>
      <link>https://share.transistor.fm/s/8641755a</link>
      <description>
        <![CDATA[<p><strong>AIS (Advanced Identification System) is a key tool in maritime navigation. </strong></p>
<p><br></p>
<p>It helps ships transmit their location and data to other vessels and satellites, preventing collisions and supporting rescue operations. 🛟
 
It’s a crucial technology for navigating 🗺️ the unpredictable oceans 🌊 —but it’s not without its vulnerabilities.
 
🏴‍☠️ Pirates can use AIS to track high-value ships, and hackers can manipulate the system. Picture this: your ship is safely docked, but hackers make it appear as if it’s entering dangerous, hostile waters. This tactic, known as spoofing, doesn’t just mess with a ship’s navigation—it can send out false reports to military or civilian observers, creating chaos and confusion.
 
Just imagine the stakes in a situation with rising military tension – if it suddenly seems like your warships are showing up in enemy harbors, the risk of conflict skyrockets, to say the least. 🔥

In this Deep Dive, host Lieuwe Jan Koning, along with guests Rob Maas and Jeroen Scheerder, explore the potential dangers of AIS hacking and what steps can be taken to make this vital system more secure and trustworthy for the future.

===
📈 Find our infographics and 👕 receive your own Threat Talks T-shirt: <a href="https://threat-talks.com" rel="ugc noopener noreferrer">https://threat-talks.com</a></p>
<p> 
🕵️ Threat Talks is a collaboration between <a href="https://on2it.net" rel="ugc noopener noreferrer">ON2IT</a> and <a href="https://www.ams-ix.net/ams" rel="ugc noopener noreferrer">AMS-IX</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>AIS (Advanced Identification System) is a key tool in maritime navigation. </strong></p>
<p><br></p>
<p>It helps ships transmit their location and data to other vessels and satellites, preventing collisions and supporting rescue operations. 🛟
 
It’s a crucial technology for navigating 🗺️ the unpredictable oceans 🌊 —but it’s not without its vulnerabilities.
 
🏴‍☠️ Pirates can use AIS to track high-value ships, and hackers can manipulate the system. Picture this: your ship is safely docked, but hackers make it appear as if it’s entering dangerous, hostile waters. This tactic, known as spoofing, doesn’t just mess with a ship’s navigation—it can send out false reports to military or civilian observers, creating chaos and confusion.
 
Just imagine the stakes in a situation with rising military tension – if it suddenly seems like your warships are showing up in enemy harbors, the risk of conflict skyrockets, to say the least. 🔥

In this Deep Dive, host Lieuwe Jan Koning, along with guests Rob Maas and Jeroen Scheerder, explore the potential dangers of AIS hacking and what steps can be taken to make this vital system more secure and trustworthy for the future.

===
📈 Find our infographics and 👕 receive your own Threat Talks T-shirt: <a href="https://threat-talks.com" rel="ugc noopener noreferrer">https://threat-talks.com</a></p>
<p> 
🕵️ Threat Talks is a collaboration between <a href="https://on2it.net" rel="ugc noopener noreferrer">ON2IT</a> and <a href="https://www.ams-ix.net/ams" rel="ugc noopener noreferrer">AMS-IX</a></p>]]>
      </content:encoded>
      <pubDate>Tue, 15 Oct 2024 08:00:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/8641755a/1e6ae8cc.mp3" length="19113888" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/1K-nr1ckSfJHq3QZDrtKld7LRmY0Z-Rtf1CLRVkdpmU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85ZDQw/OTY0Y2RmOThkZTMw/MDJlZjU3MDVjZDU2/NWMxOS5qcGc.jpg"/>
      <itunes:duration>1195</itunes:duration>
      <itunes:summary>AIS (Advanced Identification System) is a key tool in maritime navigation. 

It helps ships transmit their location and data to other vessels and satellites, preventing collisions and supporting rescue operations. 🛟
 
It’s a crucial technology for navigating 🗺️ the unpredictable oceans 🌊 —but it’s not without its vulnerabilities.
 
🏴‍☠️ Pirates can use AIS to track high-value ships, and hackers can manipulate the system. Picture this: your ship is safely docked, but hackers make it appear as if it’s entering dangerous, hostile waters. This tactic, known as spoofing, doesn’t just mess with a ship’s navigation—it can send out false reports to military or civilian observers, creating chaos and confusion.
 
Just imagine the stakes in a situation with rising military tension – if it suddenly seems like your warships are showing up in enemy harbors, the risk of conflict skyrockets, to say the least. 🔥

In this Deep Dive, host Lieuwe Jan Koning, along with guests Rob Maas and Jeroen Scheerder, explore the potential dangers of AIS hacking and what steps can be taken to make this vital system more secure and trustworthy for the future.

===
📈 Find our infographics and 👕 receive your own Threat Talks T-shirt: https://threat-talks.com
 
🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX</itunes:summary>
      <itunes:subtitle>AIS (Advanced Identification System) is a key tool in maritime navigation. 

It helps ships transmit their location and data to other vessels and satellites, preventing collisions and supporting rescue operations. 🛟
 
It’s a crucial technology for navigat</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>🚢 Hack the Boat - Threat Talks Cybersecurity Podcast</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>34</itunes:episode>
      <podcast:episode>34</podcast:episode>
      <itunes:title>🚢 Hack the Boat - Threat Talks Cybersecurity Podcast</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c391a165-018e-4fe1-af88-7975bd947ebd</guid>
      <link>https://share.transistor.fm/s/8a5fd3b5</link>
      <description>
        <![CDATA[<p>𝐇𝐚𝐜𝐤 𝐭𝐡𝐞 𝐁𝐨𝐚𝐭: 𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐨𝐧 𝐭𝐡𝐞 𝐇𝐢𝐠𝐡 𝐒𝐞𝐚𝐬 🌊 

Imagine you're the captain of a massive ship, cruising through open waters at full speed. Suddenly, something feels off... Are you veering off course? But your monitors show everything is fine... 

Is it a malfunction or could this be a cyber-attack? 

Live from the Tugboat bridge simulator at Damen Shipyards, this episode of Threat Talks dives into the cyber threats that modern vessels face. Whilst maritime vessels used to have limited connection to the internet, these days, modern shipping operations rely heavily on both information technology (IT) and operational technology (OT) to stay afloat. 

Which means that these days, boats are as likely a target of cyber-attacks as banks and retail. 

With marine cybercrime steeply on the rise, what can maritime companies do to bring their IT and OT in line with today’s cybersecurity standards?

And how exactly would one hack a boat? 

Host Lieuwe Jan Koning is joined by special guest Hans Quivooij (CISO Damen Shipyards) and Threat Intel Specialist Luca Cipriano as they discuss: 
• The growing threat of cyber-attacks in the maritime industry
• Real-world scenarios of ship hacking
• How shipbuilders like Damen are staying ahead of cyber threats

Don’t miss out! Hit that subscribe button and stay tuned for more fascinating deep dives into the world of cybersecurity. 🔔 

===== 
👕 Find our infographics and request your own Threat Talks T-shirt: https://threat-talks.com/ 
🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX
 
#cybersecurityexperts #maritimesecurity #ThreatTalks #techsafety</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>𝐇𝐚𝐜𝐤 𝐭𝐡𝐞 𝐁𝐨𝐚𝐭: 𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐨𝐧 𝐭𝐡𝐞 𝐇𝐢𝐠𝐡 𝐒𝐞𝐚𝐬 🌊 

Imagine you're the captain of a massive ship, cruising through open waters at full speed. Suddenly, something feels off... Are you veering off course? But your monitors show everything is fine... 

Is it a malfunction or could this be a cyber-attack? 

Live from the Tugboat bridge simulator at Damen Shipyards, this episode of Threat Talks dives into the cyber threats that modern vessels face. Whilst maritime vessels used to have limited connection to the internet, these days, modern shipping operations rely heavily on both information technology (IT) and operational technology (OT) to stay afloat. 

Which means that these days, boats are as likely a target of cyber-attacks as banks and retail. 

With marine cybercrime steeply on the rise, what can maritime companies do to bring their IT and OT in line with today’s cybersecurity standards?

And how exactly would one hack a boat? 

Host Lieuwe Jan Koning is joined by special guest Hans Quivooij (CISO Damen Shipyards) and Threat Intel Specialist Luca Cipriano as they discuss: 
• The growing threat of cyber-attacks in the maritime industry
• Real-world scenarios of ship hacking
• How shipbuilders like Damen are staying ahead of cyber threats

Don’t miss out! Hit that subscribe button and stay tuned for more fascinating deep dives into the world of cybersecurity. 🔔 

===== 
👕 Find our infographics and request your own Threat Talks T-shirt: https://threat-talks.com/ 
🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX
 
#cybersecurityexperts #maritimesecurity #ThreatTalks #techsafety</p>]]>
      </content:encoded>
      <pubDate>Tue, 08 Oct 2024 08:00:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/8a5fd3b5/78e17b74.mp3" length="35931777" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/weeqkpQCEeN_L7cxJRsBlXWcw0GVURpp97wFF2APKpk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jOGFm/NDZkZTdlMThkNWZj/ODUwNjgwNWJhMmVk/YmI1NS5qcGc.jpg"/>
      <itunes:duration>2246</itunes:duration>
      <itunes:summary>𝐇𝐚𝐜𝐤 𝐭𝐡𝐞 𝐁𝐨𝐚𝐭: 𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐨𝐧 𝐭𝐡𝐞 𝐇𝐢𝐠𝐡 𝐒𝐞𝐚𝐬 🌊 

Imagine you're the captain of a massive ship, cruising through open waters at full speed. Suddenly, something feels off... Are you veering off course? But your monitors show everything is fine... 

Is it a malfunction or could this be a cyber-attack? 

Live from the Tugboat bridge simulator at Damen Shipyards, this episode of Threat Talks dives into the cyber threats that modern vessels face. Whilst maritime vessels used to have limited connection to the internet, these days, modern shipping operations rely heavily on both information technology (IT) and operational technology (OT) to stay afloat. 

Which means that these days, boats are as likely a target of cyber-attacks as banks and retail. 

With marine cybercrime steeply on the rise, what can maritime companies do to bring their IT and OT in line with today’s cybersecurity standards?

And how exactly would one hack a boat? 

Host Lieuwe Jan Koning is joined by special guest Hans Quivooij (CISO Damen Shipyards) and Threat Intel Specialist Luca Cipriano as they discuss: 
• The growing threat of cyber-attacks in the maritime industry
• Real-world scenarios of ship hacking
• How shipbuilders like Damen are staying ahead of cyber threats

Don’t miss out! Hit that subscribe button and stay tuned for more fascinating deep dives into the world of cybersecurity. 🔔 

===== 
👕 Find our infographics and request your own Threat Talks T-shirt: https://threat-talks.com/ 
🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX
 
#cybersecurityexperts #maritimesecurity #ThreatTalks #techsafety</itunes:summary>
      <itunes:subtitle>𝐇𝐚𝐜𝐤 𝐭𝐡𝐞 𝐁𝐨𝐚𝐭: 𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐨𝐧 𝐭𝐡𝐞 𝐇𝐢𝐠𝐡 𝐒𝐞𝐚𝐬 🌊 

Imagine you're the captain of a massive ship, cruising through open waters at full speed. Suddenly, something feels off... Are you veering off course? But your monitors show everything is fine... 

Is it a</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>HTTP/2 Rapid Reset DDoS Attack - Deep Dive - Threat Talks Cybersecurity Podcast</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>37</itunes:episode>
      <podcast:episode>37</podcast:episode>
      <itunes:title>HTTP/2 Rapid Reset DDoS Attack - Deep Dive - Threat Talks Cybersecurity Podcast</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ea23c3fe-9c25-466a-926e-dd9bfe9fa022</guid>
      <link>https://share.transistor.fm/s/7bca0fe1</link>
      <description>
        <![CDATA[<p>🌊 <strong>Don’t drown in HTTP/2 Rapid Reset attacks!</strong> 🌊</p>

<p>The HTTP/2 Rapid Reset attack is a powerful new DDoS method that exploits weaknesses in the HTTP/2 protocol. By overwhelming web servers with rapid reset frames, attackers can disrupt services and cause significant downtime, making it a serious threat to organizations.</p>
<p>
In our latest Deep Dive, host Lieuwe Jan Koning is joined by Rob Maas (Field CTO ON2IT) and Luca Cipriano (Threat Intel Specialist ON2IT) as they walk through the attack mechanism, what the impact on organizations can be, and how you can keep your head above water when facing this deluge of requests.</p>
<p> </p>
<p>This attack method has been making waves for its ability to disrupt web servers quickly and efficiently. How exactly does it work? What makes it so effective? </p>
<p> </p>
<p><strong>Tune in for this Deep Dive to find out!</strong>
========
👕 Find our infographics and request your own Threat Talks T-shirt: <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbjFFSGtmb3F4cnowX3pRbG5pSXg5MWVJU0JtQXxBQ3Jtc0tsbUYzUlpvRnhrVHRfdWhSLUpYYmdNMFlDbm5BRHJoVEVQNjlhTG9CUU1wS3oxb05iVHV5QXVkUEo5LWppNy1ROEJJclpmdU1jTGlqb0dKeERuMzZPNGVQYmVBLWg0NXZDSGZBRkU1ZmpkQUVfYlZqOA&amp;q=https%3A%2F%2Fthreat-talks.com%2F&amp;v=uh61TgT5g7c" rel="ugc noopener noreferrer">https://threat-talks.com/</a>

🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>🌊 <strong>Don’t drown in HTTP/2 Rapid Reset attacks!</strong> 🌊</p>

<p>The HTTP/2 Rapid Reset attack is a powerful new DDoS method that exploits weaknesses in the HTTP/2 protocol. By overwhelming web servers with rapid reset frames, attackers can disrupt services and cause significant downtime, making it a serious threat to organizations.</p>
<p>
In our latest Deep Dive, host Lieuwe Jan Koning is joined by Rob Maas (Field CTO ON2IT) and Luca Cipriano (Threat Intel Specialist ON2IT) as they walk through the attack mechanism, what the impact on organizations can be, and how you can keep your head above water when facing this deluge of requests.</p>
<p> </p>
<p>This attack method has been making waves for its ability to disrupt web servers quickly and efficiently. How exactly does it work? What makes it so effective? </p>
<p> </p>
<p><strong>Tune in for this Deep Dive to find out!</strong>
========
👕 Find our infographics and request your own Threat Talks T-shirt: <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbjFFSGtmb3F4cnowX3pRbG5pSXg5MWVJU0JtQXxBQ3Jtc0tsbUYzUlpvRnhrVHRfdWhSLUpYYmdNMFlDbm5BRHJoVEVQNjlhTG9CUU1wS3oxb05iVHV5QXVkUEo5LWppNy1ROEJJclpmdU1jTGlqb0dKeERuMzZPNGVQYmVBLWg0NXZDSGZBRkU1ZmpkQUVfYlZqOA&amp;q=https%3A%2F%2Fthreat-talks.com%2F&amp;v=uh61TgT5g7c" rel="ugc noopener noreferrer">https://threat-talks.com/</a>

🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Tue, 01 Oct 2024 08:00:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/7bca0fe1/41459ad0.mp3" length="8706304" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/KRV5YEtK8o8gKzMGQjw6J4C96GGS-3f72VWFpesod14/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kYTlm/ZTAwYTQ5Y2MzYTNi/ZTk1Y2QxMzVjMWNh/ZWNkYi5qcGc.jpg"/>
      <itunes:duration>545</itunes:duration>
      <itunes:summary>🌊 Don’t drown in HTTP/2 Rapid Reset attacks! 🌊
 
The HTTP/2 Rapid Reset attack is a powerful new DDoS method that exploits weaknesses in the HTTP/2 protocol. By overwhelming web servers with rapid reset frames, attackers can disrupt services and cause significant downtime, making it a serious threat to organizations.

In our latest Deep Dive, host Lieuwe Jan Koning is joined by Rob Maas (Field CTO ON2IT) and Luca Cipriano (Threat Intel Specialist ON2IT) as they walk through the attack mechanism, what the impact on organizations can be, and how you can keep your head above water when facing this deluge of requests.
 
This attack method has been making waves for its ability to disrupt web servers quickly and efficiently. How exactly does it work? What makes it so effective? 
 
