17 episodes

Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats, explore industry trends, and hear from top experts as we break down the complexities of cyber threats.

Our mission is to make these complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users. We do so by providing in-depth and first-hand experiences from leading cybersecurity professionals.

Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and stay secure!

Threat Talks - Your Gateway to Cybersecurity Insights Threat Talks

    • News

Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats, explore industry trends, and hear from top experts as we break down the complexities of cyber threats.

Our mission is to make these complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users. We do so by providing in-depth and first-hand experiences from leading cybersecurity professionals.

Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and stay secure!

    Palo Alto CVE-2024-3400: a comprehensive analysis of the vulnerability

    Palo Alto CVE-2024-3400: a comprehensive analysis of the vulnerability

    Tune into this special episode of Threat Talks, as we dissect the critical CVE 2024 3400 vulnerability in Palo Alto Networks' GlobalProtect servers.

    Join our cybersecurity experts for a deep dive into the vulnerability's implications, our response strategies, and practical tips to bolster your defenses against similar threats.



    For those who crave even more detailed insights, be sure to check out our comprehensive information page on this topic: https://on2it.net/nl/cve-2024-3400-pan-os-os-command-injection-vulnerability-in-globalprotect/

    And read our blog posts for a deeper dive into the technical aspects and implications of CVE-2024-3400:

    ☞ https://on2it.net/palo-alto-networks-cve-2024-3400-alert/
    ☞ https://on2it.net/vpn-firewall-integration-a-strategic-analysis/



    Download the infographic here: https://threat-talks.com/unraveling-cve-2024-3400/

    • 40 min
    Deep Dive - Reflection Attack - The most simple dos attack

    Deep Dive - Reflection Attack - The most simple dos attack

    Understanding Reflection Attacks: A Simple Yet Powerful DOS Method.


    👕 Request your own Threat Talks T'shirt: https://threat-talks.com/cant-deny-ddos-in-2024/

    Distributed Denial of Service (DDoS) Attacks Explained

    Picture this: a DDOS attack, but turbocharged by the clever use of network request reflections. This discussion sheds light on how attackers harness the normal functions of protocols to unleash powerful assaults on unprepared targets. Interestingly, these attacks don't rely on exploiting software flaws; instead, they use the basic architecture of protocols like DNS and NTP to increase their destructive power.

    Here's a breakdown of what you need to know about reflection attacks, from their conception to how they're combatted:

    The Basics: What exactly is a reflection attack? We delve into the fundamental components of these attacks, detailing the roles of the attacker, the servers, and the victims caught in the digital crossfire.
    Why UDP?: Discover why UDP is the preferred protocol for reflection attacks. What makes it uniquely vulnerable, and how does it help the attacker?

    Defense Strategies: What strategies can organizations employ against the relentless flood of unwanted network responses? We explore practical steps for mitigation, helping you fortify your defenses against such insidious attacks.

    Join us as we dive into the strategic approach to a cyber attack, where knowing how to anticipate and counter the adversary's tactics is critical to protecting your digital assets. Let's explore together and strengthen our defenses!

    ✅ All our Threat Talks can be found on https://threat-talks.com

    👕 Request your own Threat Talks T'shirt: https://threat-talks.com/cant-deny-ddos-in-2024/

    🕵️ Threat Talks is a collaboration between on2IT and AMS-IX

    • 11 min
    Deep Dive - MOVEit: The danger of delegating data to third-party software

    Deep Dive - MOVEit: The danger of delegating data to third-party software

    Dive into the largest data breach of 2023, a devastating supply chain attack involving the MOVEit software, which impacted over 60 million individuals.

    Learn how the Klo Ransomware Group exploited a zero-day vulnerability through SQL injection to carry out their attack, and the challenges this presents for cybersecurity measures today.

    Interested in the full technical info of the discussed threats? For more detailed information or to access the infographic, please visit https://threat-talks.com/deep-dive-moveit/

    • 14 min
    Deep Dive - Log4j: The danger of software dependencies

    Deep Dive - Log4j: The danger of software dependencies

    Join us for a deep dive episode of Threat Talks, focusing on Log4j, the critical logging library at the heart of Java development.

    Discover Log4j's flexibility in message configuration and how it enhances Java programming. Perfect for those looking to deepen their Java and Log4j knowledge.

    Interested in the full technical info of the discussed threats? For more detailed information or to access the infographic, please visit https://threat-talks.com/deep-dive-log4j-the-danger-of-software-dependencies/.

    • 19 min
    Deep Dive - SolarWinds: The danger of third-party software

    Deep Dive - SolarWinds: The danger of third-party software

    The SolarWinds incident, affecting 18,000 high-profile environments, including the US government and Fortune 500 companies, was attributed to the state-sponsored group Fancy Bear.

    This breach demonstrated the complexity and reach of supply chain attacks, emphasizing the challenge of defending against state-backed adversaries.

    Interested in the full technical info of the discussed threats? For more detailed information or to access the infographic, please visit https://threat-talks.com/deep-dive-solarwinds-the-danger-of-third-party-software/.

    • 21 min
    Supply chain: business as usual? - Threat Talks

    Supply chain: business as usual? - Threat Talks

    In this episode of Threat Talks, we explore the covert perils of supply chain attacks. Matthijs Zwart, CIO and CISO at Vitens, acknowledges the risk landscape surrounding supply chain attacks, but also suggests that the occasional incident can offer unforeseen advantages.

    Featuring Matthijs as the special guest, this episode brings together host Lieuwe Jan Koning and Threat Intel Specialist Luca Cipriano for a comprehensive examination of supply chain attacks. They delve into the characteristics of these threats, defensive tactics, and how Vitens has successfully managed previous episodes involving SolarWinds, Log4j, and MOVEit.

    Interested in the full technical info of the discussed threats? For more detailed information or to access the infographic, please visit https://threat-talks.com/supply-chain-business-as-usual/.

    • 42 min

Top Podcasts In News

The Daily
The New York Times
Serial
Serial Productions & The New York Times
Up First
NPR
The Ben Shapiro Show
The Daily Wire
The Charlie Kirk Show
Charlie Kirk
The Tucker Carlson Podcast
Tucker Carlson Network

You Might Also Like