Episodes
☠️ CrowdStrike: 8.5 million blue screens of death ☠️ Did you know that last July’s CrowdStrike outage led to closed airports, inaccessible bank accounts and hospitals that were only delivering emergency care that did not require any computers?   In this Threat Talk, Lieuwe Jan Koning is joined by Rob Maas and Jeroen Scheerder as they discuss the CrowdStrike outage and, more importantly, what could have been done to prevent such an impactful event from happening in the first place....
Published 11/12/24
🔍 Breaking the Illusion: Confronting Cybersecurity’s Biggest Fallacies 🔍 Think you know the route a hacker might take? Think again! In this eye-opening Threat Talk, Lieuwe Jan Koning dives into the critical fallacies of cybersecurity with top experts Fleur van Leusden, CISO and host of CISO Praat, and Jeroen Scheerder. ✨ Fleur unpacks one of the industry’s biggest blind spots: the heavy reliance on user awareness as a defense mechanism. While user education has its place, she argues it’s...
Published 11/05/24
Imagine creating millions in cryptocurrency…without spending a cent. 💸 🔍 Explore the Binance BNB Chain Attack, where attackers used cross-chain bridges to create crypto assets out of thin air. 👾 Dive into the exploit’s details, from blockchain’s cryptographic structures to vulnerabilities in cross-chain transfers. With breakdowns of Merkle trees and validation flaws, this discussion reveals how even minor misconfigurations can lead to massive security gaps. 🔍 Curious about...
Published 10/29/24
𝐄𝐯𝐞𝐫 𝐛𝐞𝐞𝐧 𝐚𝐬𝐤𝐞𝐝 𝐭𝐨 𝐡𝐚𝐜𝐤 𝐚 𝐛𝐨𝐚𝐭? When Luca Cipriano and Jeroen Scheerder were given the challenge, they took an unexpected approach—step one: build the boat themselves. It was a scale model, but they made sure it closely mirrored a real boat’s systems. With help from Damen Shipyards engineers, they even included a working ballast system. Of course the next step was to hack said ballast system. In this Threat Talks episode, Lieuwe Jan Koning chats with Luca and Jeroen about building the...
Published 10/22/24
AIS (Advanced Identification System) is a key tool in maritime navigation. It helps ships transmit their location and data to other vessels and satellites, preventing collisions and supporting rescue operations. 🛟 It’s a crucial technology for navigating 🗺️ the unpredictable oceans 🌊 —but it’s not without its vulnerabilities. 🏴‍☠️ Pirates can use AIS to track high-value ships, and hackers can manipulate the system. Picture this: your ship is safely docked, but hackers make it appear...
Published 10/15/24
🚢 𝐇𝐚𝐜𝐤 𝐭𝐡𝐞 𝐁𝐨𝐚𝐭: 𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐨𝐧 𝐭𝐡𝐞 𝐇𝐢𝐠𝐡 𝐒𝐞𝐚𝐬 | 𝐓𝐡𝐫𝐞𝐚𝐭 𝐓𝐚𝐥𝐤𝐬 🌊 Imagine you're the captain of a massive ship, cruising through open waters at full speed. Suddenly, something feels off... Are you veering off course? But your monitors show everything is fine... Is it a malfunction or could this be a cyber-attack? Live from the Tugboat bridge simulator at Damen Shipyards, this episode of Threat Talks dives into the cyber threats that modern vessels face. Whilst maritime vessels used to...
Published 10/08/24
🌊 Don’t drown in HTTP/2 Rapid Reset attacks! 🌊 The HTTP/2 Rapid Reset attack is a powerful new DDoS method that exploits weaknesses in the HTTP/2 protocol. By overwhelming web servers with rapid reset frames, attackers can disrupt services and cause significant downtime, making it a serious threat to organizations. In our latest Deep Dive, host Lieuwe Jan Koning is joined by Rob Maas (Field CTO ON2IT) and Luca Cipriano (Threat Intel Specialist ON2IT) as they walk through the attack...
