Threat Talks - Your Gateway to Cybersecurity Insights

Follow Threat Talks - Your Gateway to Cybersecurity Insights
Share on
Copy link to clipboard

Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats, explore industry trends, and hear from top experts as we break down the complexities of cyber threats. Our mission is to make these complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users. We do so by providing in-depth and first-hand experiences from leading cybersecurity professionals. Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and stay secure!

Threat Talks


    • May 6, 2025 LATEST EPISODE
    • weekly NEW EPISODES
    • 29m AVG DURATION
    • 69 EPISODES


    Search for episodes from Threat Talks - Your Gateway to Cybersecurity Insights with a specific topic:

    Latest episodes from Threat Talks - Your Gateway to Cybersecurity Insights

    OT's Hidden Cyber Risks

    Play Episode Listen Later May 6, 2025 31:39


    From ships and cities to hospitals and airports, Operational Technology (OT) keeps the world running. The problem? It was never designed with cybersecurity in mind. In this episode of Threat Talks, host Karin Muller is joined by TC Hoot (VP of Contracts at TAC) and Luca Cipriano (Threat Intel Specialist at ON2IT) to explore how airports, hospitals, ports, and even water systems can be compromised.  Key topics they tackle:

    Zero Trust Starts Here

    Play Episode Listen Later Apr 29, 2025 22:06


    Zero Trust is about more than just IP addresses and firewalls: it's about understanding what truly matters to your business. In step one of Zero Trust: define your protect surface, we focus on how to prioritize what you want to protect, how to avoid common pitfalls, and how to kick off your Zero Trust journey from a solid, business-aligned foundation.In this episode of Threat Talks, host Lieuwe Jan Koning and Field CTO Rob Maas get down to the basics of step one of Zero Trust: defining the protect surface. They explore:✅ Methods for defining protect surfaces ⛨ Establishing the relevance of each protect surface

    Zero Trust Demystified: What is Zero Trust Really About?

    Play Episode Listen Later Apr 22, 2025 20:28


    Zero Trust is everywhere – but what does this actually mean? Is it a cybersecurity strategy, a set of tactics, a product you can buy, or just clever marketing? In this kickoff episode of this Zero Trust series, Lieuwe Jan Koning and Rob Maas explore what Zero Trust actually is, how to think about it strategically, and why it's not just about identity or buying new tools.They discuss: ✅ Why Zero Trust isn't a product, and what it actually is

    Inside Volt Typhoon: China's Silent Cyber Threat

    Play Episode Listen Later Apr 15, 2025 34:01


    What happens when a cyber threat actor doesn't want to make headlines? Volt Typhoon, a state-sponsored group tied to the People's Republic of China, has been quietly infiltrating Western critical infrastructure, staying under the radar by avoiding malware, using native tools, and taking things slow.  In this episode of Threat Talks, Lieuwe Jan Koning is joined by Rob Maas and Luca Cipriano to break down how these attackers operate and what their endgame might be. 

    Cybercrime-as-a-Service: The Disney+ of the Dark Web

    Play Episode Listen Later Apr 8, 2025 31:13


    Dark Markets are making cybercrime more accessible than ever. Malware, remote access tools, phishing kits, credit cards information: all of it is readily available, and oftentimes available as a service, if you just know where to look. Subscribing to these illicit services is now as easy as signing up for Disney+.  In this Deep Dive, host Rob Maas and special guest, cybersecurity researcher Michele Campobasso, discuss dark markets, and the rise of cybercrime-as-a-service. Key questions answered in this Deep Dive:

    Inside the Dark Web Economy: $10 for Your Identity & Corporate Access?

    Play Episode Listen Later Apr 1, 2025 37:56


    The Dark Web Economy: Hacks for $10?Would you pay $10 for access to a corporate system? Because someone on the dark web already has. In this episode of Threat Talks, host Lieuwe Jan Koning talks to cybersecurity researcher Michele Campobasso about the business of cybercrime. From ransomware services to stolen credentials, the dark web is thriving. 