Tune in for this Deep Dive to find out!
========
👕 Find our infographics and request your own Threat Talks T-shirt: https://threat-talks.com/

🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX</itunes:summary>
      <itunes:subtitle>🌊 Don’t drown in HTTP/2 Rapid Reset attacks! 🌊
 
The HTTP/2 Rapid Reset attack is a powerful new DDoS method that exploits weaknesses in the HTTP/2 protocol. By overwhelming web servers with rapid reset frames, attackers can disrupt services and cause sig</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Capital One Data Breach - Deep Dive - Threat Talks Cybersecurity Podcast</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>36</itunes:episode>
      <podcast:episode>36</podcast:episode>
      <itunes:title>Capital One Data Breach - Deep Dive - Threat Talks Cybersecurity Podcast</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">42d4df5a-3fd2-47b3-83f3-4d7509e49de1</guid>
      <link>https://share.transistor.fm/s/3dd81a58</link>
      <description>
        <![CDATA[<p>🔐 <strong>Do Your Configurations Keep You Safe?</strong> 🔐</p>
<p> </p>
<p>How does a major financial institution like Capital One
suffer a data breach that exposes over 100 million credit applications?<br>
In August 2019, a former Amazon employee was arrested for orchestrating a data breach that exposed over 100 million consumer credit applications at Capital One. How was AWS left vulnerable to a Server-Side Request Forgery (SSRF) attack, and how were their internal security measures misled and circumvented? <br>

In our latest Deep Dive, host Lieuwe Jan Koning is joined by Tim Timmermans (CISO ON2IT) and Luca Cipriano (Threat Intel Specialist ON2IT) as they go through all the steps the hacker took, and what could’ve been done to prevent this data breach from happening. </p>
<p> </p>
<p>Curious who was behind the hack, and how they managed to pull it off despite Capital One being compliant with numerous regulations and frameworks? Tune in to learn more and make sure you don’t fall victim to a similar attack! </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>🔐 <strong>Do Your Configurations Keep You Safe?</strong> 🔐</p>
<p> </p>
<p>How does a major financial institution like Capital One
suffer a data breach that exposes over 100 million credit applications?<br>
In August 2019, a former Amazon employee was arrested for orchestrating a data breach that exposed over 100 million consumer credit applications at Capital One. How was AWS left vulnerable to a Server-Side Request Forgery (SSRF) attack, and how were their internal security measures misled and circumvented? <br>

In our latest Deep Dive, host Lieuwe Jan Koning is joined by Tim Timmermans (CISO ON2IT) and Luca Cipriano (Threat Intel Specialist ON2IT) as they go through all the steps the hacker took, and what could’ve been done to prevent this data breach from happening. </p>
<p> </p>
<p>Curious who was behind the hack, and how they managed to pull it off despite Capital One being compliant with numerous regulations and frameworks? Tune in to learn more and make sure you don’t fall victim to a similar attack! </p>]]>
      </content:encoded>
      <pubDate>Tue, 24 Sep 2024 08:00:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/3dd81a58/de8c6e25.mp3" length="14748733" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/JAVRIfkznKMBo3mUu24_fh3IMdEF0VweVR1zf-HlkHg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wYzAx/NDYzNTFhYTQ3NmJk/ZWZjMDNiOWMwMTQ0/ZDkwZS5qcGc.jpg"/>
      <itunes:duration>922</itunes:duration>
      <itunes:summary>🔐 Do Your Configurations Keep You Safe? 🔐
 
How does a major financial institution like Capital One
suffer a data breach that exposes over 100 million credit applications?
In August 2019, a former Amazon employee was arrested for orchestrating a data breach that exposed over 100 million consumer credit applications at Capital One. How was AWS left vulnerable to a Server-Side Request Forgery (SSRF) attack, and how were their internal security measures misled and circumvented? 

In our latest Deep Dive, host Lieuwe Jan Koning is joined by Tim Timmermans (CISO ON2IT) and Luca Cipriano (Threat Intel Specialist ON2IT) as they go through all the steps the hacker took, and what could’ve been done to prevent this data breach from happening. 
 
Curious who was behind the hack, and how they managed to pull it off despite Capital One being compliant with numerous regulations and frameworks? Tune in to learn more and make sure you don’t fall victim to a similar attack! </itunes:summary>
      <itunes:subtitle>🔐 Do Your Configurations Keep You Safe? 🔐
 
How does a major financial institution like Capital One
suffer a data breach that exposes over 100 million credit applications?
In August 2019, a former Amazon employee was arrested for orchestrating a data brea</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>OKTA Data Breach - Deep Dive - Threat Talks Cybersecurity Podcast</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>35</itunes:episode>
      <podcast:episode>35</podcast:episode>
      <itunes:title>OKTA Data Breach - Deep Dive - Threat Talks Cybersecurity Podcast</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">37288480-4a15-441a-b718-c66efef748f1</guid>
      <link>https://share.transistor.fm/s/76a775fa</link>
      <description>
        <![CDATA[<p><strong>🚨 When Cybersecurity Experts Get Hacked 🚨</strong>

How does a company specializing in Identity and Access Management like OKTA suffer a data breach?

In this case, a service account password was inadvertently saved by an OKTA employee to their personal Google account, which led to the credentials being leaked. This incident exposed a significant gap in compliance and highlighted how human error can result in even the most well-respected cybersecurity companies being compromised.

In this Deep Dive, Tim Timmermans (CISO at ON2IT) and Rob Maas (Field CTO at ON2IT) join host Lieuwe Jan Koning to unpack how this breach occurred, and what lessons we can all learn from it.

If even cybersecurity companies are vulnerable, how can you ensure your organization stays protected?

===
📈 Download your infographic and receive your own 👕 Threat Talks T-shirt: <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqa1V4UzU4a3hXR1hqbWlIOVI0QVV4TFM4ak1Td3xBQ3Jtc0ttZnpjVEVhemtQUTEwd3cwUTJkcjZkYWxhamc1N3BSN2k3RzZ6M0dKbnVXUVc1dnBTM0drWUlBVEZkTjdNMmhST2lwcWxsV21QS3hwQ1JyLVBfQ2VFQmhJRlRuWFhIMlA4YkU5QVJUa1NtX0xFLTBRdw&amp;q=https%3A%2F%2Fthreat-talks.com%2F&amp;v=Nh7FmHz7eKY" rel="ugc noopener noreferrer">https://threat-talks.com</a>

🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX</p>
<p><br></p>
<p><a href="https://www.youtube.com/hashtag/1password" rel="ugc noopener noreferrer">⁠#1password⁠</a> <a href="https://www.youtube.com/hashtag/cyberattack" rel="ugc noopener noreferrer">⁠#cyberattack⁠</a> <a href="https://www.youtube.com/hashtag/cybersecurityexperts" rel="ugc noopener noreferrer">⁠#cybersecurityexperts⁠</a> <a href="https://www.youtube.com/hashtag/threattalks" rel="ugc noopener noreferrer">⁠#threattalks⁠</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>🚨 When Cybersecurity Experts Get Hacked 🚨</strong>

How does a company specializing in Identity and Access Management like OKTA suffer a data breach?

In this case, a service account password was inadvertently saved by an OKTA employee to their personal Google account, which led to the credentials being leaked. This incident exposed a significant gap in compliance and highlighted how human error can result in even the most well-respected cybersecurity companies being compromised.

In this Deep Dive, Tim Timmermans (CISO at ON2IT) and Rob Maas (Field CTO at ON2IT) join host Lieuwe Jan Koning to unpack how this breach occurred, and what lessons we can all learn from it.

If even cybersecurity companies are vulnerable, how can you ensure your organization stays protected?

===
📈 Download your infographic and receive your own 👕 Threat Talks T-shirt: <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqa1V4UzU4a3hXR1hqbWlIOVI0QVV4TFM4ak1Td3xBQ3Jtc0ttZnpjVEVhemtQUTEwd3cwUTJkcjZkYWxhamc1N3BSN2k3RzZ6M0dKbnVXUVc1dnBTM0drWUlBVEZkTjdNMmhST2lwcWxsV21QS3hwQ1JyLVBfQ2VFQmhJRlRuWFhIMlA4YkU5QVJUa1NtX0xFLTBRdw&amp;q=https%3A%2F%2Fthreat-talks.com%2F&amp;v=Nh7FmHz7eKY" rel="ugc noopener noreferrer">https://threat-talks.com</a>

🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX</p>
<p><br></p>
<p><a href="https://www.youtube.com/hashtag/1password" rel="ugc noopener noreferrer">⁠#1password⁠</a> <a href="https://www.youtube.com/hashtag/cyberattack" rel="ugc noopener noreferrer">⁠#cyberattack⁠</a> <a href="https://www.youtube.com/hashtag/cybersecurityexperts" rel="ugc noopener noreferrer">⁠#cybersecurityexperts⁠</a> <a href="https://www.youtube.com/hashtag/threattalks" rel="ugc noopener noreferrer">⁠#threattalks⁠</a></p>]]>
      </content:encoded>
      <pubDate>Tue, 17 Sep 2024 08:00:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/76a775fa/a0ff36a1.mp3" length="16082852" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/2I5CiZgKPII1ce6cfffE22bva2-cuGFOKA9dcghMaqo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zMTg0/NjAxOGQ1OTM0YTJh/ZWYwMGYxZWYxOWQ0/OGMzOS5qcGc.jpg"/>
      <itunes:duration>1006</itunes:duration>
      <itunes:summary>🚨 When Cybersecurity Experts Get Hacked 🚨

How does a company specializing in Identity and Access Management like OKTA suffer a data breach?

In this case, a service account password was inadvertently saved by an OKTA employee to their personal Google account, which led to the credentials being leaked. This incident exposed a significant gap in compliance and highlighted how human error can result in even the most well-respected cybersecurity companies being compromised.

In this Deep Dive, Tim Timmermans (CISO at ON2IT) and Rob Maas (Field CTO at ON2IT) join host Lieuwe Jan Koning to unpack how this breach occurred, and what lessons we can all learn from it.

If even cybersecurity companies are vulnerable, how can you ensure your organization stays protected?

===
📈 Download your infographic and receive your own 👕 Threat Talks T-shirt: https://threat-talks.com

🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX

⁠#1password⁠ ⁠#cyberattack⁠ ⁠#cybersecurityexperts⁠ ⁠#threattalks⁠</itunes:summary>
      <itunes:subtitle>🚨 When Cybersecurity Experts Get Hacked 🚨

How does a company specializing in Identity and Access Management like OKTA suffer a data breach?

In this case, a service account password was inadvertently saved by an OKTA employee to their personal Google acc</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Accellion File Transfer Appliance - Deep Dive - Threat Talks Cybersecurity Podcast</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>34</itunes:episode>
      <podcast:episode>34</podcast:episode>
      <itunes:title>Accellion File Transfer Appliance - Deep Dive - Threat Talks Cybersecurity Podcast</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b586a057-b516-439e-83cf-73b6537fdeed</guid>
      <link>https://share.transistor.fm/s/98adecd4</link>
      <description>
        <![CDATA[<p>🔐<strong> Is Your "Secure" File Transfer Tool Really Secure?</strong> 🔐</p>
<p>If you’re depending on certifications alone to keep your data safe (spoiler: you shouldn’t be!), this episode is a must-watch.</p>
<p>In this Deep Dive, Lieuwe Jan Koning is joined by Threat Intel Specialist Luca Cipriano and CISO Tim Timmermans to explore a prevalent case study; the Accellion File Transfer Appliance hack.</p>
<p>Over 300 companies, including major players like Shell and the Reserve Bank of New Zealand, relied upon this trusted secure file transfer solution. But when an attack hit its legacy version, these organizations found out the hard way that compliance doesn’t always equal security.</p>
<p>Donning the red team hat of a hacker, Luca walks us through all the steps the attackers took, whilst blue team representative Tim offers insights and an answer to the ever-pressing question: could this have been prevented and if so, what could (or should) have been done? </p>
<p>#filetransfer #cybersecurity #hacked #threattalks </p>
<p><br></p>
<p>====
📈 Find our infographics and receive your own 👕 Threat Talks T-shirt: <a href="https://threat-talks.com" rel="ugc noopener noreferrer">https://threat-talks.com</a>

🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>🔐<strong> Is Your "Secure" File Transfer Tool Really Secure?</strong> 🔐</p>
<p>If you’re depending on certifications alone to keep your data safe (spoiler: you shouldn’t be!), this episode is a must-watch.</p>
<p>In this Deep Dive, Lieuwe Jan Koning is joined by Threat Intel Specialist Luca Cipriano and CISO Tim Timmermans to explore a prevalent case study; the Accellion File Transfer Appliance hack.</p>
<p>Over 300 companies, including major players like Shell and the Reserve Bank of New Zealand, relied upon this trusted secure file transfer solution. But when an attack hit its legacy version, these organizations found out the hard way that compliance doesn’t always equal security.</p>
<p>Donning the red team hat of a hacker, Luca walks us through all the steps the attackers took, whilst blue team representative Tim offers insights and an answer to the ever-pressing question: could this have been prevented and if so, what could (or should) have been done? </p>
<p>#filetransfer #cybersecurity #hacked #threattalks </p>
<p><br></p>
<p>====
📈 Find our infographics and receive your own 👕 Threat Talks T-shirt: <a href="https://threat-talks.com" rel="ugc noopener noreferrer">https://threat-talks.com</a>

🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Sep 2024 08:00:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/98adecd4/daddafc7.mp3" length="19025302" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ELjtMYmjp3fPMDztpQW7-cGyPlci4H9Ed7JDc4IhxM0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80OTQw/ZjkxZWYzNWU1YmRk/NGMyODA3ZmQ0N2Zl/M2RjMi5qcGc.jpg"/>
      <itunes:duration>1189</itunes:duration>
      <itunes:summary>🔐 Is Your "Secure" File Transfer Tool Really Secure? 🔐
If you’re depending on certifications alone to keep your data safe (spoiler: you shouldn’t be!), this episode is a must-watch.
In this Deep Dive, Lieuwe Jan Koning is joined by Threat Intel Specialist Luca Cipriano and CISO Tim Timmermans to explore a prevalent case study; the Accellion File Transfer Appliance hack.
Over 300 companies, including major players like Shell and the Reserve Bank of New Zealand, relied upon this trusted secure file transfer solution. But when an attack hit its legacy version, these organizations found out the hard way that compliance doesn’t always equal security.
Donning the red team hat of a hacker, Luca walks us through all the steps the attackers took, whilst blue team representative Tim offers insights and an answer to the ever-pressing question: could this have been prevented and if so, what could (or should) have been done? 
#filetransfer #cybersecurity #hacked #threattalks 

====
📈 Find our infographics and receive your own 👕 Threat Talks T-shirt: https://threat-talks.com

🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX</itunes:summary>
      <itunes:subtitle>🔐 Is Your "Secure" File Transfer Tool Really Secure? 🔐
If you’re depending on certifications alone to keep your data safe (spoiler: you shouldn’t be!), this episode is a must-watch.
In this Deep Dive, Lieuwe Jan Koning is joined by Threat Intel Specialist</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Bridging the Gap: Security and Compliance - Threat Talks Cybersecurity Podcast</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>33</itunes:episode>
      <podcast:episode>33</podcast:episode>
      <itunes:title>Bridging the Gap: Security and Compliance - Threat Talks Cybersecurity Podcast</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">684fecb5-de97-4c8e-a46a-78438379fcf8</guid>
      <link>https://share.transistor.fm/s/d999240d</link>
      <description>
        <![CDATA[<p>Compliance doesn't always mean security. In this episode of Threat Talks, we dive deep into the critical operational gap between being compliant and being secure. 

Host Lieuwe Jan Koning, along with ON2IT's CISO Tim Timmermans and Pieter de Lange, CISO at Transdev, discuss how organizations can bridge this gap to not just tick boxes but to truly protect themselves from cyber threats. 

Learn the essential strategies that go beyond compliance and ensure robust security measures. Don't miss this insightful discussion that could redefine your approach to cybersecurity!</p>
<p>
#compliancemanagement #cybersecurityexperts #threattalks 
===

📈 Download your infographic and receive your own 👕 Threat Talks T-shirt: https://threat-talks.com

🕵️ Threat Talks is a collaboration between <a href="https://on2it.net" rel="ugc noopener noreferrer">ON2IT</a> and <a href="https://www.ams-ix.net" rel="ugc noopener noreferrer">AMS-IX</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Compliance doesn't always mean security. In this episode of Threat Talks, we dive deep into the critical operational gap between being compliant and being secure. 

Host Lieuwe Jan Koning, along with ON2IT's CISO Tim Timmermans and Pieter de Lange, CISO at Transdev, discuss how organizations can bridge this gap to not just tick boxes but to truly protect themselves from cyber threats. 

Learn the essential strategies that go beyond compliance and ensure robust security measures. Don't miss this insightful discussion that could redefine your approach to cybersecurity!</p>
<p>
#compliancemanagement #cybersecurityexperts #threattalks 
===

📈 Download your infographic and receive your own 👕 Threat Talks T-shirt: https://threat-talks.com

🕵️ Threat Talks is a collaboration between <a href="https://on2it.net" rel="ugc noopener noreferrer">ON2IT</a> and <a href="https://www.ams-ix.net" rel="ugc noopener noreferrer">AMS-IX</a></p>]]>
      </content:encoded>
      <pubDate>Tue, 03 Sep 2024 08:00:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/d999240d/ebbe7cb1.mp3" length="53004543" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/kM0N3eGysij4RcnyCNBh3p3xSt8kvEpaFmIM8HB-6HM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hZDUx/ZDk3Yjk5NGE1MjBj/NjQzOTU3ZjAzMDdm/YzljNy5qcGc.jpg"/>
      <itunes:duration>3313</itunes:duration>
      <itunes:summary>Compliance doesn't always mean security. In this episode of Threat Talks, we dive deep into the critical operational gap between being compliant and being secure. 

Host Lieuwe Jan Koning, along with ON2IT's CISO Tim Timmermans and Pieter de Lange, CISO at Transdev, discuss how organizations can bridge this gap to not just tick boxes but to truly protect themselves from cyber threats. 

Learn the essential strategies that go beyond compliance and ensure robust security measures. Don't miss this insightful discussion that could redefine your approach to cybersecurity!

#compliancemanagement #cybersecurityexperts #threattalks 
===

📈 Download your infographic and receive your own 👕 Threat Talks T-shirt: https://threat-talks.com

🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX</itunes:summary>
      <itunes:subtitle>Compliance doesn't always mean security. In this episode of Threat Talks, we dive deep into the critical operational gap between being compliant and being secure. 