Published 10/01/24
🔐 Do Your Configurations Keep You Safe? 🔐   How does a major financial institution like Capital One suffer a data breach that exposes over 100 million credit applications? In August 2019, a former Amazon employee was arrested for orchestrating a data breach that exposed over 100 million consumer credit applications at Capital One. How was AWS left vulnerable to a Server-Side Request Forgery (SSRF) attack, and how were their internal security measures misled and circumvented? In our...
Published 09/24/24
🚨 When Cybersecurity Experts Get Hacked 🚨 How does a company specializing in Identity and Access Management like OKTA suffer a data breach? In this case, a service account password was inadvertently saved by an OKTA employee to their personal Google account, which led to the credentials being leaked. This incident exposed a significant gap in compliance and highlighted how human error can result in even the most well-respected cybersecurity companies being compromised. In this Deep Dive,...
Published 09/17/24
🔐 Is Your "Secure" File Transfer Tool Really Secure? 🔐 If you’re depending on certifications alone to keep your data safe (spoiler: you shouldn’t be!), this episode is a must-watch. In this Deep Dive, Lieuwe Jan Koning is joined by Threat Intel Specialist Luca Cipriano and CISO Tim Timmermans to explore a prevalent case study; the Accellion File Transfer Appliance hack. Over 300 companies, including major players like Shell and the Reserve Bank of New Zealand, relied upon this trusted...
Published 09/10/24
Compliance doesn't always mean security. In this episode of Threat Talks, we dive deep into the critical operational gap between being compliant and being secure. Host Lieuwe Jan Koning, along with ON2IT's CISO Tim Timmermans and Pieter de Lange, CISO at Transdev, discuss how organizations can bridge this gap to not just tick boxes but to truly protect themselves from cyber threats. Learn the essential strategies that go beyond compliance and ensure robust security measures. Don't miss...
Published 09/03/24
𝐈𝐬 𝐭𝐡𝐞 𝐒𝐚𝐧𝐝 𝐄𝐚𝐠𝐥𝐞 𝐀𝐏𝐓 𝐭𝐡𝐞 𝐉𝐚𝐬𝐨𝐧 𝐁𝐨𝐮𝐫𝐧𝐞 𝐨𝐟 𝐜𝐲𝐛𝐞𝐫-𝐚𝐭𝐭𝐚𝐜𝐤𝐬? 🕶️   Just as Bourne eluded the most advanced surveillance and security systems in the world, the Sand Eagle APT made headlines 📰 for its ability to infiltrate and bypass layers of digital defense on supposedly the most secure devices on the market – iPhones. 📱 From exploiting legacy system vulnerabilities to the use of advanced return-oriented programming, this APT made use of not one, not two, but four zero-days to reach its...
Published 08/27/24
Ethan Hunt is known for doing the impossible. 😎 What if he and his team spoke Russian 🇷🇺 and on the onset of the invasion of Ukraine, they brought down control of 5.800 wind turbines in Germany 🇩🇪? Does this sound impossible? 🧐 Join ON2IT experts Lieuwe Jan Koning, Rob Maas and Luca Cipriano in this Deep Dive into the Russia GRU Viasat Hack, and find out what strategies were used to hack Viasat and how you can best prepare for and counter this kind of 🦾 attack. SHOW NOTES ===== 📈 Download...
Published 08/20/24
How do James Bond’s spy skills compare to modern cyber espionage? The Nexus Barracuda Hack was performed by highly skilled, Chinese cyber attackers, who exploited a zero-day vulnerability in Barracuda’s Email Security Gateway (ESG). 🚨 Join Lieuwe Jan Koning, Rob Maas and Luca Cipriano to find out about the strategies the attackers used, how their tactics could’ve been countered, and whether or not stopping James Bond-level spies is an achievable goal for cybersecurity experts. ======= 👕...
Published 08/13/24
Explore the hidden world of cyber warfare and advanced persistent threats (APTs) in this episode of Threat Talks. Join cybersecurity experts Lieuwe Jan Koning, Luca Cipriano and special guest Martijn Peijer as they discuss real-life cyber espionage cases and the latest cybersecurity strategies. Show notes Summary of I-S00N leaks | Github Anxun and Chinese APT Activity | VX-underground Github summary | VX-underground Find all episodes and request your own Threat Talks T-shirt...
