Threat Talks - Your Gateway to Cybersecurity Insights

Threat Talks

Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats. We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals. Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and stay secure!

  1. React2Shell Explained

    -11 Ч

    React2Shell Explained

    Log4j caught everyone off guard.  React2Shell might be doing the same right now. Across thousands of React apps, exposure is already baked in - accelerated by vibe coding and shipped without scrutiny. In some cases, one request is all it takes. React2Shell turns that exposure into remote code execution in React and Next.js environments -triggered by a single HTTP POST request. In this episode of Threat Talks, host Rob Maas and SOC analyst Yuri Wit break down how React2Shell works, why it’s more serious than it looks, and what makes it so easy to exploit. The risk is significant, and what makes it worse is how little attention it’s getting. As developers increasingly rely on AI-generated code, applications are being shipped faster - but not always with full visibility into how components behave. That creates blind spots attackers can take advantage of, especially when serialization and deserialization flaws are involved. We cover how React2Shell works, how attackers exploit serialization and deserialization flaws, and what actions you need to take now to reduce risk. If your organization runs React or Next.js applications, assume exposure until proven otherwise - especially if this hasn’t been on your radar yet. React2Shell isn’t making Log4j headlines. That doesn’t mean the risk is smaller. Timestamps 00:00 – React2Shell Introduction and Log4j Comparison 00:28 – What Is React and How Vibe Coding Introduces Security Risks 02:48 – How the React2Shell Vulnerability Enables Remote Code Execution 05:49 – How Attackers Exploit React2Shell with a Single POST Request 07:28 – Impact of React2Shell RCE on Server Privileges and Access 08:18 – How to Mitigate React2Shell and the Next.js Vulnerability 11:18 – Incident Response for React2Shell Exploitation 13:25 – Ongoing React2Shell Risk and Why Many Apps Remain Vulnerable   Key Topics Covered How the React2Shell and Next.js vulnerability expands the attack surface across modern web applicationsWhy vibe coding security risks are accelerating exposure without developers realizing itPractical mitigation: patching, EDR detection, WAF limitations, and reducing attack surfaceResources Threat Talks: https://threat-talks.com/ ON2IT (Zero Trust as a Service): https://on2it.net/ AMS-IX: https://www.ams-ix.net/amsThreat Talks episode on Log4j: https://www.youtube.com/watch?v=CiqNmJaak5I   Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.   🔔 Follow and Support our channel! 🔔  ===  ► YOUTUBE:    / @threattalks   ► SPOTIFY: https://open.spotify.com/show/1SXUyUE... ► APPLE: https://podcasts.apple.com/us/podcast...   👕 Receive your Threat Talks T-shirt https://threat-talks.com/   🗺️ Explore the Hack's Route in Detail 🗺️ https://threat-talks.com   🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX

    15 мин.
  2. Zero Trust in the AI Era

    17 МАР.

    Zero Trust in the AI Era

    AI can fake your voice.Deepfakes can move millions of dollars in minutes. And attackers no longer need to break trust - they can simulate it. Security teams are entering an era where nothing can be trusted at face value. In part two of our Zero Trust series with Dr. Zero Trust, Chase Cunningham, he and Lieuwe Jan Koning (Co-Founder and CTO at ON2IT Cybersecurity) explore what the future of Zero Trust looks like in an AI-driven world.  How do you verify identity when voices and faces can be faked?How do organizations defend against scams that scale to millions of targets?And what happens when AI starts attacking AI? They discuss real-world examples including deepfake fraud, “cyber-kidnapping” scams, prompt injection attacks, and the growing role of AI policy engines in defending modern systems. One key takeaway: AI is accelerating a global trust crisis. And this is what makes Zero Trust matters more than ever. Simple Zero Trust principles like verification, passphrases, strict payment procedures, and continuous validation become essential safeguards for every organization. Because in an environment where anything can be simulated, trust must always be verified. Missed part one? Watch “From Revolution to Reality”: https://www.youtube.com/watch?v=6reox4sqaUc&t Timestamps 00:00 - Introduction: AI Security Threats and the Future of Zero Trust01:07 - How Long Will Zero Trust Last? The Future of Zero Trust Strategy01:54 - The Future of Zero Trust in an AI-Driven World04:24 - Deepfakes, Fraud, and the Zero Trust Response to AI Security Threats16:10 - AI Security Threats: Prompt Injection, AI Agents, and the Next Arms Race21:55 - Final Thoughts on AI Security Threats and the Future of Zero Trust   Key Topics Covered How AI security threats like deepfakes are changing identity verificationWhy the future of Zero Trust depends on continuous verificationHow AI-driven attacks scale fraud and social engineeringWhy AI policy engines may become the next defensive layer in cybersecurityResources Threat Talks: https://threat-talks.comON2IT (Zero Trust as a Service): https://on2it.netAMS-IX: https://www.ams-ix.net/amsThreat Talks playlist on AI and Cyber Trends: https://www.youtube.com/playlist?list=PLF5mXtEG4t5w_lz1wznTlcCuxFcsLDHox  Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.   🔔 Follow and Support our channel! 🔔  ===  ► YOUTUBE:    / @threattalks   ► SPOTIFY: https://open.spotify.com/show/1SXUyUE... ► APPLE: https://podcasts.apple.com/us/podcast...   👕 Receive your Threat Talks T-shirt https://threat-talks.com/   🗺️ Explore the Hack's Route in Detail 🗺️ https://threat-talks.com   🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX

    23 мин.
  3. Zero Trust: From Revolution to Reality

    10 МАР.

    Zero Trust: From Revolution to Reality

    Zero Trust is easy to say. Hard to execute. Most organizations try to build it themselves. Most underestimate the complexity.Most get stuck in architecture diagrams instead of protecting what actually matters: data. If execution determines success – should you really be doing it alone? In this episode of Threat Talks, Lieuwe Jan Koning, Co-Founder and CTO at ON2IT Cybersecurity, sits down with Dr. Chase Cunningham, architect of the Zero Trust Extended (ZTX) framework, to break down what Zero Trust really requires in practice – not in theory. Zero Trust isn’t a product. It’s not a checkbox. It’s a decision about what you protect first – and how seriously you take execution. If your job is to protect critical data without drowning in complexity, this episode will recalibrate your approach. Because in the end, Zero Trust doesn’t fail on strategy.It fails on execution. Timestamps 00:00 – Introduction to Zero Trust Data Protection 00:50 – How Zero Trust Started at Forrester 03:19 – The ZTX Framework and Structuring Zero Trust 05:05 – Data at the Core of Zero Trust Data Protection 08:22 – Success Factors for Effective Zero Trust Data Protection 13:06 – Why Most Organizations Should Not DIY Zero Trust 15:36 – Breaches, Misconfiguration, and Market Reality 18:07 – How COVID Accelerated Zero Trust Adoption 19:25 – Closing Thoughts on Zero Trust Fundamentals   Key Topics Covered Where Zero Trust actually started – and how it evolved beyond network segmentationThe shift from perimeter thinking to data-first protectionWhy most internal Zero Trust programs stallThe operational discipline required to make Zero Trust workResources Threat Talks: https://threat-talks.com/ON2IT (Zero Trust as a Service): https://on2it.net/ AMS-IX: https://www.ams-ix.net/amsThreat Talks playlist on Zero Trust:   https://www.youtube.com/playlist?list=PLF5mXtEG4t5wigSRB3fpyFfMYp3l1Ux2gZero Trust Dictionary: https://on2it.net/resources/zero-trust-dictionary/ Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.

    20 мин.
  4. China is Already Inside your infrastructure

    3 МАР.

