Threat Talks - Your Gateway to Cybersecurity Insights

Threat Talks
Threat Talks - Your Gateway to Cybersecurity Insights

Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats. We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals. Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and stay secure!

  1. Conti Ransomware Attack on Costarican Government - Threat Talks Cybersecurity Podcast

    قبل ٥ أيام

    Conti Ransomware Attack on Costarican Government - Threat Talks Cybersecurity Podcast

    🌎 Conti Attack on Costa Rica: When Ransomware Halts a Nation 🌎 What happens when a ransomware group attacks an entire country? In this Threat Talk, we dive deep into the Conti ransomware attack that crippled the Costa Rican government. From healthcare systems shutting down to unpaid government salaries and even tax collection grinding to a halt—this unprecedented cyberattack became a national emergency with global implications. Join Lieuwe Jan Koning as he unpacks the timeline, impact, and lessons learned from this catastrophic event. Discover the vulnerabilities that allowed this to happen, the strategies used by Conti, and how governments and organizations worldwide can prepare for such sophisticated cyber threats. 💡 What You’ll Learn in This Episode ✔️ The inner workings of the Conti ransomware group ✔️ How critical infrastructure became a target ✔️ The economic and societal ripple effects of a national cyberattack ✔️ Best practices for defending against ransomware threats 🔒 Who Should Watch? ↠ Cybersecurity experts ↠ IT professionals ↠ Government leaders ↠ Business executives ↠ Anyone passionate about protecting digital assets and critical systems 🚀 Don’t miss this in-depth analysis of one of the most talked-about ransomware attacks in recent history! Subscribe now to Threat Talks for more cutting-edge discussions on cybersecurity, threat intelligence, and digital defense strategies. 👉 Support the channel: give us a like! 🎧 Available on all major podcast platforms. ► YOUTUBE: https://youtube.com/@ThreatTalks ► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E ► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520

    ٢٢ من الدقائق
  2. MGM Resorts ALPHV/BlackCat Ransomware Attack - Threat Talks Cybersecurity Podcast

    ٩ جمادى الآخرة

    MGM Resorts ALPHV/BlackCat Ransomware Attack - Threat Talks Cybersecurity Podcast

    🎙 Threat Talks: Unpacking the MGM Resorts ALPHV/BlackCat Ransomware Attack 🕵️‍♂️ In this Threat Talk, we dive deep into a cybersecurity incident in 2023: the MGM Resorts ransomware attack by ALPHV/BlackCat and Scattered Spider. From sophisticated social engineering tactics to deploying a shadow identity provider for persistence, this attack demonstrates the capabilities of collaborating ransomware groups. Join cybersecurity experts Lieuwe Jan Koning, Luca Cipriano (Threat Intel Specialist), and Rob Maas (Field CTO) as they break down: 🔒 How attackers exploited MGM’s Okta environment. 🎯 The role of phishing and advanced persistence techniques. 🚨 Lessons learned and actionable steps to prevent such attacks.   Key Insights ➡ Why Zero Trust and network segmentation are critical. ➡ The dilemma of paying ransoms vs. operational downtime. ➡ Practical steps to improve your organization’s ransomware defense strategy. If you’re a cybersecurity professional or just curious about the latest in cyber threats, this episode is a must-watch. Stay informed, stay secure! 💻    👉 Support the channel: don’t forget to LIKE, COMMENT, and SUBSCRIBE :). 🎧 Available on all major podcast platforms. ► YOUTUBE: https://youtube.com/@ThreatTalks ► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E ► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520 👕 Receive your Threat Talks T-shirt 👕 https://threat-talks.com/prevent-pay-or-insure/ 🗺️ Explore the Hack's Route in Detail 🗺️ https://on2it.s3.us-east-1.amazonaws.com/Threat-Talks-Prevent-Pay-or-Insure.pdf 🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX

    ٢٩ من الدقائق
  3. Prevent, Pay or Insure - Threat Talks Cybersecurity Podcast

    ٢ جمادى الآخرة

    Prevent, Pay or Insure - Threat Talks Cybersecurity Podcast

    💰Prevent, Pay or Insure? 💰 Days before MGM’s computer systems were taken down in a cyberattack, fellow casino operator Caesars paid a $15 million ransom to attackers who infiltrated its systems. MGM chose not to pay and dealt with different costs because of it - did the two casino giants wind up paying similar amounts down the line? And what role does cybersecurity insurance play in these scenarios? In this episode of Threat Talks, host Lieuwe Jan Koning and special guest David Hake (co-founder of Resilience, professor of Cyber Risk Management at UC Berkeley and advisor at Venable LLP) discuss these cyberattacks on MGM and Caesars, exploring how organizations can better prepare for and respond to ransomware incidents. Dialing in to the conversation, Threat Intel Specialist Luca Cipriano offers a preview of our Deep Dives into three critical threats relevant to these attacks, providing valuable technical insights. The by now age-old dilemma remains: should companies pay ransom or refuse? But beyond that, how can they focus on prevention? And where does cybersecurity insurance fit into the equation? If businesses insure their personnel, facilities, and revenue, isn’t it time to also insure their cybersecurity? 🔔 Follow and Support our channel! 🔔 === ► YOUTUBE: https://youtube.com/@ThreatTalks ► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E ► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520 👕 Receive your Threat Talks T-shirt 👕 https://threat-talks.com/prevent-pay-or-insure/ 🗺️ Explore the Hack's Route in Detail 🗺️https://on2it.s3.us-east-1.amazonaws.com/Threat-Talks-Prevent-Pay-or-Insure.pdf 🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX

    ٥٨ من الدقائق
  4. UNIX CUPS Remote Code Execution - The Fallacy of Default Trust - Threat Talks Cybersecurity Podcast

    ٢٤ جمادى الأولى

    UNIX CUPS Remote Code Execution - The Fallacy of Default Trust - Threat Talks Cybersecurity Podcast

    "Hello! I'm a Printer! Please Let Me In!" “Hello! I’m a printer! Please let me enter, thank you!” – It may sound absurd, but this is how attackers can trick your Linux systems through the cups-browsed service..   In this latest Threat Talk, Lieuwe-Jan Koning reveals, with ON2IT’s Rob Maas and Luca Cipriano how a seemingly harmless printer can turn into a hacker’s gateway to your network.   With open ports and weak default configurations, your Linux environment could be more exposed than you think.   🔒 Tune in to learn how these vulnerabilities can be exploited and, more importantly, what steps you can take to secure your systems. Don’t wait until it’s too late!   📊 Bonus Resource: We’ve created an in-depth infographic breaking down these hacks in detailed illustrations—an invaluable tool for all security information professionals! https://on2it.s3.us-east-1.amazonaws.com/Infographic-security-fallacies.pdf 🔔 Hit that subscribe button and show your support! 🔔 === ► YOUTUBE: https://youtube.com/@ThreatTalks ► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E ► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520 👕 Receive your Threat Talks T-shirt https://threat-talks.com/breaking-the-illusion-exposing-security-fallacies/ 🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX #CUPS #cybersecurityexperts #printers #threattalks eatTalks #techsafety #securitymatters #threatintelligence #cybersecurityexperts #unix

    ٢١ من الدقائق
  5. XZ Utils Critical Backdoor (CVE- 2024-3094) - The Fallacy of Secure Open Source Code

    ١٧ جمادى الأولى

    XZ Utils Critical Backdoor (CVE- 2024-3094) - The Fallacy of Secure Open Source Code

    ⏰ How much time would you spend on executing the perfect hack? ⏰   The user going by the name of ‘JIAT75’ spent almost three years infiltrating and contributing to a GitHub repo for one singular reason – access to release manager rights for the next XZ Utils update. In this episode of Threat Talks, host Lieuwe Jan Koning is joined by Thomas Manolis, Information Security Officer at AMS-IX, and Jeroen Scheerder, Security Specialist at ON2IT, to discuss this meticulously executed breach in the open-source community.   Using clever social engineering tactics, Jia Tan (JIAT75) built a credible reputation within said community, gaining trust and access to introduce malicious code undetected. The breach was only discovered by chance when Andres Freund, an engineer at Microsoft, traced unusual system latency back to XZ Utils and uncovered the backdoor.   What exactly happened? How lucky did we get with Freund discovering the backdoor? And how do we know that something like this hasn’t happened before? 🔔 Follow to Support our channel! 🔔 ► YOUTUBE: https://youtube.com/@ThreatTalks ► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E ► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520 🗾 Explore the XZ Utils Critical Backdoor Details 🗾 https://on2it.s3.us-east-1.amazonaws.com/Infographic-security-fallacies.pdf Our exclusive infographic maps out the step-by-step tactics hackers use to exploit these vulnerabilities. Perfect for IT teams and Information Security Officers, it’s designed to help you stay one step ahead.   👕 Get your own Threat Talks T-shirt https://threat-talks.com/breaking-the-illusion-exposing-security-fallacies/   🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX === #ThreatTalks #ON2IT #Cybersecurity #Fallacies #CrowdStrike #SecurityMatters