Published 08/06/24
Explore the rising threat of DDoS attacks on European elections in this special episode of Threat Talks. Join Lieuwe Jan Koning and cybersecurity experts Octavia de Weerdt and Frank Dupker as they discuss the motivations behind these attacks, the role of the Anti-DDoS Coalition, and strategies to safeguard our digital democracy. Find all our episodes and request your own Threat Talks T-shirt on https://threat-talks.com/.
Published 07/30/24
Join Lieuwe Jan Koning on this special Threat Talks as he explores the evolving landscape of DDoS attacks with Junior Corazza and Miguel Regalado Querol. Discover if these cyber threats are truly diminishing or if we're just getting better at defending against them. Tune in to understand the current state of DDoS mitigations and the importance of cybersecurity collaboration. Find all our episodes and request your own Threat Talks T-shirt on https://threat-talks.com/
Published 07/23/24
Have you ever wondered how a simple game app could lead to your bank account being emptied? In this deep dive of Threat Talks, Lieuwe Jan Koning dives into the sinister world of Vultur Android malware. Joined by experts Rob Maas and Luca Cipriano, they unravel the mechanics of this malicious threat and discuss practical steps to safeguard your devices. Tune in to learn how to protect yourself from these covert cyber threats and stay one step ahead of hackers. 👕 Request your own Threat...
Published 07/16/24
Let's uncover how cybercriminals almost stole a billion dollars through sophisticated spear phishing and malware tactics. Dive into the Bangladesh Bank SWIFT attack with Lieuwe Jan Koning, Rob Maas and Luca Cipriano. Learn about the vulnerabilities they exploited, the steps of the attack, and the cybersecurity measures that could have thwarted it. Enhance your understanding with our downloadable infographic, available alongside the podcast. Tune in now to stay ahead of cyber threats and...
Published 07/09/24
Cybersecurity expert Jayson E. Street shares insights on how he legally "robs" banks to expose vulnerabilities. By exploiting human vulnerabilities rather than advanced technology, Jayson demonstrates how simple tools and social engineering can bypass even the most secure systems. Jayson, along with host Lieuwe Jan Koning and Threat Intel Specialist Luca Cipriano, discusses real-life incidents like the SWIFT Gateway vulnerability, the Vulture Android banking malware, and the Binance crypto...
Published 07/02/24
This episode of Threat Talks delves into the world of DDoS attacks with special guests Remco Poortinga from SURF and Martijn Peijer from the Dutch Tax Office. Discover how easy it is to launch these attacks and learn about the strategies to counter them. We'll explore different types of DDoS attacks, the importance of collaboration, and how regular exercises can strengthen defenses. Plus, don't miss our special treasure hunt for a chance to win a T-shirt! Tune in for insightful...
Published 06/25/24
Discover how Zero Trust can effectively protect against cyber threats and hear firsthand experiences from industry leaders! Lieuwe Jan Koning and cybersecurity expert John Kindervag dive into the concept of Zero Trust at the RSA Conference in San Francisco. They discuss the prevalence and importance of Zero Trust in the cybersecurity landscape, sharing insights from the conference and Kindervag's extensive experience. Learn about the fundamentals of Zero Trust, its evolution since 2010,...
Published 06/18/24
Join host Lieuwe Jan Koning as he interviews John Kindervag, creator of Zero Trust, at the RSA conference. Explore the origins, principles, and impact of Zero Trust on modern cybersecurity. Download the NSTAC report discussed in the episode here. Get your Threat Talks T-shirt on https://threat-talks.com/!
Published 06/11/24
CVE-2024-1709 is a critical vulnerability in ScreenConnect that has been exploited in multiple healthcare-related breaches, highlighting significant security risks. Explore the Change Healthcare attack caused by compromised Citrix credentials and learn about critical cybersecurity measures like network segmentation and EDR tools. Explore the infographic for an in-depth look at the ScreenConnect vulnerability: https://threat-talks.com/deep-dive-screenconnect/
Published 06/04/24