Host Lieuwe Jan Koning, along with ON2IT's CISO Tim Timmermans and Pieter de Lange, CISO a</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Deep Dive - APT Sand Eagle</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>32</itunes:episode>
      <podcast:episode>32</podcast:episode>
      <itunes:title>Deep Dive - APT Sand Eagle</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0ecfbd5b-8a8c-4f02-bdd8-268d5404dee9</guid>
      <link>https://share.transistor.fm/s/98bafe22</link>
      <description>
        <![CDATA[<p>𝐈𝐬 𝐭𝐡𝐞 𝐒𝐚𝐧𝐝 𝐄𝐚𝐠𝐥𝐞 𝐀𝐏𝐓 𝐭𝐡𝐞 𝐉𝐚𝐬𝐨𝐧 𝐁𝐨𝐮𝐫𝐧𝐞 𝐨𝐟 𝐜𝐲𝐛𝐞𝐫-𝐚𝐭𝐭𝐚𝐜𝐤𝐬? <strong>🕶️</strong></p>
<p> </p>
<p>Just as Bourne eluded the most advanced surveillance and security systems in the world, the Sand Eagle APT made headlines 📰 for its ability to infiltrate and bypass layers of digital defense on supposedly the most secure devices on the market – iPhones. 📱</p>
<p><br></p>
<p><br></p>
<p>From exploiting legacy system vulnerabilities to the use of advanced return-oriented programming, this APT made use of not one, not two, but four zero-days to reach its goal – cyber espionage.Host Lieuwe Jan Koning is joined by Martijn Peijer (Cybersecurity Expert SOC at the Dutch Tax Office) and Rob Maas (Field CTO at ON2IT) for this break down on how this threat operated undetected for so long, what the goal was and the immense resources likely involved in its development. </p>
<p>
🎧 𝐓𝐮𝐧𝐞 𝐢𝐧 𝐭𝐨 𝐞𝐩𝐢𝐬𝐨𝐝𝐞 32 𝐨𝐟 𝐓𝐡𝐫𝐞𝐚𝐭 𝐓𝐚𝐥𝐤𝐬! 🎧 </p>
<p> </p>
<p>📈 Find our infographics and receive your
own 👕 Threat Talks T-shirt: <a href="https://threat-talks.com/">threat-talks.com</a>  </p>
<p> </p>
<p>
🕵️ Threat Talks is a collaboration between <a href="https://on2it.net" rel="noopener noreferer">ON2IT</a> and AMS-IX
</p>
<p>
#cybersecurityexperts #threatintelligence #zeroday #threattalks</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>𝐈𝐬 𝐭𝐡𝐞 𝐒𝐚𝐧𝐝 𝐄𝐚𝐠𝐥𝐞 𝐀𝐏𝐓 𝐭𝐡𝐞 𝐉𝐚𝐬𝐨𝐧 𝐁𝐨𝐮𝐫𝐧𝐞 𝐨𝐟 𝐜𝐲𝐛𝐞𝐫-𝐚𝐭𝐭𝐚𝐜𝐤𝐬? <strong>🕶️</strong></p>
<p> </p>
<p>Just as Bourne eluded the most advanced surveillance and security systems in the world, the Sand Eagle APT made headlines 📰 for its ability to infiltrate and bypass layers of digital defense on supposedly the most secure devices on the market – iPhones. 📱</p>
<p><br></p>
<p><br></p>
<p>From exploiting legacy system vulnerabilities to the use of advanced return-oriented programming, this APT made use of not one, not two, but four zero-days to reach its goal – cyber espionage.Host Lieuwe Jan Koning is joined by Martijn Peijer (Cybersecurity Expert SOC at the Dutch Tax Office) and Rob Maas (Field CTO at ON2IT) for this break down on how this threat operated undetected for so long, what the goal was and the immense resources likely involved in its development. </p>
<p>
🎧 𝐓𝐮𝐧𝐞 𝐢𝐧 𝐭𝐨 𝐞𝐩𝐢𝐬𝐨𝐝𝐞 32 𝐨𝐟 𝐓𝐡𝐫𝐞𝐚𝐭 𝐓𝐚𝐥𝐤𝐬! 🎧 </p>
<p> </p>
<p>📈 Find our infographics and receive your
own 👕 Threat Talks T-shirt: <a href="https://threat-talks.com/">threat-talks.com</a>  </p>
<p> </p>
<p>
🕵️ Threat Talks is a collaboration between <a href="https://on2it.net" rel="noopener noreferer">ON2IT</a> and AMS-IX
</p>
<p>
#cybersecurityexperts #threatintelligence #zeroday #threattalks</p>]]>
      </content:encoded>
      <pubDate>Tue, 27 Aug 2024 08:00:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/98bafe22/1cbc7c48.mp3" length="21561422" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/wFPACZ_3cTEH4kBrPIHyn5lF_dyXlAcRaA5FxqeDV94/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82MGM5/YjBiNTAxZDFjZTA1/YmUxYmJlYTlmZWYz/YmJjNi5qcGc.jpg"/>
      <itunes:duration>1348</itunes:duration>
      <itunes:summary>𝐈𝐬 𝐭𝐡𝐞 𝐒𝐚𝐧𝐝 𝐄𝐚𝐠𝐥𝐞 𝐀𝐏𝐓 𝐭𝐡𝐞 𝐉𝐚𝐬𝐨𝐧 𝐁𝐨𝐮𝐫𝐧𝐞 𝐨𝐟 𝐜𝐲𝐛𝐞𝐫-𝐚𝐭𝐭𝐚𝐜𝐤𝐬? 🕶️
 
Just as Bourne eluded the most advanced surveillance and security systems in the world, the Sand Eagle APT made headlines 📰 for its ability to infiltrate and bypass layers of digital defense on supposedly the most secure devices on the market – iPhones. 📱


From exploiting legacy system vulnerabilities to the use of advanced return-oriented programming, this APT made use of not one, not two, but four zero-days to reach its goal – cyber espionage.Host Lieuwe Jan Koning is joined by Martijn Peijer (Cybersecurity Expert SOC at the Dutch Tax Office) and Rob Maas (Field CTO at ON2IT) for this break down on how this threat operated undetected for so long, what the goal was and the immense resources likely involved in its development. 

🎧 𝐓𝐮𝐧𝐞 𝐢𝐧 𝐭𝐨 𝐞𝐩𝐢𝐬𝐨𝐝𝐞 32 𝐨𝐟 𝐓𝐡𝐫𝐞𝐚𝐭 𝐓𝐚𝐥𝐤𝐬! 🎧 
 
📈 Find our infographics and receive your
own 👕 Threat Talks T-shirt: threat-talks.com  
 

🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX


#cybersecurityexperts #threatintelligence #zeroday #threattalks</itunes:summary>
      <itunes:subtitle>𝐈𝐬 𝐭𝐡𝐞 𝐒𝐚𝐧𝐝 𝐄𝐚𝐠𝐥𝐞 𝐀𝐏𝐓 𝐭𝐡𝐞 𝐉𝐚𝐬𝐨𝐧 𝐁𝐨𝐮𝐫𝐧𝐞 𝐨𝐟 𝐜𝐲𝐛𝐞𝐫-𝐚𝐭𝐭𝐚𝐜𝐤𝐬? 🕶️
 
Just as Bourne eluded the most advanced surveillance and security systems in the world, the Sand Eagle APT made headlines 📰 for its ability to infiltrate and bypass layers of digital defense on</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Deep Dive - Russia GRU Viasat Hack</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>31</itunes:episode>
      <podcast:episode>31</podcast:episode>
      <itunes:title>Deep Dive - Russia GRU Viasat Hack</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">09e09d6a-551f-47c3-b903-d4cb1db5cf15</guid>
      <link>https://share.transistor.fm/s/442b2953</link>
      <description>
        <![CDATA[<p><strong>Ethan Hunt is known for doing the impossible. 😎</strong>

What if he and his team spoke Russian 🇷🇺 and on the onset of the invasion of Ukraine, they brought down control of 5.800 wind turbines in Germany 🇩🇪? Does this sound impossible? 🧐

Join ON2IT experts Lieuwe Jan Koning, Rob Maas and Luca Cipriano in this Deep Dive into the Russia GRU Viasat Hack, and find out what strategies were used to hack Viasat and how you can best prepare for and counter this kind of 🦾 attack.

<strong>SHOW NOTES</strong>
=====
📈 Download the infographic on: <a href="https://threat-talks.com" rel="noopener noreferer">https://threat-talks.com</a>

🕵️ Threat Talks is a collaboration between <a href="https://on2it.net" rel="noopener noreferer">ON2IT</a> and AMS-IX</p>
<p>
<em>Threat Talks episode #31 </em>
#cybersecurityexperts #threatintelligence #cyberwarfare #ThreatTalks</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Ethan Hunt is known for doing the impossible. 😎</strong>

What if he and his team spoke Russian 🇷🇺 and on the onset of the invasion of Ukraine, they brought down control of 5.800 wind turbines in Germany 🇩🇪? Does this sound impossible? 🧐

Join ON2IT experts Lieuwe Jan Koning, Rob Maas and Luca Cipriano in this Deep Dive into the Russia GRU Viasat Hack, and find out what strategies were used to hack Viasat and how you can best prepare for and counter this kind of 🦾 attack.

<strong>SHOW NOTES</strong>
=====
📈 Download the infographic on: <a href="https://threat-talks.com" rel="noopener noreferer">https://threat-talks.com</a>

🕵️ Threat Talks is a collaboration between <a href="https://on2it.net" rel="noopener noreferer">ON2IT</a> and AMS-IX</p>
<p>
<em>Threat Talks episode #31 </em>
#cybersecurityexperts #threatintelligence #cyberwarfare #ThreatTalks</p>]]>
      </content:encoded>
      <pubDate>Tue, 20 Aug 2024 08:00:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/442b2953/cefccde4.mp3" length="20139951" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ICETU6BCSTMruZN8-bz65ud6Lel8gkcDOVJ58__htt0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mMDU3/NmY5OWNiNmU5ZDlm/NTIwMjFiODZlZDhm/NTE0My5qcGc.jpg"/>
      <itunes:duration>1259</itunes:duration>
      <itunes:summary>Ethan Hunt is known for doing the impossible. 😎

What if he and his team spoke Russian 🇷🇺 and on the onset of the invasion of Ukraine, they brought down control of 5.800 wind turbines in Germany 🇩🇪? Does this sound impossible? 🧐

Join ON2IT experts Lieuwe Jan Koning, Rob Maas and Luca Cipriano in this Deep Dive into the Russia GRU Viasat Hack, and find out what strategies were used to hack Viasat and how you can best prepare for and counter this kind of 🦾 attack.

SHOW NOTES
=====
📈 Download the infographic on: https://threat-talks.com

🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX

Threat Talks episode #31 
#cybersecurityexperts #threatintelligence #cyberwarfare #ThreatTalks</itunes:summary>
      <itunes:subtitle>Ethan Hunt is known for doing the impossible. 😎

What if he and his team spoke Russian 🇷🇺 and on the onset of the invasion of Ukraine, they brought down control of 5.800 wind turbines in Germany 🇩🇪? Does this sound impossible? 🧐

Join ON2IT experts Lieuwe</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Deep Dive - China Nexus Barracuda Hack</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>30</itunes:episode>
      <podcast:episode>30</podcast:episode>
      <itunes:title>Deep Dive - China Nexus Barracuda Hack</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">68f294d3-1312-46c0-8b29-7ae6501a2379</guid>
      <link>https://share.transistor.fm/s/7422d93b</link>
      <description>
        <![CDATA[<p><strong>How do James Bond’s spy skills compare to modern cyber espionage? </strong></p>
<p>The Nexus Barracuda Hack was performed by highly skilled, Chinese cyber attackers, who exploited a zero-day vulnerability in Barracuda’s Email Security Gateway (ESG). 🚨</p>
<p>Join Lieuwe Jan Koning, Rob Maas and Luca Cipriano to find out about the strategies the attackers used, how their tactics could’ve been countered, and whether or not stopping James Bond-level spies is an achievable goal for cybersecurity experts. </p>
<p>=======</p>
<p>👕 Find our infographics and request your own Threat Talks T-shirt on <a href="https://threat-talks.com" rel="noopener noreferer">threat-talks.com</a>

🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX</p>
<p>=======</p>
<p><em>Threat TalksEpisode #30</em></p>
<p>#CyberSecurity #ThreatIntelligence #ON2IT #CyberEspionage #ThreatTalks #Infosec</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>How do James Bond’s spy skills compare to modern cyber espionage? </strong></p>
<p>The Nexus Barracuda Hack was performed by highly skilled, Chinese cyber attackers, who exploited a zero-day vulnerability in Barracuda’s Email Security Gateway (ESG). 🚨</p>
<p>Join Lieuwe Jan Koning, Rob Maas and Luca Cipriano to find out about the strategies the attackers used, how their tactics could’ve been countered, and whether or not stopping James Bond-level spies is an achievable goal for cybersecurity experts. </p>
<p>=======</p>
<p>👕 Find our infographics and request your own Threat Talks T-shirt on <a href="https://threat-talks.com" rel="noopener noreferer">threat-talks.com</a>

🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX</p>
<p>=======</p>
<p><em>Threat TalksEpisode #30</em></p>
<p>#CyberSecurity #ThreatIntelligence #ON2IT #CyberEspionage #ThreatTalks #Infosec</p>]]>
      </content:encoded>
      <pubDate>Tue, 13 Aug 2024 08:00:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/7422d93b/9302eff8.mp3" length="21117979" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/YgMq_pJ-RBG8NI1mW7bNVr87wXgqQx5uiJcekMqQfDY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lZGY5/YjE3ZDlmNmIyODhk/ZGVkYzc1YWM3YWZm/ODIxMC5qcGc.jpg"/>
      <itunes:duration>1320</itunes:duration>
      <itunes:summary>How do James Bond’s spy skills compare to modern cyber espionage? 
The Nexus Barracuda Hack was performed by highly skilled, Chinese cyber attackers, who exploited a zero-day vulnerability in Barracuda’s Email Security Gateway (ESG). 🚨
Join Lieuwe Jan Koning, Rob Maas and Luca Cipriano to find out about the strategies the attackers used, how their tactics could’ve been countered, and whether or not stopping James Bond-level spies is an achievable goal for cybersecurity experts. 
=======
👕 Find our infographics and request your own Threat Talks T-shirt on threat-talks.com

🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX
=======
Threat TalksEpisode #30
#CyberSecurity #ThreatIntelligence #ON2IT #CyberEspionage #ThreatTalks #Infosec</itunes:summary>
      <itunes:subtitle>How do James Bond’s spy skills compare to modern cyber espionage? 
The Nexus Barracuda Hack was performed by highly skilled, Chinese cyber attackers, who exploited a zero-day vulnerability in Barracuda’s Email Security Gateway (ESG). 🚨
Join Lieuwe Jan Kon</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The evolution of cyber warfare - Threat Talks</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>29</itunes:episode>
      <podcast:episode>29</podcast:episode>
      <itunes:title>The evolution of cyber warfare - Threat Talks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">430dce77-8f1f-4d13-8fb7-da4783a76092</guid>
      <link>https://share.transistor.fm/s/7e75e818</link>
      <description>
        <![CDATA[<p>Explore the hidden world of cyber warfare and advanced persistent threats (APTs) in this episode of Threat Talks. </p>
<p>Join cybersecurity experts Lieuwe Jan Koning, Luca Cipriano and special guest Martijn Peijer as they discuss real-life cyber espionage cases and the latest cybersecurity strategies.</p>
<p><br></p>
<p><strong>Show notes</strong></p>
<ul>
 <li><a href="https://samples.vx-underground.org/APTs/2024/2024.02.18%20-%20I-S00N%20GitHub%20leaks/Paper/2024-02-18%20-%20Summary%20of%20I-S00N%20leaks.pdf">Summary of I-S00N leaks | Github</a></li>
 <li><a href="https://samples.vx-underground.org/Papers/Malware%20Defense/Malware%20Analysis/2024/2024-03-05%20-%20Anxun%20and%20Chinese%20APT%20Activity.pdf">Anxun and Chinese APT Activity | VX-underground</a><strong></strong></li>
  <li><a href="https://github.com/soufianetahiri/Anxun-isoon">Github summary | VX-underground</a></li>
</ul>
<p><br></p>
<p>Find all episodes and request your own Threat Talks T-shirt on <a href="https://threat-talks.com/" rel="noopener noreferer">https://threat-talks.com</a>. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Explore the hidden world of cyber warfare and advanced persistent threats (APTs) in this episode of Threat Talks. </p>
<p>Join cybersecurity experts Lieuwe Jan Koning, Luca Cipriano and special guest Martijn Peijer as they discuss real-life cyber espionage cases and the latest cybersecurity strategies.</p>
<p><br></p>
<p><strong>Show notes</strong></p>
<ul>
 <li><a href="https://samples.vx-underground.org/APTs/2024/2024.02.18%20-%20I-S00N%20GitHub%20leaks/Paper/2024-02-18%20-%20Summary%20of%20I-S00N%20leaks.pdf">Summary of I-S00N leaks | Github</a></li>
 <li><a href="https://samples.vx-underground.org/Papers/Malware%20Defense/Malware%20Analysis/2024/2024-03-05%20-%20Anxun%20and%20Chinese%20APT%20Activity.pdf">Anxun and Chinese APT Activity | VX-underground</a><strong></strong></li>
  <li><a href="https://github.com/soufianetahiri/Anxun-isoon">Github summary | VX-underground</a></li>
</ul>
<p><br></p>
<p>Find all episodes and request your own Threat Talks T-shirt on <a href="https://threat-talks.com/" rel="noopener noreferer">https://threat-talks.com</a>. </p>]]>
      </content:encoded>
      <pubDate>Tue, 06 Aug 2024 08:00:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/7e75e818/28beebcb.mp3" length="41503110" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/vBY3yDUfAv_peyLgMTinFRnoZS0wv34tlgb1YKXtUe0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xM2Q5/MThiY2E2NmUyNjc1/ZjMwYmUxMWViOTU2/MWJmNC5qcGc.jpg"/>
      <itunes:duration>2594</itunes:duration>
      <itunes:summary>Explore the hidden world of cyber warfare and advanced persistent threats (APTs) in this episode of Threat Talks. 
Join cybersecurity experts Lieuwe Jan Koning, Luca Cipriano and special guest Martijn Peijer as they discuss real-life cyber espionage cases and the latest cybersecurity strategies.