    Why Precision Time Matters in Cybersecurity | PTP vs NTP Explained

    Play Episode Listen Later Mar 25, 2025 22:30


    ⏳ What happens when time goeswrong? Time synchronizationis an overlooked but essential part of cybersecurity. A few microseconds ofdrift can lead to failed transactions, inaccurate forensic logs, or evensecurity breaches. In this episode of ThreatTalks, host Rob Maas (Field CTO, ON2IT) and guest Jan van Boesschoten(Innovation Manager, AMS-IX) discuss: ·      How does time impact cybersecurity, and whathappens when it drifts?·      Why is NTP no longer sufficient for high-speeddigital transactions?·      How does Precision Time Protocol (PTP) providemicrosecond accuracy (and why does that matter)?·      Could time manipulation be an attack vector,and how do organizations mitigate this risk? From financialtransactions to forensic log analysis, knowing exactly when an eventoccurs can make or break an organization's security posture.

    Why SSL Decryption Matters

    Play Episode Listen Later Mar 18, 2025 48:12


    Many organizations hesitate to implement SSL decryption due to concerns over complexity, privacy, and performance. However, the reality is that failing to decrypt means failing to see threats.In this Deep Dive, host Lieuwe Jan Koning and Rob Maas (Field CTO at ON2IT) explore why decrypting SSL traffic is critical for cybersecurity. Why is SSL decryption necessary, and what are the risks of ignoring encrypted traffic?How do modern malware and attacks leverage encryption to bypass traditional security measures?What are the top three things organizations must do to implement SSL decryption effectively?Why do only 3.5% of organizations have an active SSL decryption policy, and how can this change?Rob Maas explains how decrypting SSL traffic allows security teams to detect and stop threats at an early stage, preventing malware downloads, phishing attempts, and web-based attacks before they reach endpoints.

    Intrusion Kill Chain: Stop Playing Defense with Rick Howard

    Play Episode Listen Later Mar 11, 2025 28:22


    Cybersecurity shouldn't always be about playing defense – it can also be about disrupting attackers before they succeed. In this Deep Dive, host Lieuwe Jan Koning and cybersecurity expert Rick Howard break down the Intrusion Kill Chain and the strategic shift it introduced in the world of cybersecurity.  How does the Intrusion Kill Chain flip the script on cyberattacks?The 250 active adversary campaigns that security teams must trackHow MITRE ATT&CK and the Diamond Model strengthen modern defense strategiesWhy global governments and intelligence agencies aren't doing more to share cyber threat intelligence Despite decades of talk about intelligence sharing, most information is still exchanged manually, often via spreadsheets. As Howard points out, a true global threat-sharing framework could give defenders the upper hand. Don't miss this deep dive into adversary strategies and what they mean for the future of cybersecurity.

    Reboot of Strategy: Back to cybersecurity basics with Rick Howard

    Play Episode Listen Later Mar 4, 2025 49:57


    I think, therefore I am, is René Descartes'first principle. But how does that relate to cybersecurity?  In this episode of Threat Talks, hostLieuwe Jan Koning is joined by Rick Howard – former Commander of the US Army'sComputer Emergency Response Team and former CSO of Palo Alto Networks – todiscuss the first principle of cybersecurity.  ❓What's the difference between cybersecurity strategy and tactics?❓How come some random geezers are better at cybersecurity forecastingthan industry pros?❓Is resilience the ultimate cybersecurity strategy?❓Why does Rick Howard think Zero Trust is a passive strategy?   And for the book lovers amongst us – over500 cybersecurity books are published each year. Wanna know which are worthyour time?  Rick Howard's Cybersecurity Canon has gotyou covered: https://icdt.osu.edu/about-cybersecurity-canon

    The Rising Threat of Deepfakes - Threat Talks Cybersecurity Podcast

    Play Episode Listen Later Feb 25, 2025 20:19


    Post-Quantum Threat to Encryption: Are You Ready? - Threat Talks Cybersecurity Podcast

    Play Episode Listen Later Feb 18, 2025 21:22


    Quantum computing promises unprecedented computational power, but it also threatens the encryption standards we trust today.In this episode of Threat Talks, Jeroen Scheerder from ON2IT delves into post-quantum cryptography and answers key questions:What is Quantum Computing?Why does it challenge RSA and other encryption standards?What is Q-Day, and when will it happen?How can companies prepare for the post-quantum era?