    China is Already Inside your infrastructure

    China is Already Inside your infrastructure.  And the EU is done ignoring it. In this exclusive first discussion of the upcoming EU Cybersecurity Act revision, Bart Groothuis, MEP, joins Lieuwe-Jan Koning, CTO and Co-Founder, to explain why vendor dependency is now a board-level security risk. Groothuis breaks down how the revised EU Cybersecurity Act will shift Europe from soft guidance to hard enforcement - introducing formal “high-risk vendor” treatment inside critical infrastructure. This isn’t about secret backdoors. It’s about who controls the next update.Who enters your data center.And who can one day - switch off the grid. The revision brings non-technical risk - state influence, intelligence laws, geopolitical leverage - directly into cyber certification decisions. That means supply chain risk is no longer theoretical. It’s regulatory. And the impact goes far beyond telecom.Energy. Cloud. Transport. Enterprise IT. If your infrastructure depends on a vendor tied to a high-risk state, this conversation matters. Timestamps 00:00 Opening & guest intro: MEP Bart Roos - rapporteur on EU legislation01:23 What the CSA revision targets - certification, telecoms, cloud09:11 Non-technical risk: intelligence laws, vendor-state ties, 5G implications15:10 What’s new in the Security Act Revision, 4G vs 5G - why virtualisation changes the security model 17:17 Energy, inverters, and real-world dependency risks - blackouts21:53 What organisations & buyers should do now (roadmaps, phasing out risk)25:53 Final call to action & closing Key Topics Covered • Why the EU Cybersecurity Act revision treats non-technical vendor risk as policy, not just code review. • The difference between technical vulnerabilities and vendor/state dependencies (intelligence laws, personnel access). • 5G’s virtualised architecture: “winner takes all” risks and the limits of code audits. • Practical next steps for CISOs: vendor inventory, risk-based roadmaps, procurement levers and phasing strategies. Related ON2IT content & explicitly referenced resources ON2IT website: https://on2it.net/ Threat Talks website: https://threat-talks.com/ European Commission - Cybersecurity Act overview: https://digital-strategy.ec.europa.eu/en/policies/cybersecurity-act Proposal for a Regulation for the EU Cybersecurity Act: https://digital-strategy.ec.europa.eu/en/library/proposal-regulation-eu-cybersecurity-act  Subscribe and turn on notifications to stay ahead of emerging cyber policy, supply chain risk, and critical infrastructure security across IT and OT.► YOUTUBE: /@threattalks► Spotify / Apple Podcasts:

    30 мин.
  5. OpenClaw and The Dark Side of Agentic AI

    24 ФЕВР.

    OpenClaw and The Dark Side of Agentic AI

    Your biggest threat this year isn’t malware. It’s your own AI assistant. OpenClaw connects an LLM directly to your terminal, browser, email, and chat. It runs with your permissions. It executes tasks without hesitation. Days after launch, researchers found a One-Click RCE. Cisco called it a security nightmare. Gartner called it an unacceptable risk. OpenClaw (formerly known as Clawdbot and Moltbot) represents a new phase of agentic AI: autonomous assistants operating inside your environment with almost no guardrails. The headlines around OpenClaw have been clear: it’s a serious threat. But how should we handle agentic AIs like OpenClaw moving forward? In this Threat Talks episode, Field CTO Rob Maas and SOC analyst Yuri Wit break down what OpenClaw actually does, where AI agent security breaks, and whether or not you should deploy OpenClaw. OpenClaw is powerful. It’s useful. It’s also proof that many of us are not ready for AI agents with this level of autonomy.  Before you let an AI agent into your systems, understand what happens when it runs unchecked. Timestamps Key Topics Covered ·         How OpenClaw works and why agentic AI changes the security model ·         The One-Click RCE and what it reveals about AI agent security ·         Malicious skills, default allow design, and autonomous privilege abuse ·         Realistic mitigation strategies including sandboxing and controlled environments Resources ·         Threat Talks: https://threat-talks.com/  ·         ON2IT (Zero Trust as a Service): https://on2it.net/  ·         AMS-IX: https://www.ams-ix.net/ams  Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques. Click here to view the episode transcript.   🔔 Follow and Support our channel! 🔔  ===   ► YOUTUBE:    / @threattalks   ► SPOTIFY: https://open.spotify.com/show/1SXUyUE... ► APPLE: https://podcasts.apple.com/us/podcast...   👕 Receive your Threat Talks T-shirt https://threat-talks.com/   🗺️ Explore the Hack's Route in Detail 🗺️ https://threat-talks.com   🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX

    20 мин.
  6. Inside the MongoBleed Memory Leak

    17 ФЕВР.

    Inside the MongoBleed Memory Leak

    Imagine your memory just became the attack surface.That’s MongoBleed. Or as others know it: CVE-2025-14847. No passwords to crack, no complex exploit chain.  Just normal protocol behavior, repeated at scale. Each request leaks a little more MongoDB memory until something valuable shows up, even in environments that already follow network segmentation best practices. Rob Maas (Field CTO, ON2IT) hosts Luca Cipriano (CTI & Red Team Program Lead) to dissect MongoBleed, an unauthenticated memory leak vulnerability in MongoDB, in this episode of Threat Talks. They break down how MongoBleed exploits MongoDB’s wire protocol before authentication and why repetition matters more than a single request.  MongoDB is everywhere: cloud platforms, scalable applications, and data-heavy environments where availability matters more than friction. If MongoDB is part of your environment, or you want to understand how this vulnerability is exploited in practice, the full breakdown is worth your time. Timestamps   Key Topics Covered ·         How malformed compressed messages manipulate MongoDB memory allocation ·         Why BSON string parsing can expose unintended data ·         How repeated burst requests turn small leaks into valuable information ·         Why MongoDB deployments are attractive targets in the cloud Resources ·         Threat Talks: https://threat-talks.com/  ·         ON2IT (Zero Trust as a Service): https://on2it.net/  ·         AMS-IX: https://www.ams-ix.net/ams ·         Threat Talks episode on Citrix Bleed: https://youtu.be/YwDpRPBfAzs  Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.   🔔 Follow and Support our channel! 🔔  ===   ► YOUTUBE:    / @threattalks   ► SPOTIFY: https://open.spotify.com/show/1SXUyUE... ► APPLE: https://podcasts.apple.com/us/podcast...   👕 Receive your Threat Talks T-shirt https://threat-talks.com/   🗺️ Explore the Hack's Route in Detail 🗺️ https://threat-talks.com   🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX

    14 мин.
  7. How to pass any cybersecurity certification

    10 ФЕВР.

    How to pass any cybersecurity certification

    Certifications play a central role in cybersecurity career development.Yet many experienced engineers find themselves failing exams they should easily pass. The problem isn’t a lack of knowledge or skills. It’s the disconnect between real-world security work, and certifications built around memorization, UI trivia, and version-specific details that will be obsolete in two months. In this episode of Threat Talks, Rob Maas (Field CTO, ON2IT) and Nicholai Piagentini(Technical Enablement Engineer, ON2IT) break down why this happens, how certification exams are designed, and how to pass any cybersecurity certification without memorization or falling for trick questions.  They explore how well-written exams validate real job tasks, while poorly designed ones drift into reading comprehension, UI trivia, and version-specific details that lose value the moment the product changes. From blueprint-driven preparation to smart elimination tactics and knowing when not to overthink an answer, this is a grounded look at how to pass any certification for meaningful cybersecurity qualifications. Timestamps Key Topics Covered ·         Why many certification exams fail at measuring real-world cybersecurity skills ·         How to pass cybersecurity certification exams by focusing on concepts, not memorization ·         What makes a good vs bad exam (and how vendors design them) ·         Practical tactics for exam day, preparation strategies, and dealing with nerves   Resources ·         Threat Talks: https://threat-talks.com/  ·         ON2IT (Zero Trust as a Service): https://on2it.net/  ·         AMS-IX: https://www.ams-ix.net/ams Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.   🔔 Follow and Support our channel! 🔔  ===  ► YOUTUBE:    / @threattalks   ► SPOTIFY: https://open.spotify.com/show/1SXUyUE... ► APPLE: https://podcasts.apple.com/us/podcast...   👕 Receive your Threat Talks T-shirt https://threat-talks.com/   🗺️ Explore the Hack's Route in Detail 🗺️ https://threat-talks.com

    22 мин.
  8. The Battle of Defending a Digital City

    3 ФЕВР.

    The Battle of Defending a Digital City

    When it comes to running an airport, there’s no room for error. Any casualty is one too much.   That’s the reality of all airports, including DFW Airport. It’s a 28-square-mile operation, bigger than the island of Manhattan, functioning as a city with its own police, fire services, OT environments, and always-on digital infrastructure.   In this Threat Talks episode, Lieuwe-Jan Koning (Co-Founder and CTO, ON2IT) sits down with Eric Bowerman (CISO of DFW Airport), to unpack how cybersecurity actually works when IT, OT, and physical safety collide.    From digital transformation security to real-world OT security and IT/OT convergence, this is a rare, grounded look at defending critical infrastructure where failure isn’t theoretical - it’s operational. Timestamps Key Topics Covered How a major airport functions as a digital city with IT, OT, and cyber-physical riskPractical OT security strategies when patching and downtime aren’t optionsWhy IT/OT convergence changes threat modeling, segmentation, and detectionResilience-first security: keeping passengers, planes, and operations moving Click here to view the episode transcript. Related ON2IT Content & Referenced Resources Threat Talks website: https://threat-talks.com/ ON2IT website: https://on2it.net/ If you’re responsible for critical infrastructure, OT environments, or large-scale digital transformation, this episode is essential viewing. 🔔 Subscribe and turn on notifications to stay ahead of emerging cyber threats across IT, OT, and critical infrastructure. ===► YOUTUBE: / @threattalks ► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E ► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520

    47 мин.

Об этом подкасте

Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats. We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals. Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and stay secure!

Вам может также понравиться