Show notes

 Summary of I-S00N leaks | Github
 Anxun and Chinese APT Activity | VX-underground
  Github summary | VX-underground


Find all episodes and request your own Threat Talks T-shirt on https://threat-talks.com. </itunes:summary>
      <itunes:subtitle>Explore the hidden world of cyber warfare and advanced persistent threats (APTs) in this episode of Threat Talks. 
Join cybersecurity experts Lieuwe Jan Koning, Luca Cipriano and special guest Martijn Peijer as they discuss real-life cyber espionage cases</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Threat Talks Special: DDoS Attacks on European Elections</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>28</itunes:episode>
      <podcast:episode>28</podcast:episode>
      <itunes:title>Threat Talks Special: DDoS Attacks on European Elections</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">95777750-14ca-4d59-80cb-1d91507ad8e5</guid>
      <link>https://share.transistor.fm/s/cb797236</link>
      <description>
        <![CDATA[<p>Explore the rising threat of DDoS attacks on European elections in this special episode of Threat Talks. </p>
<p>Join Lieuwe Jan Koning and cybersecurity experts Octavia de Weerdt and Frank Dupker as they discuss the motivations behind these attacks, the role of the Anti-DDoS Coalition, and strategies to safeguard our digital democracy.</p>
<p>Find all our episodes and request your own Threat Talks T-shirt on https://threat-talks.com/. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Explore the rising threat of DDoS attacks on European elections in this special episode of Threat Talks. </p>
<p>Join Lieuwe Jan Koning and cybersecurity experts Octavia de Weerdt and Frank Dupker as they discuss the motivations behind these attacks, the role of the Anti-DDoS Coalition, and strategies to safeguard our digital democracy.</p>
<p>Find all our episodes and request your own Threat Talks T-shirt on https://threat-talks.com/. </p>]]>
      </content:encoded>
      <pubDate>Tue, 30 Jul 2024 08:00:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/cb797236/7a86cda8.mp3" length="31753805" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/_G5y4QVatl9RB9gj2vHvu433BWq_Ik2S1uZ33C1JLLs/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80NjEw/ODA5OTQyNTY5ZTUz/ZmVlZDk1OTdhZTBl/MDA4MS5qcGc.jpg"/>
      <itunes:duration>1985</itunes:duration>
      <itunes:summary>Explore the rising threat of DDoS attacks on European elections in this special episode of Threat Talks. 
Join Lieuwe Jan Koning and cybersecurity experts Octavia de Weerdt and Frank Dupker as they discuss the motivations behind these attacks, the role of the Anti-DDoS Coalition, and strategies to safeguard our digital democracy.
Find all our episodes and request your own Threat Talks T-shirt on https://threat-talks.com/. </itunes:summary>
      <itunes:subtitle>Explore the rising threat of DDoS attacks on European elections in this special episode of Threat Talks. 
Join Lieuwe Jan Koning and cybersecurity experts Octavia de Weerdt and Frank Dupker as they discuss the motivations behind these attacks, the role of</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Threat Talks on Tour - DDoS Mitigations</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>27</itunes:episode>
      <podcast:episode>27</podcast:episode>
      <itunes:title>Threat Talks on Tour - DDoS Mitigations</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">19d15c3e-5eda-41e6-8aac-ae74d7e2ed8b</guid>
      <link>https://share.transistor.fm/s/d889a002</link>
      <description>
        <![CDATA[<p>Join Lieuwe Jan Koning on this special Threat Talks as he explores the evolving landscape of DDoS attacks with Junior Corazza and Miguel Regalado Querol. </p>
<p>Discover if these cyber threats are truly diminishing or if we're just getting better at defending against them. Tune in to understand the current state of DDoS mitigations and the importance of cybersecurity collaboration.</p>
<p>Find all our episodes and request your own Threat Talks T-shirt on <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbHJiY2RNQWZDVmtKNm8xMWFYdmcwalhJbUFmZ3xBQ3Jtc0tuY1M5U0R2UkFFWTdVTTZKU2s5N3pvU05hdkdBdjJ3d3V5QTBoU01HbVB6R0RDWEp0azdMNjRHam9Da09zV2RPdzc1cm5NdW1WOTBtc2Ntb0Z0OHlhRVpHaVhtQVMxLThVNU1QbF9FSWI4OGx0bzhQcw&amp;q=https%3A%2F%2Fthreat-talks.com%2F&amp;v=0byjJTjZagg" rel="nofollow">https://threat-talks.com/</a></p>
<p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Join Lieuwe Jan Koning on this special Threat Talks as he explores the evolving landscape of DDoS attacks with Junior Corazza and Miguel Regalado Querol. </p>
<p>Discover if these cyber threats are truly diminishing or if we're just getting better at defending against them. Tune in to understand the current state of DDoS mitigations and the importance of cybersecurity collaboration.</p>
<p>Find all our episodes and request your own Threat Talks T-shirt on <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbHJiY2RNQWZDVmtKNm8xMWFYdmcwalhJbUFmZ3xBQ3Jtc0tuY1M5U0R2UkFFWTdVTTZKU2s5N3pvU05hdkdBdjJ3d3V5QTBoU01HbVB6R0RDWEp0azdMNjRHam9Da09zV2RPdzc1cm5NdW1WOTBtc2Ntb0Z0OHlhRVpHaVhtQVMxLThVNU1QbF9FSWI4OGx0bzhQcw&amp;q=https%3A%2F%2Fthreat-talks.com%2F&amp;v=0byjJTjZagg" rel="nofollow">https://threat-talks.com/</a></p>
<p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 23 Jul 2024 08:00:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/d889a002/7fffd89a.mp3" length="23202761" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/kowA2qGzPbyKCAoOIxAeBwYSsuYGIC4VULrCj_lZ3SQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85NTNh/NzJhNTExODIwNTBj/NDVlMDI2ZmI1YTUw/YTVjMS5qcGc.jpg"/>
      <itunes:duration>1451</itunes:duration>
      <itunes:summary>Join Lieuwe Jan Koning on this special Threat Talks as he explores the evolving landscape of DDoS attacks with Junior Corazza and Miguel Regalado Querol. 
Discover if these cyber threats are truly diminishing or if we're just getting better at defending against them. Tune in to understand the current state of DDoS mitigations and the importance of cybersecurity collaboration.
Find all our episodes and request your own Threat Talks T-shirt on https://threat-talks.com/</itunes:summary>
      <itunes:subtitle>Join Lieuwe Jan Koning on this special Threat Talks as he explores the evolving landscape of DDoS attacks with Junior Corazza and Miguel Regalado Querol. 
Discover if these cyber threats are truly diminishing or if we're just getting better at defending a</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Deep Dive - Vultur, Android Malware</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>26</itunes:episode>
      <podcast:episode>26</podcast:episode>
      <itunes:title>Deep Dive - Vultur, Android Malware</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0f1d7839-081c-425a-9f0c-92f34cc6db93</guid>
      <link>https://share.transistor.fm/s/92b034cf</link>
      <description>
        <![CDATA[<p>Have you ever wondered how a simple game app could lead to your bank account being emptied? </p>
<p>In this deep dive of Threat Talks, Lieuwe Jan Koning dives into the sinister world of Vultur Android malware. Joined by experts Rob Maas and Luca Cipriano, they unravel the mechanics of this malicious threat and discuss practical steps to safeguard your devices. </p>
<p>Tune in to learn how to protect yourself from these covert cyber threats and stay one step ahead of hackers. </p>
<p>👕 Request your own Threat Talks T-shirt: https://threat-talks.com/breaking-the-bank/ 

🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Have you ever wondered how a simple game app could lead to your bank account being emptied? </p>
<p>In this deep dive of Threat Talks, Lieuwe Jan Koning dives into the sinister world of Vultur Android malware. Joined by experts Rob Maas and Luca Cipriano, they unravel the mechanics of this malicious threat and discuss practical steps to safeguard your devices. </p>
<p>Tune in to learn how to protect yourself from these covert cyber threats and stay one step ahead of hackers. </p>
<p>👕 Request your own Threat Talks T-shirt: https://threat-talks.com/breaking-the-bank/ 

🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX</p>]]>
      </content:encoded>
      <pubDate>Tue, 16 Jul 2024 08:00:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/92b034cf/e5e50080.mp3" length="23746522" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/DNyxpFa6wpp7B2Rl-E3FyL-JhAFu9IiSx5IipHT9Mf4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81MDkx/MmVkNmRjNDRmNDk1/ZGIyMzlmZmI2N2Vh/OTFiMS5qcGc.jpg"/>
      <itunes:duration>1485</itunes:duration>
      <itunes:summary>Have you ever wondered how a simple game app could lead to your bank account being emptied? 
In this deep dive of Threat Talks, Lieuwe Jan Koning dives into the sinister world of Vultur Android malware. Joined by experts Rob Maas and Luca Cipriano, they unravel the mechanics of this malicious threat and discuss practical steps to safeguard your devices. 
Tune in to learn how to protect yourself from these covert cyber threats and stay one step ahead of hackers. 
👕 Request your own Threat Talks T-shirt: https://threat-talks.com/breaking-the-bank/ 

🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX</itunes:summary>
      <itunes:subtitle>Have you ever wondered how a simple game app could lead to your bank account being emptied? 
In this deep dive of Threat Talks, Lieuwe Jan Koning dives into the sinister world of Vultur Android malware. Joined by experts Rob Maas and Luca Cipriano, they u</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Deep Dive - Bangladesh Bank SWIFT attack</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>25</itunes:episode>
      <podcast:episode>25</podcast:episode>
      <itunes:title>Deep Dive - Bangladesh Bank SWIFT attack</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">aa4c3c88-b4fd-46d5-a878-58609df8c5c2</guid>
      <link>https://share.transistor.fm/s/14f4019f</link>
      <description>
        <![CDATA[<p>Let's uncover how cybercriminals almost stole a billion dollars through sophisticated spear phishing and malware tactics. </p>
<p>Dive into the Bangladesh Bank SWIFT attack with Lieuwe Jan Koning, Rob Maas and Luca Cipriano. Learn about the vulnerabilities they exploited, the steps of the attack, and the cybersecurity measures that could have thwarted it. </p>
<p>Enhance your understanding with <a href="https://on2it.s3.amazonaws.com/Infographic-breaking-the-bank.pdf" rel="noopener noreferer">our downloadable infographic</a>, available alongside the podcast. Tune in now to stay ahead of cyber threats and protect your digital assets! </p>
<p>Want to know more about breaking the bank? Then our main episode will be very interesting for you. <a href="https://threat-talks.com/breaking-the-bank/" rel="noopener noreferer">Listen to it here</a>, pay close attention, and win a T-shirt by providing the code for the treasure hunt!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Let's uncover how cybercriminals almost stole a billion dollars through sophisticated spear phishing and malware tactics. </p>
<p>Dive into the Bangladesh Bank SWIFT attack with Lieuwe Jan Koning, Rob Maas and Luca Cipriano. Learn about the vulnerabilities they exploited, the steps of the attack, and the cybersecurity measures that could have thwarted it. </p>
<p>Enhance your understanding with <a href="https://on2it.s3.amazonaws.com/Infographic-breaking-the-bank.pdf" rel="noopener noreferer">our downloadable infographic</a>, available alongside the podcast. Tune in now to stay ahead of cyber threats and protect your digital assets! </p>
<p>Want to know more about breaking the bank? Then our main episode will be very interesting for you. <a href="https://threat-talks.com/breaking-the-bank/" rel="noopener noreferer">Listen to it here</a>, pay close attention, and win a T-shirt by providing the code for the treasure hunt!</p>]]>
      </content:encoded>
      <pubDate>Tue, 09 Jul 2024 08:00:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/14f4019f/342f2ffb.mp3" length="24187474" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/MJilYeYGEvBf0lBYaX28UoITFROc0jJqDj6q5xsO--M/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84MTY3/YTU0NzQ2ZTI2Yjdm/ZDQ2NTM3N2E4Mzli/ZTUxMS5qcGc.jpg"/>
      <itunes:duration>1512</itunes:duration>
      <itunes:summary>Let's uncover how cybercriminals almost stole a billion dollars through sophisticated spear phishing and malware tactics. 
Dive into the Bangladesh Bank SWIFT attack with Lieuwe Jan Koning, Rob Maas and Luca Cipriano. Learn about the vulnerabilities they exploited, the steps of the attack, and the cybersecurity measures that could have thwarted it. 
Enhance your understanding with our downloadable infographic, available alongside the podcast. Tune in now to stay ahead of cyber threats and protect your digital assets! 
Want to know more about breaking the bank? Then our main episode will be very interesting for you. Listen to it here, pay close attention, and win a T-shirt by providing the code for the treasure hunt!</itunes:summary>
      <itunes:subtitle>Let's uncover how cybercriminals almost stole a billion dollars through sophisticated spear phishing and malware tactics. 
Dive into the Bangladesh Bank SWIFT attack with Lieuwe Jan Koning, Rob Maas and Luca Cipriano. Learn about the vulnerabilities they </itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Breaking the bank - Threat Talks</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>24</itunes:episode>
      <podcast:episode>24</podcast:episode>
      <itunes:title>Breaking the bank - Threat Talks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b8be65a4-36b3-4497-bb53-a04769ed4f72</guid>
      <link>https://share.transistor.fm/s/1c395944</link>
      <description>
        <![CDATA[<p>Cybersecurity expert Jayson E. Street shares insights on how he legally "robs" banks to expose vulnerabilities.</p>
<p>By exploiting human vulnerabilities rather than advanced technology, Jayson demonstrates how simple tools and social engineering can bypass even the most secure systems.</p>
<p>Jayson, along with host Lieuwe Jan Koning and Threat Intel Specialist Luca Cipriano, discusses real-life incidents like the SWIFT Gateway vulnerability, the Vulture Android banking malware, and the Binance crypto hack. </p>
<p>Heard the code of the Treasure Hunt? Fill it in and get your Threat Talks T-shirt here: https://threat-talks.com/breaking-the-bank/</p>
<p><br></p>
<p><br></p>
<p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Cybersecurity expert Jayson E. Street shares insights on how he legally "robs" banks to expose vulnerabilities.</p>
<p>By exploiting human vulnerabilities rather than advanced technology, Jayson demonstrates how simple tools and social engineering can bypass even the most secure systems.</p>
<p>Jayson, along with host Lieuwe Jan Koning and Threat Intel Specialist Luca Cipriano, discusses real-life incidents like the SWIFT Gateway vulnerability, the Vulture Android banking malware, and the Binance crypto hack. </p>
<p>Heard the code of the Treasure Hunt? Fill it in and get your Threat Talks T-shirt here: https://threat-talks.com/breaking-the-bank/</p>
<p><br></p>
<p><br></p>
<p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 02 Jul 2024 08:00:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/1c395944/78a5f74e.mp3" length="48653542" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/nIZcNpD_iGcuN8AwfQKVPDpiUkKtIhee4_UaqfEUc9I/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jMGI0/YzNmMjYyMzY4NGYz/MDE1ZWI0OWMyODRm/ZjUyZS5qcGc.jpg"/>
      <itunes:duration>3041</itunes:duration>
      <itunes:summary>Cybersecurity expert Jayson E. Street shares insights on how he legally "robs" banks to expose vulnerabilities.
By exploiting human vulnerabilities rather than advanced technology, Jayson demonstrates how simple tools and social engineering can bypass even the most secure systems.
Jayson, along with host Lieuwe Jan Koning and Threat Intel Specialist Luca Cipriano, discusses real-life incidents like the SWIFT Gateway vulnerability, the Vulture Android banking malware, and the Binance crypto hack. 
Heard the code of the Treasure Hunt? Fill it in and get your Threat Talks T-shirt here: https://threat-talks.com/breaking-the-bank/</itunes:summary>
      <itunes:subtitle>Cybersecurity expert Jayson E. Street shares insights on how he legally "robs" banks to expose vulnerabilities.
By exploiting human vulnerabilities rather than advanced technology, Jayson demonstrates how simple tools and social engineering can bypass eve</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Threat Talks on Tour - Cyber Guardians: Anti-DDoS Coalition</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>23</itunes:episode>
      <podcast:episode>23</podcast:episode>
      <itunes:title>Threat Talks on Tour - Cyber Guardians: Anti-DDoS Coalition</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">068c31d2-3a85-4bef-aeb2-50db63213278</guid>
      <link>https://share.transistor.fm/s/a1d36449</link>
      <description>
        <![CDATA[<p>This episode of Threat Talks delves into the world of DDoS attacks with special guests Remco Poortinga from SURF and Martijn Peijer from the Dutch Tax Office. </p>
<p>Discover how easy it is to launch these attacks and learn about the strategies to counter them. We'll explore different types of DDoS attacks, the importance of collaboration, and how regular exercises can strengthen defenses. </p>
<p>Plus, don't miss our special treasure hunt for a chance to win a T-shirt! Tune in for insightful discussions on cybersecurity and the ever-evolving threats in the digital landscape.</p>
<p>Get your Threat Talks T-shirt here: <a href="https://threat-talks.com/?p=1672" rel="external noreferrer noopener">https://threat-talks.com/threat-talks-on-tour-cyber-guardians-anti-ddos-coalition</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode of Threat Talks delves into the world of DDoS attacks with special guests Remco Poortinga from SURF and Martijn Peijer from the Dutch Tax Office. </p>
<p>Discover how easy it is to launch these attacks and learn about the strategies to counter them. We'll explore different types of DDoS attacks, the importance of collaboration, and how regular exercises can strengthen defenses. </p>
<p>Plus, don't miss our special treasure hunt for a chance to win a T-shirt! Tune in for insightful discussions on cybersecurity and the ever-evolving threats in the digital landscape.</p>
<p>Get your Threat Talks T-shirt here: <a href="https://threat-talks.com/?p=1672" rel="external noreferrer noopener">https://threat-talks.com/threat-talks-on-tour-cyber-guardians-anti-ddos-coalition</a></p>]]>
      </content:encoded>
      <pubDate>Tue, 25 Jun 2024 08:00:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/a1d36449/5835c711.mp3" length="27205576" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/WxsA-OEMh6JRE3PIwT3FLQqXHRRsZwiNuAcyS4Za1aY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xYmZj/NDUzMTkzYWRlMmFk/MDI5MWIzZTdiYjll/ZDAyNi5qcGc.jpg"/>
      <itunes:duration>1701</itunes:duration>
      <itunes:summary>This episode of Threat Talks delves into the world of DDoS attacks with special guests Remco Poortinga from SURF and Martijn Peijer from the Dutch Tax Office. 
Discover how easy it is to launch these attacks and learn about the strategies to counter them. We'll explore different types of DDoS attacks, the importance of collaboration, and how regular exercises can strengthen defenses. 
Plus, don't miss our special treasure hunt for a chance to win a T-shirt! Tune in for insightful discussions on cybersecurity and the ever-evolving threats in the digital landscape.
Get your Threat Talks T-shirt here: https://threat-talks.com/threat-talks-on-tour-cyber-guardians-anti-ddos-coalition</itunes:summary>
      <itunes:subtitle>This episode of Threat Talks delves into the world of DDoS attacks with special guests Remco Poortinga from SURF and Martijn Peijer from the Dutch Tax Office. 
Discover how easy it is to launch these attacks and learn about the strategies to counter them.</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Zero Trust with John Kindervag – Threat Talks on tour | Part 2</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>22</itunes:episode>
      <podcast:episode>22</podcast:episode>
      <itunes:title>Zero Trust with John Kindervag – Threat Talks on tour | Part 2</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d159de94-862d-48c1-b491-5db1f986b855</guid>
      <link>https://share.transistor.fm/s/226bb64d</link>
      <description>
        <![CDATA[<p>Discover how Zero Trust can effectively protect against cyber threats and hear firsthand experiences from industry leaders! </p>
<p>Lieuwe Jan Koning and cybersecurity expert John Kindervag dive into the concept of Zero Trust at the RSA Conference in San Francisco. </p>
<p>They discuss the prevalence and importance of Zero Trust in the cybersecurity landscape, sharing insights from the conference and Kindervag's extensive experience. </p>
<p>Learn about the fundamentals of Zero Trust, its evolution since 2010, and why it remains a critical strategy in combating modern cyber threats.</p>
<p>Whether you're an IT professional, cybersecurity enthusiast, or just curious about the latest in cyber defense, this episode offers actionable insights and expert perspectives on a vital security strategy.</p>
<p>👉🏻👉🏻 <a href="https://threat-talks.com/?p=1633" rel="external noreferrer noopener">https://threat-talks.com/threat-talks-on-tour-john-kindervag-2/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Discover how Zero Trust can effectively protect against cyber threats and hear firsthand experiences from industry leaders! </p>
<p>Lieuwe Jan Koning and cybersecurity expert John Kindervag dive into the concept of Zero Trust at the RSA Conference in San Francisco. </p>
<p>They discuss the prevalence and importance of Zero Trust in the cybersecurity landscape, sharing insights from the conference and Kindervag's extensive experience. </p>
<p>Learn about the fundamentals of Zero Trust, its evolution since 2010, and why it remains a critical strategy in combating modern cyber threats.</p>
<p>Whether you're an IT professional, cybersecurity enthusiast, or just curious about the latest in cyber defense, this episode offers actionable insights and expert perspectives on a vital security strategy.</p>
<p>👉🏻👉🏻 <a href="https://threat-talks.com/?p=1633" rel="external noreferrer noopener">https://threat-talks.com/threat-talks-on-tour-john-kindervag-2/</a></p>]]>
      </content:encoded>
      <pubDate>Tue, 18 Jun 2024 08:00:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/226bb64d/3f2f25c9.mp3" length="30400941" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/EENb7mpzzOQhpx2oOIN8YAsLM-Piqh3VYQsP_Dgjfd8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84ODdm/ODU2Mjc0M2FkM2E0/NGQ2NjQ2ZDVlYjcw/NjM2Zi5qcGc.jpg"/>
      <itunes:duration>1900</itunes:duration>
      <itunes:summary>Discover how Zero Trust can effectively protect against cyber threats and hear firsthand experiences from industry leaders! 
Lieuwe Jan Koning and cybersecurity expert John Kindervag dive into the concept of Zero Trust at the RSA Conference in San Francisco. 
They discuss the prevalence and importance of Zero Trust in the cybersecurity landscape, sharing insights from the conference and Kindervag's extensive experience. 
Learn about the fundamentals of Zero Trust, its evolution since 2010, and why it remains a critical strategy in combating modern cyber threats.
Whether you're an IT professional, cybersecurity enthusiast, or just curious about the latest in cyber defense, this episode offers actionable insights and expert perspectives on a vital security strategy.
👉🏻👉🏻 https://threat-talks.com/threat-talks-on-tour-john-kindervag-2/</itunes:summary>
      <itunes:subtitle>Discover how Zero Trust can effectively protect against cyber threats and hear firsthand experiences from industry leaders! 
Lieuwe Jan Koning and cybersecurity expert John Kindervag dive into the concept of Zero Trust at the RSA Conference in San Francis</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Zero Trust with John Kindervag - Threat Talks on tour: Live from the RSA | Part 1</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>21</itunes:episode>
      <podcast:episode>21</podcast:episode>
      <itunes:title>Zero Trust with John Kindervag - Threat Talks on tour: Live from the RSA | Part 1</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">50a28324-97d2-43be-bf1e-572036724ead</guid>
      <link>https://share.transistor.fm/s/a181b193</link>
      <description>
        <![CDATA[<p>Join host Lieuwe Jan Koning as he interviews John Kindervag, creator of Zero Trust, at the RSA conference. </p>
<p>Explore the origins, principles, and impact of Zero Trust on modern cybersecurity. </p>
<p>Download the NSTAC report discussed in the episode <a href="https://www.cisa.gov/sites/default/files/publications/Final%20Draft%20NSTAC%20Report%20to%20the%20President%20on%20Zero%20Trust%20and%20Trusted%20Identity%20Management.pdf" rel="noreferrer">here</a>.</p>
<p>Get your Threat Talks T-shirt on https://threat-talks.com/! </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Join host Lieuwe Jan Koning as he interviews John Kindervag, creator of Zero Trust, at the RSA conference. </p>
<p>Explore the origins, principles, and impact of Zero Trust on modern cybersecurity. </p>
<p>Download the NSTAC report discussed in the episode <a href="https://www.cisa.gov/sites/default/files/publications/Final%20Draft%20NSTAC%20Report%20to%20the%20President%20on%20Zero%20Trust%20and%20Trusted%20Identity%20Management.pdf" rel="noreferrer">here</a>.</p>
<p>Get your Threat Talks T-shirt on https://threat-talks.com/! </p>]]>
      </content:encoded>
      <pubDate>Tue, 11 Jun 2024 08:26:56 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/a181b193/c5841e4f.mp3" length="29726310" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/9VzlkhBjOiEqUKiIYYeAZpyFDxR5zVMav8ybWB7plik/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xYmYx/NTgxNjIzYTFjMzhj/ZTI5MzEwMGMwZmNi/MjdmMC5qcGc.jpg"/>
      <itunes:duration>1858</itunes:duration>
      <itunes:summary>Join host Lieuwe Jan Koning as he interviews John Kindervag, creator of Zero Trust, at the RSA conference. 
Explore the origins, principles, and impact of Zero Trust on modern cybersecurity. 
Download the NSTAC report discussed in the episode here.
Get your Threat Talks T-shirt on https://threat-talks.com/! </itunes:summary>
      <itunes:subtitle>Join host Lieuwe Jan Koning as he interviews John Kindervag, creator of Zero Trust, at the RSA conference. 
Explore the origins, principles, and impact of Zero Trust on modern cybersecurity. 
Download the NSTAC report discussed in the episode here.
Get yo</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Deep Dive - ScreenConnect: Authentication Bypass</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>20</itunes:episode>
      <podcast:episode>20</podcast:episode>
      <itunes:title>Deep Dive - ScreenConnect: Authentication Bypass</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6fcc85f7-4037-4dc8-8440-d8533e8a0c8a</guid>
      <link>https://share.transistor.fm/s/50d582c0</link>
      <description>
        <![CDATA[<p>CVE-2024-1709 is a critical vulnerability in ScreenConnect that has been exploited in multiple healthcare-related breaches, highlighting significant security risks.</p>
<p>Explore the Change Healthcare attack caused by compromised Citrix credentials and learn about critical cybersecurity measures like network segmentation and EDR tools. </p>
<p>Explore the infographic for an in-depth look at the ScreenConnect vulnerability: https://threat-talks.com/deep-dive-screenconnect/</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>CVE-2024-1709 is a critical vulnerability in ScreenConnect that has been exploited in multiple healthcare-related breaches, highlighting significant security risks.</p>
<p>Explore the Change Healthcare attack caused by compromised Citrix credentials and learn about critical cybersecurity measures like network segmentation and EDR tools. </p>
<p>Explore the infographic for an in-depth look at the ScreenConnect vulnerability: https://threat-talks.com/deep-dive-screenconnect/</p>]]>
      </content:encoded>
      <pubDate>Tue, 04 Jun 2024 08:00:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/50d582c0/085f4a9f.mp3" length="15075553" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/i_u9g82O1bzicVLrdAPrWT2ZKRMFHT1zrMLczH6uRSA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kNTUx/MjIyYTU1MmFiYTgw/NGYwYzRlODc2MDQ0/NGRkMi5qcGc.jpg"/>
      <itunes:duration>943</itunes:duration>
      <itunes:summary>CVE-2024-1709 is a critical vulnerability in ScreenConnect that has been exploited in multiple healthcare-related breaches, highlighting significant security risks.
Explore the Change Healthcare attack caused by compromised Citrix credentials and learn about critical cybersecurity measures like network segmentation and EDR tools. 
Explore the infographic for an in-depth look at the ScreenConnect vulnerability: https://threat-talks.com/deep-dive-screenconnect/</itunes:summary>
      <itunes:subtitle>CVE-2024-1709 is a critical vulnerability in ScreenConnect that has been exploited in multiple healthcare-related breaches, highlighting significant security risks.
Explore the Change Healthcare attack caused by compromised Citrix credentials and learn ab</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Deep Dive - Ireland's HSE Ransomware Attack</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>19</itunes:episode>
      <podcast:episode>19</podcast:episode>
      <itunes:title>Deep Dive - Ireland's HSE Ransomware Attack</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3d1462e1-b417-4038-94be-c47c0e36231f</guid>
      <link>https://share.transistor.fm/s/1ebb5a90</link>
      <description>
        <![CDATA[<p>How did Ireland's largest healthcare network, HSE, fall victim to a crippling ransomware attack? </p>
<p>What security flaws were exploited, and how can you prevent similar threats? </p>
<p>Join us in this Deep Dive of Threat Talks as we uncover the details of the attack, the tactics used by cybercriminals, and essential strategies to protect your organization. </p>
<p>Can your defenses withstand a ransomware attack? Tune in to find out!</p>
<p>Download the infographic here: https://threat-talks.com/deep-dive-hse-ransomware/ </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>How did Ireland's largest healthcare network, HSE, fall victim to a crippling ransomware attack? </p>
<p>What security flaws were exploited, and how can you prevent similar threats? </p>
<p>Join us in this Deep Dive of Threat Talks as we uncover the details of the attack, the tactics used by cybercriminals, and essential strategies to protect your organization. </p>
<p>Can your defenses withstand a ransomware attack? Tune in to find out!</p>
<p>Download the infographic here: https://threat-talks.com/deep-dive-hse-ransomware/ </p>]]>
      </content:encoded>
      <pubDate>Tue, 28 May 2024 08:17:41 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/1ebb5a90/9bfafcd7.mp3" length="25299248" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/kgKUlTvZT3cCks4LTeR6Fa2WdU0DYdiVxSlA592o5S8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84MzVl/YTY1MjZhMWY2NmYw/Njc1Y2JhN2Q5MGUx/NTQwOS5qcGc.jpg"/>
      <itunes:duration>1582</itunes:duration>
      <itunes:summary>How did Ireland's largest healthcare network, HSE, fall victim to a crippling ransomware attack? 
What security flaws were exploited, and how can you prevent similar threats? 
Join us in this Deep Dive of Threat Talks as we uncover the details of the attack, the tactics used by cybercriminals, and essential strategies to protect your organization. 
Can your defenses withstand a ransomware attack? Tune in to find out!
Download the infographic here: https://threat-talks.com/deep-dive-hse-ransomware/ </itunes:summary>
      <itunes:subtitle>How did Ireland's largest healthcare network, HSE, fall victim to a crippling ransomware attack? 
What security flaws were exploited, and how can you prevent similar threats? 
Join us in this Deep Dive of Threat Talks as we uncover the details of the atta</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Deep Dive - DICOM: The hidden risks of Legacy Protocols</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>18</itunes:episode>
      <podcast:episode>18</podcast:episode>
      <itunes:title>Deep Dive - DICOM: The hidden risks of Legacy Protocols</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9435382c-25dd-49c1-83d4-f276f680eee5</guid>
      <link>https://share.transistor.fm/s/4f589d2c</link>
      <description>
        <![CDATA[<p>Discover the vulnerabilities of the DICOM protocol in healthcare and the significant risks it poses, including data breaches and manipulation. </p>
<p>This deep dive covers practical solutions for protecting sensitive patient information and enhancing cybersecurity measures in medical systems. </p>
<p>Join host Lieuwe Jan Koning with guests Jan van Boesschoten and Sina Yazdanmehr as they explore these critical issues and provide actionable advice for healthcare providers.</p>
<p>Download the infographic here: <a href="https://threat-talks.com/?p=1400" rel="external noreferrer noopener">https://threat-talks.com/deep-dive-dicom/</a></p>
<p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Discover the vulnerabilities of the DICOM protocol in healthcare and the significant risks it poses, including data breaches and manipulation. </p>
<p>This deep dive covers practical solutions for protecting sensitive patient information and enhancing cybersecurity measures in medical systems. </p>
<p>Join host Lieuwe Jan Koning with guests Jan van Boesschoten and Sina Yazdanmehr as they explore these critical issues and provide actionable advice for healthcare providers.</p>
<p>Download the infographic here: <a href="https://threat-talks.com/?p=1400" rel="external noreferrer noopener">https://threat-talks.com/deep-dive-dicom/</a></p>
<p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 21 May 2024 08:00:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/4f589d2c/6c031286.mp3" length="19202489" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/tFdA0J2HXH54XqXrx4DxRC3S6E9KvLJ2IQze8lzVuXE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kMzVi/OWE1Y2RmOWE1ZmQy/ZjhjNGRkZDIxZDgz/ZmVjYS5qcGc.jpg"/>
      <itunes:duration>1201</itunes:duration>
      <itunes:summary>Discover the vulnerabilities of the DICOM protocol in healthcare and the significant risks it poses, including data breaches and manipulation. 
This deep dive covers practical solutions for protecting sensitive patient information and enhancing cybersecurity measures in medical systems. 
Join host Lieuwe Jan Koning with guests Jan van Boesschoten and Sina Yazdanmehr as they explore these critical issues and provide actionable advice for healthcare providers.
Download the infographic here: https://threat-talks.com/deep-dive-dicom/</itunes:summary>
      <itunes:subtitle>Discover the vulnerabilities of the DICOM protocol in healthcare and the significant risks it poses, including data breaches and manipulation. 
This deep dive covers practical solutions for protecting sensitive patient information and enhancing cybersecur</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Healthcare: Responsibilities, regulations and legacies - Threat Talks</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>17</itunes:episode>
      <podcast:episode>17</podcast:episode>
      <itunes:title>Healthcare: Responsibilities, regulations and legacies - Threat Talks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">faffaa8b-83b8-46ff-b233-54d8d1d32256</guid>
      <link>https://share.transistor.fm/s/dfd1bd37</link>
      <description>
        <![CDATA[<p>In this episode of Threat Talks, we examine major cybersecurity risks in healthcare.</p>
<p>We discuss how old systems like DICOM, still widely used, can lead to serious cyberattacks. How do recent breaches and outdated protocols threaten patient privacy and disrupt healthcare services?</p>
<p>Guided by Lieuwe Jan Koning, CTO of ON2IT, alongside cybersecurity experts Sina Yazdanmehr and Rob Maas, we explore the dangerous terrain of legacy systems, highlighting breaches involving HSE hospitals and vulnerabilities in ScreenConnect, and explaining how outdated protocols and software threaten patient privacy and disrupt healthcare services.</p>
<p>Here is the link to Sina's DICOM talk: <a href="https://www.youtube.com/watch?v=CgJIxTP8ydQ&amp;t=0s" rel="noopener noreferer">https://www.youtube.com/watch?v=CgJIxTP8ydQ&amp;t=0s </a></p>
<p>Download the infographic here: <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqa0h1N21HSkJNdFc4QXdfWGtuMEx3d0ZqeVp6QXxBQ3Jtc0tuZjFYTHd2RE1pTW40bEFqRzB3ampXS1J1b1NYb0dIZjdqN1BJRUhORUtCNllLbXhZdllLZjAxUllqZFNLYW8zNkVjZGZUc2oyeUJMUHd2eDVjc015VlN2NndCeUx5NHNmQUJCaU1fMXpQbjM0TWpfaw&amp;q=https%3A%2F%2Fthreat-talks.com%2Fhealthcare%2F&amp;v=wBodTl_nY1w" rel="nofollow">https://threat-talks.com/healthcare-responsibilities-regulations-and-legacies/</a></p>
<p><br></p>
<p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Threat Talks, we examine major cybersecurity risks in healthcare.</p>
<p>We discuss how old systems like DICOM, still widely used, can lead to serious cyberattacks. How do recent breaches and outdated protocols threaten patient privacy and disrupt healthcare services?</p>
<p>Guided by Lieuwe Jan Koning, CTO of ON2IT, alongside cybersecurity experts Sina Yazdanmehr and Rob Maas, we explore the dangerous terrain of legacy systems, highlighting breaches involving HSE hospitals and vulnerabilities in ScreenConnect, and explaining how outdated protocols and software threaten patient privacy and disrupt healthcare services.</p>
<p>Here is the link to Sina's DICOM talk: <a href="https://www.youtube.com/watch?v=CgJIxTP8ydQ&amp;t=0s" rel="noopener noreferer">https://www.youtube.com/watch?v=CgJIxTP8ydQ&amp;t=0s </a></p>
<p>Download the infographic here: <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqa0h1N21HSkJNdFc4QXdfWGtuMEx3d0ZqeVp6QXxBQ3Jtc0tuZjFYTHd2RE1pTW40bEFqRzB3ampXS1J1b1NYb0dIZjdqN1BJRUhORUtCNllLbXhZdllLZjAxUllqZFNLYW8zNkVjZGZUc2oyeUJMUHd2eDVjc015VlN2NndCeUx5NHNmQUJCaU1fMXpQbjM0TWpfaw&amp;q=https%3A%2F%2Fthreat-talks.com%2Fhealthcare%2F&amp;v=wBodTl_nY1w" rel="nofollow">https://threat-talks.com/healthcare-responsibilities-regulations-and-legacies/</a></p>
<p><br></p>
<p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 14 May 2024 08:00:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/dfd1bd37/595d7ec1.mp3" length="41704590" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/evw2dW_LBhzKBK64KPOcyUZ_593ooIy9k1cEc0iSg04/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zN2Y1/MzMxM2I2ZWZlOTJm/OTM1ZGQyOWVjZTUx/YWIyZC5qcGc.jpg"/>
      <itunes:duration>2607</itunes:duration>
      <itunes:summary>In this episode of Threat Talks, we examine major cybersecurity risks in healthcare.
We discuss how old systems like DICOM, still widely used, can lead to serious cyberattacks. How do recent breaches and outdated protocols threaten patient privacy and disrupt healthcare services?
Guided by Lieuwe Jan Koning, CTO of ON2IT, alongside cybersecurity experts Sina Yazdanmehr and Rob Maas, we explore the dangerous terrain of legacy systems, highlighting breaches involving HSE hospitals and vulnerabilities in ScreenConnect, and explaining how outdated protocols and software threaten patient privacy and disrupt healthcare services.
Here is the link to Sina's DICOM talk: https://www.youtube.com/watch?v=CgJIxTP8ydQ&amp;amp;t=0s 
Download the infographic here: https://threat-talks.com/healthcare-responsibilities-regulations-and-legacies/</itunes:summary>
      <itunes:subtitle>In this episode of Threat Talks, we examine major cybersecurity risks in healthcare.
We discuss how old systems like DICOM, still widely used, can lead to serious cyberattacks. How do recent breaches and outdated protocols threaten patient privacy and dis</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Palo Alto Networks CVE-2024-3400: a comprehensive analysis of the vulnerability</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>16</itunes:episode>
      <podcast:episode>16</podcast:episode>
      <itunes:title>Palo Alto Networks CVE-2024-3400: a comprehensive analysis of the vulnerability</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3312b601-8ee8-47c4-93f8-9808abada39c</guid>
      <link>https://share.transistor.fm/s/6a04cfb3</link>
      <description>
        <![CDATA[<p>Tune into this special episode of Threat Talks, as we dissect the critical CVE 2024 3400 vulnerability in Palo Alto Networks' GlobalProtect servers. </p>
<p>Join our cybersecurity experts for a deep dive into the vulnerability's implications, our response strategies, and practical tips to bolster your defenses against similar threats.</p>
<p><br></p>
<p>For those who crave even more detailed insights, be sure to check out our comprehensive information page on this topic: https://on2it.net/nl/cve-2024-3400-pan-os-os-command-injection-vulnerability-in-globalprotect/</p>
<p>And read our blog posts for a deeper dive into the technical aspects and implications of CVE-2024-3400: </p>
<p>☞ https://on2it.net/palo-alto-networks-cve-2024-3400-alert/
☞ https://on2it.net/vpn-firewall-integration-a-strategic-analysis/</p>
<p><br></p>
<p>Download the infographic here: https://threat-talks.com/unraveling-cve-2024-3400/</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Tune into this special episode of Threat Talks, as we dissect the critical CVE 2024 3400 vulnerability in Palo Alto Networks' GlobalProtect servers. </p>
<p>Join our cybersecurity experts for a deep dive into the vulnerability's implications, our response strategies, and practical tips to bolster your defenses against similar threats.</p>
<p><br></p>
<p>For those who crave even more detailed insights, be sure to check out our comprehensive information page on this topic: https://on2it.net/nl/cve-2024-3400-pan-os-os-command-injection-vulnerability-in-globalprotect/</p>
<p>And read our blog posts for a deeper dive into the technical aspects and implications of CVE-2024-3400: </p>
<p>☞ https://on2it.net/palo-alto-networks-cve-2024-3400-alert/
☞ https://on2it.net/vpn-firewall-integration-a-strategic-analysis/</p>
<p><br></p>
<p>Download the infographic here: https://threat-talks.com/unraveling-cve-2024-3400/</p>]]>
      </content:encoded>
      <pubDate>Tue, 07 May 2024 08:00:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/6a04cfb3/19af8fa5.mp3" length="38436159" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/1Wyhf4nmDaqppY8ELv4LwctcJ8euYrDuDevZbwy8Dcw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mNTVj/YTlkZDUwNmVjNjI2/MWI2MTdiZTFmNDc4/Yjg4OC5qcGc.jpg"/>
      <itunes:duration>2403</itunes:duration>
      <itunes:summary>Tune into this special episode of Threat Talks, as we dissect the critical CVE 2024 3400 vulnerability in Palo Alto Networks' GlobalProtect servers. 
Join our cybersecurity experts for a deep dive into the vulnerability's implications, our response strategies, and practical tips to bolster your defenses against similar threats.