    Breaking the Defenses: EDR Bypass - Threat Talks Cybersecurity Podcast

    Play Episode Listen Later Feb 11, 2025 25:16


    Inside the Hackers Mind with Tom van de Wiele - Threat Talks Cybersecurity Podcast

    Play Episode Listen Later Feb 4, 2025 58:50


    Ever wondered what it's like to see cybersecurity through a hacker's eyes? In this episode of Threat Talks, Lieuwe Jan Koning talks with Tom van der Wiele, ethical hacker and founder of Hacker Minded, about how cybercriminals operate and how businesses can defend themselves.

    Salt Typhoon: How Nine Telecom Providers were Compromised - Threat Talks Cybersecurity Podcast - Threat Talks Cybersecurity Podcast

    Play Episode Listen Later Jan 28, 2025 29:52


    Salt Typhoon: Inside the Coordinated Breach of Nine Telecom Providers A sweeping cyberattack, known as Salt Typhoon, has exposed the vulnerabilities of nine major telcos, leaving sensitive communications and surveillance data in the hands of attackers. How did this happen, and what lessons can we learn? In this Threat Talks Deep Dive, host Lieuwe Jan Koning teams up with ON2IT's Rob Maas (Field CTO) and Jeroen Scheerder (Security Researcher) to dissect every aspect of this high-profile breach.

    ONCD: The Cyber Catalyst with Davis Hake - Threat Talks Cybersecurity Podcast

    Play Episode Listen Later Jan 21, 2025 45:22


    ONCD: The Cyber Catalyst with Davis Hake How can governments lead the charge in global cybersecurity efforts? In this compelling episode of Threat Talks, host Lieuwe Jan Koning sits down with returning guest Davis Hake, cybersecurity expert and advisor, to explore the critical role governments play in the cyber landscape.

    The State of Cybersecurity in the European Union - One Year of Threat Talks

    Play Episode Listen Later Jan 13, 2025 38:20


    The State of Cybersecurity in the European Union Cyber threats know no borders, and in the European Union, harmonizing cybersecurity efforts across 27 member states is no small feat. In this episode of Threat Talks, host Lieuwe Jan Koning speaks with Hans de Vries, Chief Cybersecurity and Operational Officer at ENISA, about the critical work being done to secure Europe's digital future.

    Cyber Outlook 2025 - One Year of Threat Talks

    Play Episode Listen Later Jan 7, 2025 41:42


    2025: The Year of AI and Cybersecurity Evolution Kick off 2025 with the latest insights from Threat Talks! In this episode, host Lieuwe Jan Koning sits down with Peter van Burgel, CEO of AMS-IX, to discuss how AI and cybersecurity are reshaping the landscape this year.

    2024: The Breaking Point - One Year of Threat Talks

    Play Episode Listen Later Dec 31, 2024 47:02


    Dutch Law Enforcement Data Breach - Threat Talks Cybersecurity Podcast

    Play Episode Listen Later Dec 24, 2024 19:54


    Imagine the names, job functions, email addresses and phone numbers of police officers, DAs, and even critical key witnesses being hacked and leaked to the public. This isn't the opening to some spy novel – it's what actually happened when the Dutch Law Enforcement suffered a serious data breach in September of this year. Initially reported as a breach ‘only' involving personal data of 65.000 law enforcement employees, it later became clear that much more data was leaked - and not just data from law enforcement personnel. In this Deep Dive, host Lieuwe Jan Koning, Security Expert Jeroen Scheerder and Field CTO Rob Maas take an in-depth look at how this breach unfolded, the poor security track record of the software that was used and what the Dutch Law Enforcement could've done better when it comes to handling the publicity of a data breach.