    ٣٠ من الدقائق
  6. CrowdStrike Auto-Update Disaster - Threat Talks Cybersecurity Podcast

    ١٠ جمادى الأولى

    CrowdStrike Auto-Update Disaster - Threat Talks Cybersecurity Podcast

    ☠️ CrowdStrike: 8.5 million blue screens of death ☠️ Did you know that last July’s CrowdStrike outage led to closed airports, inaccessible bank accounts and hospitals that were only delivering emergency care that did not require any computers?   In this Threat Talk, Lieuwe Jan Koning is joined by Rob Maas and Jeroen Scheerder as they discuss the CrowdStrike outage and, more importantly, what could have been done to prevent such an impactful event from happening in the first place.   What exactly are the inherent risks of automatic updates? And can they be set up in such a way that what happened with CrowdStrike won’t happen again? 🔔 Follow and Support our channel! 🔔 === ► YOUTUBE: https://youtube.com/@ThreatTalks ► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E ► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520 👕 Get your own Threat Talks T-shirt https://threat-talks.com/breaking-the-illusion-exposing-security-fallacies/ 🗾 Explore the CrowdStrike Outage's Details 🗾 Our exclusive infographic maps out the step-by-step tactics hackers use to exploit these vulnerabilities. Perfect for IT teams and Information Security Officers, it’s designed to help you stay one step ahead. https://on2it.s3.us-east-1.amazonaws.com/Infographic-security-fallacies.pdf 🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX

    ٢٣ من الدقائق
  7. Breaking the Illusion: Exposing Security Fallacies - Threat Talks Cybersecurity Podcast

    ٣ جمادى الأولى

    Breaking the Illusion: Exposing Security Fallacies - Threat Talks Cybersecurity Podcast

    🔍 Breaking the Illusion: Confronting Cybersecurity’s Biggest Fallacies 🔍 Think you know the route a hacker might take? Think again! In this eye-opening Threat Talk, Lieuwe Jan Koning dives into the critical fallacies of cybersecurity with top experts Fleur van Leusden, CISO and host of CISO Praat, and Jeroen Scheerder. ✨ Fleur unpacks one of the industry’s biggest blind spots: the heavy reliance on user awareness as a defense mechanism. While user education has its place, she argues it’s not enough to withstand today’s sophisticated threats. Instead, Fleur and Jeroen explore the essential need for technical controls and resilient systems that go beyond awareness alone. 🔥 Rethink conventional strategies, dissect the recent CrowdStrike auto-update disaster, the XZ Utils backdoor (CVE-2024-3094), and a UNIX CUPS vulnerability 🖨️—revealing why proactive, layered defenses are the only way forward. Don’t miss this essential discussion on the true foundations of cybersecurity! 🛠️🔒 === 🗺️ Explore the Hack's Route in Detail 🗺️ Our exclusive infographic maps out the step-by-step tactics hackers. Perfect for IT teams and Information Security Officers. https://on2it.s3.us-east-1.amazonaws.com/Infographic-security-fallacies.pdf 👕 Receive your Threat Talks T-shirt https://threat-talks.com/breaking-the-illusion-exposing-security-fallacies/ #ThreatTalks #ON2IT #Cybersecurity #Fallacies #CrowdStrike #UNIXCUPS #XZUtils #SecurityMatters

    ٥٤ من الدقائق

حول

Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats. We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals. Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and stay secure!

قد يعجبك أيضًا

للاستماع إلى حلقات ذات محتوى فاضح، قم بتسجيل الدخول.

اطلع على آخر مستجدات هذا البرنامج

قم بتسجيل الدخول أو التسجيل لمتابعة البرامج وحفظ الحلقات والحصول على آخر التحديثات.

تحديد بلد أو منطقة

أفريقيا والشرق الأوسط، والهند

آسيا والمحيط الهادئ

أوروبا

أمريكا اللاتينية والكاريبي

الولايات المتحدة وكندا