For those who crave even more detailed insights, be sure to check out our comprehensive information page on this topic: https://on2it.net/nl/cve-2024-3400-pan-os-os-command-injection-vulnerability-in-globalprotect/
And read our blog posts for a deeper dive into the technical aspects and implications of CVE-2024-3400: 
☞ https://on2it.net/palo-alto-networks-cve-2024-3400-alert/
☞ https://on2it.net/vpn-firewall-integration-a-strategic-analysis/

Download the infographic here: https://threat-talks.com/unraveling-cve-2024-3400/</itunes:summary>
      <itunes:subtitle>Tune into this special episode of Threat Talks, as we dissect the critical CVE 2024 3400 vulnerability in Palo Alto Networks' GlobalProtect servers. 
Join our cybersecurity experts for a deep dive into the vulnerability's implications, our response strate</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Deep Dive - Reflection Attack - The most simple dos attack</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>15</itunes:episode>
      <podcast:episode>15</podcast:episode>
      <itunes:title>Deep Dive - Reflection Attack - The most simple dos attack</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">dfb7d726-8b58-4a60-a43f-945ac443c4a3</guid>
      <link>https://share.transistor.fm/s/ca3146fa</link>
      <description>
        <![CDATA[<p>Understanding Reflection Attacks: A Simple Yet Powerful DOS Method.</p>
<p>
👕 Request your own Threat Talks T'shirt: https://threat-talks.com/cant-deny-ddos-in-2024/

Distributed Denial of Service (DDoS) Attacks Explained

Picture this: a DDOS attack, but turbocharged by the clever use of network request reflections. This discussion sheds light on how attackers harness the normal functions of protocols to unleash powerful assaults on unprepared targets. Interestingly, these attacks don't rely on exploiting software flaws; instead, they use the basic architecture of protocols like DNS and NTP to increase their destructive power.

Here's a breakdown of what you need to know about reflection attacks, from their conception to how they're combatted:

The Basics: What exactly is a reflection attack? We delve into the fundamental components of these attacks, detailing the roles of the attacker, the servers, and the victims caught in the digital crossfire.
Why UDP?: Discover why UDP is the preferred protocol for reflection attacks. What makes it uniquely vulnerable, and how does it help the attacker?

Defense Strategies: What strategies can organizations employ against the relentless flood of unwanted network responses? We explore practical steps for mitigation, helping you fortify your defenses against such insidious attacks.

Join us as we dive into the strategic approach to a cyber attack, where knowing how to anticipate and counter the adversary's tactics is critical to protecting your digital assets. Let's explore together and strengthen our defenses!

✅ All our Threat Talks can be found on https://threat-talks.com

👕 Request your own Threat Talks T'shirt: https://threat-talks.com/cant-deny-ddos-in-2024/

🕵️ Threat Talks is a collaboration between on2IT and AMS-IX

</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Understanding Reflection Attacks: A Simple Yet Powerful DOS Method.</p>
<p>
👕 Request your own Threat Talks T'shirt: https://threat-talks.com/cant-deny-ddos-in-2024/

Distributed Denial of Service (DDoS) Attacks Explained

Picture this: a DDOS attack, but turbocharged by the clever use of network request reflections. This discussion sheds light on how attackers harness the normal functions of protocols to unleash powerful assaults on unprepared targets. Interestingly, these attacks don't rely on exploiting software flaws; instead, they use the basic architecture of protocols like DNS and NTP to increase their destructive power.

Here's a breakdown of what you need to know about reflection attacks, from their conception to how they're combatted:

The Basics: What exactly is a reflection attack? We delve into the fundamental components of these attacks, detailing the roles of the attacker, the servers, and the victims caught in the digital crossfire.
Why UDP?: Discover why UDP is the preferred protocol for reflection attacks. What makes it uniquely vulnerable, and how does it help the attacker?

Defense Strategies: What strategies can organizations employ against the relentless flood of unwanted network responses? We explore practical steps for mitigation, helping you fortify your defenses against such insidious attacks.

Join us as we dive into the strategic approach to a cyber attack, where knowing how to anticipate and counter the adversary's tactics is critical to protecting your digital assets. Let's explore together and strengthen our defenses!

✅ All our Threat Talks can be found on https://threat-talks.com

👕 Request your own Threat Talks T'shirt: https://threat-talks.com/cant-deny-ddos-in-2024/

🕵️ Threat Talks is a collaboration between on2IT and AMS-IX

</p>]]>
      </content:encoded>
      <pubDate>Tue, 30 Apr 2024 08:00:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/ca3146fa/e270bd6b.mp3" length="17168496" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:duration>715</itunes:duration>
      <itunes:summary>Understanding Reflection Attacks: A Simple Yet Powerful DOS Method.

👕 Request your own Threat Talks T'shirt: https://threat-talks.com/cant-deny-ddos-in-2024/

Distributed Denial of Service (DDoS) Attacks Explained

Picture this: a DDOS attack, but turbocharged by the clever use of network request reflections. This discussion sheds light on how attackers harness the normal functions of protocols to unleash powerful assaults on unprepared targets. Interestingly, these attacks don't rely on exploiting software flaws; instead, they use the basic architecture of protocols like DNS and NTP to increase their destructive power.

Here's a breakdown of what you need to know about reflection attacks, from their conception to how they're combatted:

The Basics: What exactly is a reflection attack? We delve into the fundamental components of these attacks, detailing the roles of the attacker, the servers, and the victims caught in the digital crossfire.
Why UDP?: Discover why UDP is the preferred protocol for reflection attacks. What makes it uniquely vulnerable, and how does it help the attacker?

Defense Strategies: What strategies can organizations employ against the relentless flood of unwanted network responses? We explore practical steps for mitigation, helping you fortify your defenses against such insidious attacks.

Join us as we dive into the strategic approach to a cyber attack, where knowing how to anticipate and counter the adversary's tactics is critical to protecting your digital assets. Let's explore together and strengthen our defenses!

✅ All our Threat Talks can be found on https://threat-talks.com

👕 Request your own Threat Talks T'shirt: https://threat-talks.com/cant-deny-ddos-in-2024/

🕵️ Threat Talks is a collaboration between on2IT and AMS-IX</itunes:summary>
      <itunes:subtitle>Understanding Reflection Attacks: A Simple Yet Powerful DOS Method.

👕 Request your own Threat Talks T'shirt: https://threat-talks.com/cant-deny-ddos-in-2024/