    Conti Ransomware Attack on Costarican Government - Threat Talks Cybersecurity Podcast

    Play Episode Listen Later Dec 17, 2024 21:54


    UNIX CUPS Remote Code Execution - The Fallacy of Default Trust - Threat Talks Cybersecurity Podcast

    Play Episode Listen Later Nov 26, 2024 20:31


    "Hello! I'm a Printer! Please Let Me In!" “Hello! I'm a printer! Please let me enter, thank you!” – It may sound absurd, but this is how attackers can trick your Linux systems through the cups-browsed service..   In this latest Threat Talk, Lieuwe-Jan Koning reveals, with ON2IT's Rob Maas and Luca Cipriano how a seemingly harmless printer can turn into a hacker's gateway to your network.   With open ports and weak default configurations, your Linux environment could be more exposed than you think.  

    XZ Utils Critical Backdoor (CVE- 2024-3094) - The Fallacy of Secure Open Source Code

    Play Episode Listen Later Nov 19, 2024 29:35


    ⏰ How much time would you spend on executing the perfect hack? ⏰   The user going by the name of ‘JIAT75' spent almost three years infiltrating and contributing to a GitHub repo for one singular reason – access to release manager rights for the next XZ Utils update. In this episode of Threat Talks, host Lieuwe Jan Koning is joined by Thomas Manolis, Information Security Officer at AMS-IX, and Jeroen Scheerder, Security Specialist at ON2IT, to discuss this meticulously executed breach in the open-source community.   Using clever social engineering tactics, Jia Tan (JIAT75) built a credible reputation within said community, gaining trust and access to introduce malicious code undetected. The breach was only discovered by chance when Andres Freund, an engineer at Microsoft, traced unusual system latency back to XZ Utils and uncovered the backdoor.   What exactly happened? How lucky did we get with Freund discovering the backdoor? And how do we know that something like this hasn't happened before?

    CrowdStrike Auto-Update Disaster - Threat Talks Cybersecurity Podcast

    Play Episode Listen Later Nov 12, 2024 22:32


    ☠️ CrowdStrike: 8.5 million blue screens of death ☠️ Did you know that last July's CrowdStrike outage led to closed airports, inaccessible bank accounts and hospitals that were only delivering emergency care that did not require any computers?   In this Threat Talk, Lieuwe Jan Koning is joined by Rob Maas and Jeroen Scheerder as they discuss the CrowdStrike outage and, more importantly, what could have been done to prevent such an impactful event from happening in the first place.   What exactly are the inherent risks of automatic updates? And can they be set up in such a way that what happened with CrowdStrike won't happen again?

    Breaking the Illusion: Exposing Security Fallacies - Threat Talks Cybersecurity Podcast

    Play Episode Listen Later Nov 5, 2024 53:31


    Deep Dive - Binance BNB Smartchain Attack - Threat Talks Cybersecurity Podcast

    Play Episode Listen Later Oct 29, 2024 26:01


    Imagine creating millions in cryptocurrency…without spending a cent.

    Deep Dive - Hack the Boat Ballast System - Threat Talks Cybersecurity Podcast

    Play Episode Listen Later Oct 22, 2024 25:05


    Deep Dive - Securing AIS - Threat Talks Cybersecurity Podcast

    Play Episode Listen Later Oct 15, 2024 19:54


    AIS (Advanced Identification System) is a key tool in maritime navigation. It helps ships transmit their location and data to other vessels and satellites, preventing collisions and supporting rescue operations.

    Deep Dive - HTTP/2 Rapid Reset

    Play Episode Listen Later Oct 1, 2024 9:04


    Deep Dive - Capital One Data Breach

    Play Episode Listen Later Sep 24, 2024 15:21


    Deep Dive - Accellion File Transfer Appliance

    Play Episode Listen Later Sep 10, 2024 19:48


    Bridging the Gap: Security and Compliance - Threat Talks

    Play Episode Listen Later Sep 3, 2024 55:12


    Compliance doesn't always mean security. In this episode of Threat Talks, we dive deep into the critical operational gap between being compliant and being secure. Host Lieuwe Jan Koning, along with ON2IT's CISO Tim Timmermans and Pieter de Lange, CISO at Transdev, discuss how organizations can bridge this gap to not just tick boxes but to truly protect themselves from cyber threats. Learn the essential strategies that go beyond compliance and ensure robust security measures. Don't miss this insightful discussion that could redefine your approach to cybersecurity! #compliancemanagement #cybersecurityexperts #threattalks ===

    Deep Dive - APT Sand Eagle

    Play Episode Listen Later Aug 27, 2024 22:27


    Deep Dive - Russia GRU Viasat Hack

    Play Episode Listen Later Aug 20, 2024 20:58


    Ethan Hunt is known for doing the impossible.