Distributed Denial of Service (DDoS) Attacks Explained

Picture this: a DDOS attack, but turboc</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Deep Dive - MOVEit: The danger of delegating data to third-party software</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>14</itunes:episode>
      <podcast:episode>14</podcast:episode>
      <itunes:title>Deep Dive - MOVEit: The danger of delegating data to third-party software</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9d67ec40-2932-423a-bd6c-fff58daeaa65</guid>
      <link>https://share.transistor.fm/s/97b7d126</link>
      <description>
        <![CDATA[<p>Dive into the largest data breach of 2023, a devastating supply chain attack involving the MOVEit software, which impacted over 60 million individuals. </p>
<p>Learn how the Klo Ransomware Group exploited a zero-day vulnerability through SQL injection to carry out their attack, and the challenges this presents for cybersecurity measures today.</p>
<p>Interested in the full technical info of the discussed threats? For more detailed information or to access the infographic, please visit https://threat-talks.com/deep-dive-moveit/</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Dive into the largest data breach of 2023, a devastating supply chain attack involving the MOVEit software, which impacted over 60 million individuals. </p>
<p>Learn how the Klo Ransomware Group exploited a zero-day vulnerability through SQL injection to carry out their attack, and the challenges this presents for cybersecurity measures today.</p>
<p>Interested in the full technical info of the discussed threats? For more detailed information or to access the infographic, please visit https://threat-talks.com/deep-dive-moveit/</p>]]>
      </content:encoded>
      <pubDate>Tue, 23 Apr 2024 08:00:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/97b7d126/e89aa4ff.mp3" length="14325342" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/7U-bxcaN-H8PIoqmB2esEXyyHNzfjCrZr2dvlYHxaTA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iZGFj/MjY4NmVlYTZmZjEz/NmY3ZGFjYzUxMDlk/YmE2My5qcGc.jpg"/>
      <itunes:duration>896</itunes:duration>
      <itunes:summary>Dive into the largest data breach of 2023, a devastating supply chain attack involving the MOVEit software, which impacted over 60 million individuals. 
Learn how the Klo Ransomware Group exploited a zero-day vulnerability through SQL injection to carry out their attack, and the challenges this presents for cybersecurity measures today.
Interested in the full technical info of the discussed threats? For more detailed information or to access the infographic, please visit https://threat-talks.com/deep-dive-moveit/</itunes:summary>
      <itunes:subtitle>Dive into the largest data breach of 2023, a devastating supply chain attack involving the MOVEit software, which impacted over 60 million individuals. 
Learn how the Klo Ransomware Group exploited a zero-day vulnerability through SQL injection to carry o</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Deep Dive - Log4j: The danger of software dependencies</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>13</itunes:episode>
      <podcast:episode>13</podcast:episode>
      <itunes:title>Deep Dive - Log4j: The danger of software dependencies</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">99ff7e52-f3cf-42c4-ad02-8425c219a709</guid>
      <link>https://share.transistor.fm/s/6a828470</link>
      <description>
        <![CDATA[<p>Join us for a deep dive episode of Threat Talks, focusing on Log4j, the critical logging library at the heart of Java development. </p>
<p>Discover Log4j's flexibility in message configuration and how it enhances Java programming. Perfect for those looking to deepen their Java and Log4j knowledge.</p>
<p>Interested in the full technical info of the discussed threats? For more detailed information or to access the infographic, please visit https://threat-talks.com/deep-dive-log4j-the-danger-of-software-dependencies/. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Join us for a deep dive episode of Threat Talks, focusing on Log4j, the critical logging library at the heart of Java development. </p>
<p>Discover Log4j's flexibility in message configuration and how it enhances Java programming. Perfect for those looking to deepen their Java and Log4j knowledge.</p>
<p>Interested in the full technical info of the discussed threats? For more detailed information or to access the infographic, please visit https://threat-talks.com/deep-dive-log4j-the-danger-of-software-dependencies/. </p>]]>
      </content:encoded>
      <pubDate>Tue, 16 Apr 2024 08:00:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/6a828470/0fbd2ae6.mp3" length="27408039" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/AMktGb-stqgHh9Gqp-vbIo1cCkNCFDHLTpmUNFsFMJI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82ZGFi/YmZjNzVhOWY5ZTVj/NjRhNWVjY2NhZmVl/M2MwMC5qcGc.jpg"/>
      <itunes:duration>1142</itunes:duration>
      <itunes:summary>Join us for a deep dive episode of Threat Talks, focusing on Log4j, the critical logging library at the heart of Java development. 
Discover Log4j's flexibility in message configuration and how it enhances Java programming. Perfect for those looking to deepen their Java and Log4j knowledge.
Interested in the full technical info of the discussed threats? For more detailed information or to access the infographic, please visit https://threat-talks.com/deep-dive-log4j-the-danger-of-software-dependencies/. </itunes:summary>
      <itunes:subtitle>Join us for a deep dive episode of Threat Talks, focusing on Log4j, the critical logging library at the heart of Java development. 
Discover Log4j's flexibility in message configuration and how it enhances Java programming. Perfect for those looking to de</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Deep Dive - SolarWinds: The danger of third-party software</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>12</itunes:episode>
      <podcast:episode>12</podcast:episode>
      <itunes:title>Deep Dive - SolarWinds: The danger of third-party software</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0ea17951-d5e4-4eda-9092-d9f10e48ccb7</guid>
      <link>https://share.transistor.fm/s/dfc7ccad</link>
      <description>
        <![CDATA[<p>The SolarWinds incident, affecting 18,000 high-profile environments, including the US government and Fortune 500 companies, was attributed to the state-sponsored group Fancy Bear. </p>
<p>This breach demonstrated the complexity and reach of supply chain attacks, emphasizing the challenge of defending against state-backed adversaries.</p>
<p><br>Interested in the full technical info of the discussed threats? For more detailed information or to access the infographic, please visit https://threat-talks.com/deep-dive-solarwinds-the-danger-of-third-party-software/.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The SolarWinds incident, affecting 18,000 high-profile environments, including the US government and Fortune 500 companies, was attributed to the state-sponsored group Fancy Bear. </p>
<p>This breach demonstrated the complexity and reach of supply chain attacks, emphasizing the challenge of defending against state-backed adversaries.</p>
<p><br>Interested in the full technical info of the discussed threats? For more detailed information or to access the infographic, please visit https://threat-talks.com/deep-dive-solarwinds-the-danger-of-third-party-software/.</p>]]>
      </content:encoded>
      <pubDate>Tue, 09 Apr 2024 08:00:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/dfc7ccad/ce692c24.mp3" length="21042975" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/jZZrO_EkVIsC1MtCXOmwsNXRiwY9l_QGIP-WEGaOBTk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85MGM2/NDNjMjc2YzE1YjEx/NDI5YTk3YTVmNGIx/ZDUzMC5qcGc.jpg"/>
      <itunes:duration>1316</itunes:duration>
      <itunes:summary>The SolarWinds incident, affecting 18,000 high-profile environments, including the US government and Fortune 500 companies, was attributed to the state-sponsored group Fancy Bear. 
This breach demonstrated the complexity and reach of supply chain attacks, emphasizing the challenge of defending against state-backed adversaries.
Interested in the full technical info of the discussed threats? For more detailed information or to access the infographic, please visit https://threat-talks.com/deep-dive-solarwinds-the-danger-of-third-party-software/.</itunes:summary>
      <itunes:subtitle>The SolarWinds incident, affecting 18,000 high-profile environments, including the US government and Fortune 500 companies, was attributed to the state-sponsored group Fancy Bear. 
This breach demonstrated the complexity and reach of supply chain attacks,</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Supply chain: business as usual? - Threat Talks</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>11</itunes:episode>
      <podcast:episode>11</podcast:episode>
      <itunes:title>Supply chain: business as usual? - Threat Talks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5f4763ac-c570-44b3-94ed-b3e029af7557</guid>
      <link>https://share.transistor.fm/s/df70a184</link>
      <description>
        <![CDATA[<p>In this episode of Threat Talks, we explore the covert perils of supply chain attacks. Matthijs Zwart, CIO and CISO at Vitens, acknowledges the risk landscape surrounding supply chain attacks, but also suggests that the occasional incident can offer unforeseen advantages.</p>
<p>Featuring Matthijs as the special guest, this episode brings together host Lieuwe Jan Koning and Threat Intel Specialist Luca Cipriano for a comprehensive examination of supply chain attacks. They delve into the characteristics of these threats, defensive tactics, and how Vitens has successfully managed previous episodes involving SolarWinds, Log4j, and MOVEit.</p>
<p>Interested in the full technical info of the discussed threats? For more detailed information or to access the infographic, please visit https://threat-talks.com/supply-chain-business-as-usual/.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Threat Talks, we explore the covert perils of supply chain attacks. Matthijs Zwart, CIO and CISO at Vitens, acknowledges the risk landscape surrounding supply chain attacks, but also suggests that the occasional incident can offer unforeseen advantages.</p>
<p>Featuring Matthijs as the special guest, this episode brings together host Lieuwe Jan Koning and Threat Intel Specialist Luca Cipriano for a comprehensive examination of supply chain attacks. They delve into the characteristics of these threats, defensive tactics, and how Vitens has successfully managed previous episodes involving SolarWinds, Log4j, and MOVEit.</p>
<p>Interested in the full technical info of the discussed threats? For more detailed information or to access the infographic, please visit https://threat-talks.com/supply-chain-business-as-usual/.</p>]]>
      </content:encoded>
      <pubDate>Tue, 02 Apr 2024 08:00:00 +0000</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/df70a184/072ea6e8.mp3" length="61755547" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/N93FsFcFnQ7FvwxKPEI_-FghxNAONORpGKIXxnIBdV8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jYmYw/YTI0NzQxZTlmYmQ4/MGY1MTBhMTZmYjI4/Njg1MC5qcGc.jpg"/>
      <itunes:duration>2573</itunes:duration>
      <itunes:summary>In this episode of Threat Talks, we explore the covert perils of supply chain attacks. Matthijs Zwart, CIO and CISO at Vitens, acknowledges the risk landscape surrounding supply chain attacks, but also suggests that the occasional incident can offer unforeseen advantages.
Featuring Matthijs as the special guest, this episode brings together host Lieuwe Jan Koning and Threat Intel Specialist Luca Cipriano for a comprehensive examination of supply chain attacks. They delve into the characteristics of these threats, defensive tactics, and how Vitens has successfully managed previous episodes involving SolarWinds, Log4j, and MOVEit.
Interested in the full technical info of the discussed threats? For more detailed information or to access the infographic, please visit https://threat-talks.com/supply-chain-business-as-usual/.</itunes:summary>
      <itunes:subtitle>In this episode of Threat Talks, we explore the covert perils of supply chain attacks. Matthijs Zwart, CIO and CISO at Vitens, acknowledges the risk landscape surrounding supply chain attacks, but also suggests that the occasional incident can offer unfor</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Deep Dive - Ivanti EPM</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>10</itunes:episode>
      <podcast:episode>10</podcast:episode>
      <itunes:title>Deep Dive - Ivanti EPM</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">473fb941-cf96-4e7e-91d2-8f9c1085a6d4</guid>
      <link>https://share.transistor.fm/s/c6545062</link>
      <description>
        <![CDATA[<p>This Threat Talks - deep dive - focuses on a recent SQL injection attack targeting Ivanti EPM software, a powerful endpoint management solution. </p>
<p>Lieuwe Jan Koning, Luca Cipriano and Rob Maas explore the attack's mechanics, its implications for network security, and compare it to historical incidents like the SolarWinds supply chain attack. The episode offers a thorough analysis of how organizations can defend against such vulnerabilities, emphasizing the importance of secure management software in protecting endpoints. </p>
<p>Through expert insights and practical advice, the talk highlights the critical need for robust cybersecurity measures in today's digital landscape.</p>
<p>Interested in the full technical info of the discussed threats? For more detailed information or to access the infographic, please visit https://threat-talks.com/deep-dive-ivanti-epm/</p>
<p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This Threat Talks - deep dive - focuses on a recent SQL injection attack targeting Ivanti EPM software, a powerful endpoint management solution. </p>
<p>Lieuwe Jan Koning, Luca Cipriano and Rob Maas explore the attack's mechanics, its implications for network security, and compare it to historical incidents like the SolarWinds supply chain attack. The episode offers a thorough analysis of how organizations can defend against such vulnerabilities, emphasizing the importance of secure management software in protecting endpoints. </p>
<p>Through expert insights and practical advice, the talk highlights the critical need for robust cybersecurity measures in today's digital landscape.</p>
<p>Interested in the full technical info of the discussed threats? For more detailed information or to access the infographic, please visit https://threat-talks.com/deep-dive-ivanti-epm/</p>
<p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 26 Mar 2024 08:00:00 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/c6545062/f934be8f.mp3" length="19447573" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/wdToWHwKAadr0jHP77V3CyC6fWU9G5trzDK1yjGBsnA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wN2Ez/MWMwN2NhNjBlNjRj/MzQzZjdiZmM1MTVk/OGZjZi5qcGc.jpg"/>
      <itunes:duration>810</itunes:duration>
      <itunes:summary>This Threat Talks - deep dive - focuses on a recent SQL injection attack targeting Ivanti EPM software, a powerful endpoint management solution. 
Lieuwe Jan Koning, Luca Cipriano and Rob Maas explore the attack's mechanics, its implications for network security, and compare it to historical incidents like the SolarWinds supply chain attack. The episode offers a thorough analysis of how organizations can defend against such vulnerabilities, emphasizing the importance of secure management software in protecting endpoints. 
Through expert insights and practical advice, the talk highlights the critical need for robust cybersecurity measures in today's digital landscape.
Interested in the full technical info of the discussed threats? For more detailed information or to access the infographic, please visit https://threat-talks.com/deep-dive-ivanti-epm/</itunes:summary>
      <itunes:subtitle>This Threat Talks - deep dive - focuses on a recent SQL injection attack targeting Ivanti EPM software, a powerful endpoint management solution. 
Lieuwe Jan Koning, Luca Cipriano and Rob Maas explore the attack's mechanics, its implications for network se</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Deep Dive – Google OAuth bypass</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>9</itunes:episode>
      <podcast:episode>9</podcast:episode>
      <itunes:title>Deep Dive – Google OAuth bypass</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7cddcebb-e5d4-4ade-b82a-101723fa93db</guid>
      <link>https://share.transistor.fm/s/16cf3091</link>
      <description>
        <![CDATA[<p>In this deep dive of Threat Talks, we delve into the intricate realm of cybersecurity, spotlighting a newly uncovered vulnerability within Google's OAuth authentication system. </p>
<p>Uncover a hidden feature in the Google multi-login API causing significant disruptions. Intended to streamline the authentication process for Google services like Gmail, Calendar, and Maps, this API harbors an undocumented functionality that enables nefarious actors to circumvent authentication measures, even following a password reset. </p>
<p>Join us as we navigate through the complexities of this security flaw and its implications on digital safety.</p>
<p>Interested in the full technical info of the discussed threats? For more detailed information or to access the infographic, please visit https://threat-talks.com/deep-dive-google-oauth-bypass/</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this deep dive of Threat Talks, we delve into the intricate realm of cybersecurity, spotlighting a newly uncovered vulnerability within Google's OAuth authentication system. </p>
<p>Uncover a hidden feature in the Google multi-login API causing significant disruptions. Intended to streamline the authentication process for Google services like Gmail, Calendar, and Maps, this API harbors an undocumented functionality that enables nefarious actors to circumvent authentication measures, even following a password reset. </p>
<p>Join us as we navigate through the complexities of this security flaw and its implications on digital safety.</p>
<p>Interested in the full technical info of the discussed threats? For more detailed information or to access the infographic, please visit https://threat-talks.com/deep-dive-google-oauth-bypass/</p>]]>
      </content:encoded>
      <pubDate>Tue, 19 Mar 2024 08:00:00 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/16cf3091/9dfe02f3.mp3" length="24007399" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/fJInVIF1xOn921m_PN2XlVwp3uhAAo3uj44vN2IBMd4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMjRl/YTViNmQ5YzQxYWFk/ZDk4MjU0MGJiYjFi/NGY4ZC5qcGc.jpg"/>
      <itunes:duration>1000</itunes:duration>
      <itunes:summary>In this deep dive of Threat Talks, we delve into the intricate realm of cybersecurity, spotlighting a newly uncovered vulnerability within Google's OAuth authentication system. 
Uncover a hidden feature in the Google multi-login API causing significant disruptions. Intended to streamline the authentication process for Google services like Gmail, Calendar, and Maps, this API harbors an undocumented functionality that enables nefarious actors to circumvent authentication measures, even following a password reset. 
Join us as we navigate through the complexities of this security flaw and its implications on digital safety.
Interested in the full technical info of the discussed threats? For more detailed information or to access the infographic, please visit https://threat-talks.com/deep-dive-google-oauth-bypass/</itunes:summary>
      <itunes:subtitle>In this deep dive of Threat Talks, we delve into the intricate realm of cybersecurity, spotlighting a newly uncovered vulnerability within Google's OAuth authentication system. 
Uncover a hidden feature in the Google multi-login API causing significant di</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Deep Dive – Outlook vulnerability</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>Deep Dive – Outlook vulnerability</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5a9e0f43-7236-44e7-a6f0-c1bc52bb05c0</guid>
      <link>https://share.transistor.fm/s/960ceb54</link>
      <description>
        <![CDATA[<p>Fancy Bear, also known by the Russian actor designation APT28, has been implicated in cyber attacks targeting Microsoft Outlook and other platforms, utilizing CVEs to exploit systems. </p>
<p>This group, associated with Russian military intelligence, is known for attempting to influence democratic processes in France and the US, supporting pro-Russian actions in Europe and the US.</p>
<p>Interested in the full technical info of the discussed threat? For more detailed information or to access the infographic, please visit https://threat-talks.com/outlook-vulnerability-deep-dive/</p>
<p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Fancy Bear, also known by the Russian actor designation APT28, has been implicated in cyber attacks targeting Microsoft Outlook and other platforms, utilizing CVEs to exploit systems. </p>
<p>This group, associated with Russian military intelligence, is known for attempting to influence democratic processes in France and the US, supporting pro-Russian actions in Europe and the US.</p>
<p>Interested in the full technical info of the discussed threat? For more detailed information or to access the infographic, please visit https://threat-talks.com/outlook-vulnerability-deep-dive/</p>
<p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 12 Mar 2024 08:00:00 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/960ceb54/92cf1f77.mp3" length="25595613" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/BPbaPTf5xpv5Zz2w6RxEj-f54wHFB4lczwLwVSsB5FM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82NjNl/MTAwY2ZjNDNjNjNm/ZjliZjc5Y2RiZDQ3/ZGI1Mi5qcGc.jpg"/>
      <itunes:duration>1067</itunes:duration>
      <itunes:summary>Fancy Bear, also known by the Russian actor designation APT28, has been implicated in cyber attacks targeting Microsoft Outlook and other platforms, utilizing CVEs to exploit systems. 
This group, associated with Russian military intelligence, is known for attempting to influence democratic processes in France and the US, supporting pro-Russian actions in Europe and the US.
Interested in the full technical info of the discussed threat? For more detailed information or to access the infographic, please visit https://threat-talks.com/outlook-vulnerability-deep-dive/</itunes:summary>
      <itunes:subtitle>Fancy Bear, also known by the Russian actor designation APT28, has been implicated in cyber attacks targeting Microsoft Outlook and other platforms, utilizing CVEs to exploit systems. 
This group, associated with Russian military intelligence, is known fo</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Authentication Apocalypse - Threat Talks</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>The Authentication Apocalypse - Threat Talks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">289e824a-58bd-4a52-a223-bd4a242c7f17</guid>
      <link>https://share.transistor.fm/s/9b6cae08</link>
      <description>
        <![CDATA[<p>Learn about AI-generated phishing attacks, the strengths and weaknesses of multi-factor authentication (MFA), and real-world cyber attack cases. </p>
<p>Discover the balance between security and usability, the importance of user education, and the future of authentication technologies. </p>
<p>Join us for an insightful exploration into the evolving landscape of cybersecurity and how to protect against the ever-present threats online.</p>
<p>Interested in the full technical info of the discussed threats? For more detailed information or to access the infographic, please visit https://threat-talks.com/the-authentication-apocalypse/

</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Learn about AI-generated phishing attacks, the strengths and weaknesses of multi-factor authentication (MFA), and real-world cyber attack cases. </p>
<p>Discover the balance between security and usability, the importance of user education, and the future of authentication technologies. </p>
<p>Join us for an insightful exploration into the evolving landscape of cybersecurity and how to protect against the ever-present threats online.</p>
<p>Interested in the full technical info of the discussed threats? For more detailed information or to access the infographic, please visit https://threat-talks.com/the-authentication-apocalypse/

</p>]]>
      </content:encoded>
      <pubDate>Tue, 05 Mar 2024 08:00:00 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/9b6cae08/80f54f4a.mp3" length="71379354" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ckqhtoL8kGpWjn0nJKABPGMavyOYDQP7zlUNqM7V5qw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84NjE1/MTE2YjU0NzJlODRm/YmExZGUzYzdiNjNh/ZTIzYy5qcGc.jpg"/>
      <itunes:duration>2231</itunes:duration>
      <itunes:summary>Learn about AI-generated phishing attacks, the strengths and weaknesses of multi-factor authentication (MFA), and real-world cyber attack cases. 
Discover the balance between security and usability, the importance of user education, and the future of authentication technologies. 
Join us for an insightful exploration into the evolving landscape of cybersecurity and how to protect against the ever-present threats online.
Interested in the full technical info of the discussed threats? For more detailed information or to access the infographic, please visit https://threat-talks.com/the-authentication-apocalypse/</itunes:summary>
      <itunes:subtitle>Learn about AI-generated phishing attacks, the strengths and weaknesses of multi-factor authentication (MFA), and real-world cyber attack cases. 
Discover the balance between security and usability, the importance of user education, and the future of auth</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Deep Dive - FortiOS SSLVPN buffer overflow</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>Deep Dive - FortiOS SSLVPN buffer overflow</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">45e7991d-6fd2-49ca-8c2b-7ae48c91893e</guid>
      <link>https://share.transistor.fm/s/c685eca8</link>
      <description>
        <![CDATA[<p>Step into the digital fortress with our latest podcast episode on the FortiOS SSLVPN buffer overflow vulnerability. Our cybersecurity experts break down the complexities of this critical threat and guide you through robust protection strategies. </p>
<p>This episode is a must-listen for anyone looking to safeguard their digital landscape against sophisticated cyber threats. Tune in to fortify your knowledge and ensure your organization's resilience in the face of potential cyber attacks.</p>
<p>Interested in the full technical info of the discussed threats? For more detailed information or to access the infographic, please visit https://threat-talks.com/fortios-sslvpn-buffer-overflow/
</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Step into the digital fortress with our latest podcast episode on the FortiOS SSLVPN buffer overflow vulnerability. Our cybersecurity experts break down the complexities of this critical threat and guide you through robust protection strategies. </p>
<p>This episode is a must-listen for anyone looking to safeguard their digital landscape against sophisticated cyber threats. Tune in to fortify your knowledge and ensure your organization's resilience in the face of potential cyber attacks.</p>
<p>Interested in the full technical info of the discussed threats? For more detailed information or to access the infographic, please visit https://threat-talks.com/fortios-sslvpn-buffer-overflow/
</p>]]>
      </content:encoded>
      <pubDate>Tue, 27 Feb 2024 08:00:00 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/c685eca8/372c7a17.mp3" length="14259898" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/FRIuc8TLmpiWHb_l5uQoMdD_6tDjcx3b2xqdJkwnUBQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84ZjA5/ODZhYTJmNTY2MDI2/ZmZiNzIzODNkZWFi/OTYzOC5qcGc.jpg"/>
      <itunes:duration>892</itunes:duration>
      <itunes:summary>Step into the digital fortress with our latest podcast episode on the FortiOS SSLVPN buffer overflow vulnerability. Our cybersecurity experts break down the complexities of this critical threat and guide you through robust protection strategies. 
This episode is a must-listen for anyone looking to safeguard their digital landscape against sophisticated cyber threats. Tune in to fortify your knowledge and ensure your organization's resilience in the face of potential cyber attacks.
Interested in the full technical info of the discussed threats? For more detailed information or to access the infographic, please visit https://threat-talks.com/fortios-sslvpn-buffer-overflow/</itunes:summary>
      <itunes:subtitle>Step into the digital fortress with our latest podcast episode on the FortiOS SSLVPN buffer overflow vulnerability. Our cybersecurity experts break down the complexities of this critical threat and guide you through robust protection strategies. 
This epi</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Deep Dive - Tunnelcrack VPN</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Deep Dive - Tunnelcrack VPN</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5120e0b4-1fcb-419b-b15d-bf5595f1210a</guid>
      <link>https://share.transistor.fm/s/4055551b</link>
      <description>
        <![CDATA[<p>We take a deep dive into TunnelCrack Cybersecurity Risk, an advanced attack that exploits VPN vulnerabilities. Discover the strategies attackers use, from evil twin attacks at your favorite café to sophisticated DNS manipulations. </p>
<p>More importantly, learn how to protect yourself and your organization from such vulnerabilities. Tune in for an enlightening session filled with invaluable insights and preventive measures. </p>
<p>Interested in the full technical info of the discussed threats? For more detailed information or to access the infographic, please visit https://threat-talks.com/tunnelcrack-vpn-deep-dive/


</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>We take a deep dive into TunnelCrack Cybersecurity Risk, an advanced attack that exploits VPN vulnerabilities. Discover the strategies attackers use, from evil twin attacks at your favorite café to sophisticated DNS manipulations. </p>
<p>More importantly, learn how to protect yourself and your organization from such vulnerabilities. Tune in for an enlightening session filled with invaluable insights and preventive measures. </p>
<p>Interested in the full technical info of the discussed threats? For more detailed information or to access the infographic, please visit https://threat-talks.com/tunnelcrack-vpn-deep-dive/


</p>]]>
      </content:encoded>
      <pubDate>Tue, 20 Feb 2024 08:00:00 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/4055551b/b453bed9.mp3" length="18390606" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/2HQJ6gzhdSV7SXYaeIHOtPbNuL2wGUG3-GurDInWjoM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82MmU5/NDMzOWVlOWIyMDVh/Yjc4YmVlYjVjOTQy/YzA4Ny5qcGc.jpg"/>
      <itunes:duration>766</itunes:duration>
      <itunes:summary>We take a deep dive into TunnelCrack Cybersecurity Risk, an advanced attack that exploits VPN vulnerabilities. Discover the strategies attackers use, from evil twin attacks at your favorite café to sophisticated DNS manipulations. 
More importantly, learn how to protect yourself and your organization from such vulnerabilities. Tune in for an enlightening session filled with invaluable insights and preventive measures. 
Interested in the full technical info of the discussed threats? For more detailed information or to access the infographic, please visit https://threat-talks.com/tunnelcrack-vpn-deep-dive/</itunes:summary>
      <itunes:subtitle>We take a deep dive into TunnelCrack Cybersecurity Risk, an advanced attack that exploits VPN vulnerabilities. Discover the strategies attackers use, from evil twin attacks at your favorite café to sophisticated DNS manipulations. 
More importantly, learn</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Deep Dive - Citrix Netscaler</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>Deep Dive - Citrix Netscaler</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2428ec0c-28f1-489b-aba5-ad0da5c08235</guid>
      <link>https://share.transistor.fm/s/448cbb19</link>
      <description>
        <![CDATA[<p>Delve deeper into cybersecurity's critical aspects with our thorough examination of the Citrix Netscaler Zero Day vulnerability. </p>
<p>This analysis covers the vulnerability's technical nuances, highlighting its capacity for remote code execution and the severe risks it poses to network security. </p>
<p>Understand the sophisticated mechanisms attackers use to exploit this vulnerability, leading to unauthorized access and potential data breaches. </p>
<p>Interested in the full technical info of the discussed threat? For more detailed information or to access the infographic, please visit https://threat-talks.com/citrix-netscaler-deep-dive/ </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Delve deeper into cybersecurity's critical aspects with our thorough examination of the Citrix Netscaler Zero Day vulnerability. </p>
<p>This analysis covers the vulnerability's technical nuances, highlighting its capacity for remote code execution and the severe risks it poses to network security. </p>
<p>Understand the sophisticated mechanisms attackers use to exploit this vulnerability, leading to unauthorized access and potential data breaches. </p>
<p>Interested in the full technical info of the discussed threat? For more detailed information or to access the infographic, please visit https://threat-talks.com/citrix-netscaler-deep-dive/ </p>]]>
      </content:encoded>
      <pubDate>Tue, 13 Feb 2024 08:00:00 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/448cbb19/057a158d.mp3" length="17924132" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/bF9WWpGWaxnaiAYDDSefo7_TcCKfigYdXv9R0N6ef-E/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83ZmRi/NTNkZDhmNTQ1MDRm/N2ZmNThhNzQ4ODEy/NDRhMi5qcGc.jpg"/>
      <itunes:duration>1121</itunes:duration>
      <itunes:summary>Delve deeper into cybersecurity's critical aspects with our thorough examination of the Citrix Netscaler Zero Day vulnerability. 
This analysis covers the vulnerability's technical nuances, highlighting its capacity for remote code execution and the severe risks it poses to network security. 
Understand the sophisticated mechanisms attackers use to exploit this vulnerability, leading to unauthorized access and potential data breaches. 
Interested in the full technical info of the discussed threat? For more detailed information or to access the infographic, please visit https://threat-talks.com/citrix-netscaler-deep-dive/ </itunes:summary>
      <itunes:subtitle>Delve deeper into cybersecurity's critical aspects with our thorough examination of the Citrix Netscaler Zero Day vulnerability. 
This analysis covers the vulnerability's technical nuances, highlighting its capacity for remote code execution and the sever</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Does Remote Work? - Threat Talks</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>Does Remote Work? - Threat Talks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0faf089c-4ab9-485e-b68c-271e9191ba65</guid>
      <link>https://share.transistor.fm/s/11c12150</link>
      <description>
        <![CDATA[<p>Navigating the complexities of remote work and its security challenges? In this episode of Threat Talks, we delve deep into the pressing issues surrounding remote access and the vulnerabilities that come with it. </p>
<p>Deep Dive into Citrix Netscaler ADC, Tunnelcrack, and Fortinet/FortiGate. Vulnerabilities: Understand the risks and how they impact your business. </p>
<p>Do we really need to reboot our routers weekly? Is avoiding remote access a viable option in today's world? Discover these answers and more! </p>
<p>Interested in the full technical info of the discussed threats? For more detailed information or to access the infographic, please visit https://threat-talks.com/does-remote-work/ </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Navigating the complexities of remote work and its security challenges? In this episode of Threat Talks, we delve deep into the pressing issues surrounding remote access and the vulnerabilities that come with it. </p>
<p>Deep Dive into Citrix Netscaler ADC, Tunnelcrack, and Fortinet/FortiGate. Vulnerabilities: Understand the risks and how they impact your business. </p>
<p>Do we really need to reboot our routers weekly? Is avoiding remote access a viable option in today's world? Discover these answers and more! </p>
<p>Interested in the full technical info of the discussed threats? For more detailed information or to access the infographic, please visit https://threat-talks.com/does-remote-work/ </p>]]>
      </content:encoded>
      <pubDate>Tue, 06 Feb 2024 08:00:00 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/11c12150/61fa5078.mp3" length="63769273" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Kg4RK-5iDgdnl_MQScYR6hhVSOD_tjauegxgoAC4WgU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kYmFl/Y2EwOTMxMzEwOGU4/ZGJkNzI1YWNmZGM5/NDQzMi5qcGc.jpg"/>
      <itunes:duration>2657</itunes:duration>
      <itunes:summary>Navigating the complexities of remote work and its security challenges? In this episode of Threat Talks, we delve deep into the pressing issues surrounding remote access and the vulnerabilities that come with it. 
Deep Dive into Citrix Netscaler ADC, Tunnelcrack, and Fortinet/FortiGate. Vulnerabilities: Understand the risks and how they impact your business. 
Do we really need to reboot our routers weekly? Is avoiding remote access a viable option in today's world? Discover these answers and more! 
Interested in the full technical info of the discussed threats? For more detailed information or to access the infographic, please visit https://threat-talks.com/does-remote-work/ </itunes:summary>
      <itunes:subtitle>Navigating the complexities of remote work and its security challenges? In this episode of Threat Talks, we delve deep into the pressing issues surrounding remote access and the vulnerabilities that come with it. 
Deep Dive into Citrix Netscaler ADC, Tunn</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Deep Dive - The Mirai Botnet</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Deep Dive - The Mirai Botnet</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7e79f26e-c02a-4b92-bb2d-1df5bc925281</guid>
      <link>https://share.transistor.fm/s/1e522183</link>
      <description>
        <![CDATA[<p>This episode features Lieuwe Jan Koning and Luca Cipriano discussing the Mirai botnet, which has infected over 600,000 devices and disrupted major services worldwide. They explain its operations, impact, and the role of IoT devices, also covering malware types and propagation methods. </p>
<p>The episode offers practical cybersecurity tips like strong passwords and regular updates, providing crucial insights for both experts and enthusiasts in today’s evolving cyber threat landscape.</p>
<p>Interested in the full technical info of the discussed threat? For more detailed information or to access the infographic, please visit https://threat-talks.com/miria-botnet-deep-drive/</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode features Lieuwe Jan Koning and Luca Cipriano discussing the Mirai botnet, which has infected over 600,000 devices and disrupted major services worldwide. They explain its operations, impact, and the role of IoT devices, also covering malware types and propagation methods. </p>
<p>The episode offers practical cybersecurity tips like strong passwords and regular updates, providing crucial insights for both experts and enthusiasts in today’s evolving cyber threat landscape.</p>
<p>Interested in the full technical info of the discussed threat? For more detailed information or to access the infographic, please visit https://threat-talks.com/miria-botnet-deep-drive/</p>]]>
      </content:encoded>
      <pubDate>Tue, 30 Jan 2024 15:08:36 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/1e522183/7624f6d0.mp3" length="29263116" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/3GblqT5pVHTrUywJuwDZ5AwBrBNvyriW0Uc0qIGEX2c/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YmU4/NWM3Y2QzOTNkNzJk/ZWE1ZTM3MWZkODMx/ZGExMS5qcGc.jpg"/>
      <itunes:duration>1219</itunes:duration>
      <itunes:summary>This episode features Lieuwe Jan Koning and Luca Cipriano discussing the Mirai botnet, which has infected over 600,000 devices and disrupted major services worldwide. They explain its operations, impact, and the role of IoT devices, also covering malware types and propagation methods. 
The episode offers practical cybersecurity tips like strong passwords and regular updates, providing crucial insights for both experts and enthusiasts in today’s evolving cyber threat landscape.
Interested in the full technical info of the discussed threat? For more detailed information or to access the infographic, please visit https://threat-talks.com/miria-botnet-deep-drive/</itunes:summary>
      <itunes:subtitle>This episode features Lieuwe Jan Koning and Luca Cipriano discussing the Mirai botnet, which has infected over 600,000 devices and disrupted major services worldwide. They explain its operations, impact, and the role of IoT devices, also covering malware </itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Can't deny DDoS in 2024? - Threat Talks</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Can't deny DDoS in 2024? - Threat Talks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">339f7d2e-a366-473b-8b5a-23b2f44188f0</guid>
      <link>https://share.transistor.fm/s/4e5e76e7</link>
      <description>
        <![CDATA[<p>DDoS attacks are becoming increasingly more frequent, and there doesn’t appear to be any signs of slowing down.</p>
<p><br></p>
<p>If you’re looking for insights into the types of DDoS attacks that are being used, expert opinions on the best prevention and remediation and much more, tune in for this episode of Threat Talks. Lieuwe Jan Koning, Peter van Burgel and Luca Cipriano discuss the following hacks:</p>
<p> </p>
<ul>
 <li>Mirai botnet</li>
 <li>HTTP/2 rapid reset</li>
  <li>Reflection and Amplification DDoS attacks</li>
</ul>
<p><br></p>
<p>Interested in the full technical info of the discussed threats? For more detailed information or to access the infographic, please visit https://threat-talks.com/cant-deny-ddos-in-2024/ </p>
<p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>DDoS attacks are becoming increasingly more frequent, and there doesn’t appear to be any signs of slowing down.</p>
<p><br></p>
<p>If you’re looking for insights into the types of DDoS attacks that are being used, expert opinions on the best prevention and remediation and much more, tune in for this episode of Threat Talks. Lieuwe Jan Koning, Peter van Burgel and Luca Cipriano discuss the following hacks:</p>
<p> </p>
<ul>
 <li>Mirai botnet</li>
 <li>HTTP/2 rapid reset</li>
  <li>Reflection and Amplification DDoS attacks</li>
</ul>
<p><br></p>
<p>Interested in the full technical info of the discussed threats? For more detailed information or to access the infographic, please visit https://threat-talks.com/cant-deny-ddos-in-2024/ </p>
<p><br></p>]]>
      </content:encoded>
      <pubDate>Fri, 26 Jan 2024 12:12:59 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/4e5e76e7/9aad2a77.mp3" length="74350288" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ELTcf9tIMYp87gsi_e8E2nNbCwuAZu483a4BCn-sKe8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lYThm/YTY4YWE2NDA5YzQ3/NDYxNjc1YWQ2YTll/NDJmYS5qcGc.jpg"/>
      <itunes:duration>3098</itunes:duration>
      <itunes:summary>DDoS attacks are becoming increasingly more frequent, and there doesn’t appear to be any signs of slowing down.

If you’re looking for insights into the types of DDoS attacks that are being used, expert opinions on the best prevention and remediation and much more, tune in for this episode of Threat Talks. Lieuwe Jan Koning, Peter van Burgel and Luca Cipriano discuss the following hacks:
 

 Mirai botnet
 HTTP/2 rapid reset
  Reflection and Amplification DDoS attacks


Interested in the full technical info of the discussed threats? For more detailed information or to access the infographic, please visit https://threat-talks.com/cant-deny-ddos-in-2024/ </itunes:summary>
      <itunes:subtitle>DDoS attacks are becoming increasingly more frequent, and there doesn’t appear to be any signs of slowing down.

If you’re looking for insights into the types of DDoS attacks that are being used, expert opinions on the best prevention and remediation and </itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Threat Talks - Coming soon - Introduction</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Threat Talks - Coming soon - Introduction</itunes:title>
      <itunes:episodeType>trailer</itunes:episodeType>
      <guid isPermaLink="false">cb2f6221-e151-46be-9efc-f52a7febd273</guid>
      <link>https://share.transistor.fm/s/4c94d505</link>
      <description>
        <![CDATA[<p>Threat Talks was born from a collaboration between ON2IT, a global leader in Zero Trust cybersecurity, and AMS-IX, one of the world’s largest internet exchange providers. </p>
<p>Leveraging our combined expertise and extensive networks, we offer a unique platform where the brightest minds in cybersecurity converge to share their stories, insights, and predictions.</p>
<p><br></p>
<p>Presenting</p>
<p>- <strong>Lieuwe Jan Koning</strong> - Co-Founder and CTO, ON2IT</p>
<p>- <strong>Peter van Burgel</strong> - CEO, AMS-IX</p>
<p>- <strong>Luca Cipriano</strong> - Threat Intel Specialist, ON2IT</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Threat Talks was born from a collaboration between ON2IT, a global leader in Zero Trust cybersecurity, and AMS-IX, one of the world’s largest internet exchange providers. </p>
<p>Leveraging our combined expertise and extensive networks, we offer a unique platform where the brightest minds in cybersecurity converge to share their stories, insights, and predictions.</p>
<p><br></p>
<p>Presenting</p>
<p>- <strong>Lieuwe Jan Koning</strong> - Co-Founder and CTO, ON2IT</p>
<p>- <strong>Peter van Burgel</strong> - CEO, AMS-IX</p>
<p>- <strong>Luca Cipriano</strong> - Threat Intel Specialist, ON2IT</p>]]>
      </content:encoded>
      <pubDate>Sun, 14 Jan 2024 10:21:55 -0100</pubDate>
      <author>Threat Talks</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/media.transistor.fm/4c94d505/ade5ad03.mp3" length="16798164" type="audio/mpeg"/>
      <itunes:author>Threat Talks</itunes:author>
      <itunes:duration>420</itunes:duration>
      <itunes:summary>Threat Talks was born from a collaboration between ON2IT, a global leader in Zero Trust cybersecurity, and AMS-IX, one of the world’s largest internet exchange providers. 
Leveraging our combined expertise and extensive networks, we offer a unique platform where the brightest minds in cybersecurity converge to share their stories, insights, and predictions.

Presenting
- Lieuwe Jan Koning - Co-Founder and CTO, ON2IT
- Peter van Burgel - CEO, AMS-IX
- Luca Cipriano - Threat Intel Specialist, ON2IT</itunes:summary>
      <itunes:subtitle>Threat Talks was born from a collaboration between ON2IT, a global leader in Zero Trust cybersecurity, and AMS-IX, one of the world’s largest internet exchange providers. 
Leveraging our combined expertise and extensive networks, we offer a unique platfor</itunes:subtitle>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
  </channel>
</rss>