    Deep Dive - China Nexus Barracuda Hack

    Play Episode Listen Later Aug 13, 2024 21:59


    How do James Bond's spy skills compare to modern cyber espionage? The Nexus Barracuda Hack was performed by highly skilled, Chinese cyber attackers, who exploited a zero-day vulnerability in Barracuda's Email Security Gateway (ESG).

    The evolution of cyber warfare - Threat Talks

    Play Episode Listen Later Aug 6, 2024 43:13


    Explore the hidden world of cyber warfare and advanced persistent threats (APTs) in this episode of Threat Talks. Join cybersecurity experts Lieuwe Jan Koning, Luca Cipriano and special guest Martijn Peijer as they discuss real-life cyber espionage cases and the latest cybersecurity strategies. Show notes Summary of I-S00N leaks | Github Anxun and Chinese APT Activity | VX-underground Github summary | VX-underground Find all episodes and request your own Threat Talks T-shirt on https://threat-talks.com.

    Threat Talks Special: DDoS Attacks on European Elections

    Play Episode Listen Later Jul 30, 2024 33:04


    Explore the rising threat of DDoS attacks on European elections in this special episode of Threat Talks. Join Lieuwe Jan Koning and cybersecurity experts Octavia de Weerdt and Frank Dupker as they discuss the motivations behind these attacks, the role of the Anti-DDoS Coalition, and strategies to safeguard our digital democracy. Find all our episodes and request your own Threat Talks T-shirt on https://threat-talks.com/.

    Threat Talks on Tour - DDoS Mitigations

    Play Episode Listen Later Jul 23, 2024 24:10


    Join Lieuwe Jan Koning on this special Threat Talks as he explores the evolving landscape of DDoS attacks with Junior Corazza and Miguel Regalado Querol. Discover if these cyber threats are truly diminishing or if we're just getting better at defending against them. Tune in to understand the current state of DDoS mitigations and the importance of cybersecurity collaboration. Find all our episodes and request your own Threat Talks T-shirt on https://threat-talks.com/

    Deep Dive - Vultur, Android Malware

    Play Episode Listen Later Jul 16, 2024 24:44


    Have you ever wondered how a simple game app could lead to your bank account being emptied? In this deep dive of Threat Talks, Lieuwe Jan Koning dives into the sinister world of Vultur Android malware. Joined by experts Rob Maas and Luca Cipriano, they unravel the mechanics of this malicious threat and discuss practical steps to safeguard your devices. Tune in to learn how to protect yourself from these covert cyber threats and stay one step ahead of hackers.

    Deep Dive - Bangladesh Bank SWIFT attack

    Play Episode Listen Later Jul 9, 2024 25:11


    Let's uncover how cybercriminals almost stole a billion dollars through sophisticated spear phishing and malware tactics. Dive into the Bangladesh Bank SWIFT attack with Lieuwe Jan Koning, Rob Maas and Luca Cipriano. Learn about the vulnerabilities they exploited, the steps of the attack, and the cybersecurity measures that could have thwarted it. Enhance your understanding with our downloadable infographic, available alongside the podcast. Tune in now to stay ahead of cyber threats and protect your digital assets! Want to know more about breaking the bank? Then our main episode will be very interesting for you. Listen to it here, pay close attention, and win a T-shirt by providing the code for the treasure hunt!

    Breaking the bank - Threat Talks

    Play Episode Listen Later Jul 2, 2024 50:40


    Cybersecurity expert Jayson E. Street shares insights on how he legally "robs" banks to expose vulnerabilities. By exploiting human vulnerabilities rather than advanced technology, Jayson demonstrates how simple tools and social engineering can bypass even the most secure systems. Jayson, along with host Lieuwe Jan Koning and Threat Intel Specialist Luca Cipriano, discusses real-life incidents like the SWIFT Gateway vulnerability, the Vulture Android banking malware, and the Binance crypto hack. Heard the code of the Treasure Hunt? Fill it in and get your Threat Talks T-shirt here: https://threat-talks.com/breaking-the-bank/

    Threat Talks on Tour - Cyber Guardians: Anti-DDoS Coalition

    Play Episode Listen Later Jun 25, 2024 28:20


    This episode of Threat Talks delves into the world of DDoS attacks with special guests Remco Poortinga from SURF and Martijn Peijer from the Dutch Tax Office. Discover how easy it is to launch these attacks and learn about the strategies to counter them. We'll explore different types of DDoS attacks, the importance of collaboration, and how regular exercises can strengthen defenses. Plus, don't miss our special treasure hunt for a chance to win a T-shirt! Tune in for insightful discussions on cybersecurity and the ever-evolving threats in the digital landscape. Get your Threat Talks T-shirt here: https://threat-talks.com/threat-talks-on-tour-cyber-guardians-anti-ddos-coalition

    Zero Trust with John Kindervag – Threat Talks on tour | Part 2

    Play Episode Listen Later Jun 18, 2024 31:39


    Discover how Zero Trust can effectively protect against cyber threats and hear firsthand experiences from industry leaders! Lieuwe Jan Koning and cybersecurity expert John Kindervag dive into the concept of Zero Trust at the RSA Conference in San Francisco. They discuss the prevalence and importance of Zero Trust in the cybersecurity landscape, sharing insights from the conference and Kindervag's extensive experience. Learn about the fundamentals of Zero Trust, its evolution since 2010, and why it remains a critical strategy in combating modern cyber threats. Whether you're an IT professional, cybersecurity enthusiast, or just curious about the latest in cyber defense, this episode offers actionable insights and expert perspectives on a vital security strategy.

    Zero Trust with John Kindervag - Threat Talks on tour: Live from the RSA | Part 1

    Play Episode Listen Later Jun 11, 2024 30:57


    Join host Lieuwe Jan Koning as he interviews John Kindervag, creator of Zero Trust, at the RSA conference. Explore the origins, principles, and impact of Zero Trust on modern cybersecurity. Download the NSTAC report discussed in the episode here. Get your Threat Talks T-shirt on https://threat-talks.com/!

    Deep Dive - ScreenConnect: Authentication Bypass

    Play Episode Listen Later Jun 4, 2024 15:42


    CVE-2024-1709 is a critical vulnerability in ScreenConnect that has been exploited in multiple healthcare-related breaches, highlighting significant security risks. Explore the Change Healthcare attack caused by compromised Citrix credentials and learn about critical cybersecurity measures like network segmentation and EDR tools. Explore the infographic for an in-depth look at the ScreenConnect vulnerability: https://threat-talks.com/deep-dive-screenconnect/

    Deep Dive - Ireland's HSE Ransomware Attack

    Play Episode Listen Later May 28, 2024 26:21


    How did Ireland's largest healthcare network, HSE, fall victim to a crippling ransomware attack? What security flaws were exploited, and how can you prevent similar threats? Join us in this Deep Dive of Threat Talks as we uncover the details of the attack, the tactics used by cybercriminals, and essential strategies to protect your organization. Can your defenses withstand a ransomware attack? Tune in to find out! Download the infographic here: https://threat-talks.com/deep-dive-hse-ransomware/

    DICOM: The hidden risks of Legacy Protocols

    Play Episode Listen Later May 21, 2024 20:00


    Discover the vulnerabilities of the DICOM protocol in healthcare and the significant risks it poses, including data breaches and manipulation. This deep dive covers practical solutions for protecting sensitive patient information and enhancing cybersecurity measures in medical systems. Join host Lieuwe Jan Koning with guests Jan van Boesschoten and Sina Yazdanmehr as they explore these critical issues and provide actionable advice for healthcare providers. Download the infographic here: https://threat-talks.com/deep-dive-dicom/

    Claim Threat Talks - Your Gateway to Cybersecurity Insights

    In order to claim this podcast we'll send an email to with a verification link. Simply click the link and you will be able to edit tags, request a refresh, and other features to take control of your podcast page!

    Claim Cancel