• Deep Dive - ScreenConnect: Authentication Bypass
    Jun 4 2024

    CVE-2024-1709 is a critical vulnerability in ScreenConnect that has been exploited in multiple healthcare-related breaches, highlighting significant security risks.

    Explore the Change Healthcare attack caused by compromised Citrix credentials and learn about critical cybersecurity measures like network segmentation and EDR tools.

    Explore the infographic for an in-depth look at the ScreenConnect vulnerability: https://threat-talks.com/deep-dive-screenconnect/

    Show more Show less
    16 mins
  • Deep Dive - Ireland's HSE Ransomware Attack
    May 28 2024

    How did Ireland's largest healthcare network, HSE, fall victim to a crippling ransomware attack?

    What security flaws were exploited, and how can you prevent similar threats?

    Join us in this Deep Dive of Threat Talks as we uncover the details of the attack, the tactics used by cybercriminals, and essential strategies to protect your organization.

    Can your defenses withstand a ransomware attack? Tune in to find out!

    Download the infographic here: https://threat-talks.com/deep-dive-hse-ransomware/

    Show more Show less
    26 mins
  • Deep Dive - DICOM: The hidden risks of Legacy Protocols
    May 21 2024

    Discover the vulnerabilities of the DICOM protocol in healthcare and the significant risks it poses, including data breaches and manipulation.

    This deep dive covers practical solutions for protecting sensitive patient information and enhancing cybersecurity measures in medical systems.

    Join host Lieuwe Jan Koning with guests Jan van Boesschoten and Sina Yazdanmehr as they explore these critical issues and provide actionable advice for healthcare providers.

    Download the infographic here: https://threat-talks.com/deep-dive-dicom/


    Show more Show less
    20 mins
  • Healthcare: Responsibilities, regulations and legacies - Threat Talks
    May 14 2024

    In this episode of Threat Talks, we examine major cybersecurity risks in healthcare.

    We discuss how old systems like DICOM, still widely used, can lead to serious cyberattacks. How do recent breaches and outdated protocols threaten patient privacy and disrupt healthcare services?

    Guided by Lieuwe Jan Koning, CTO of ON2IT, alongside cybersecurity experts Sina Yazdanmehr and Rob Maas, we explore the dangerous terrain of legacy systems, highlighting breaches involving HSE hospitals and vulnerabilities in ScreenConnect, and explaining how outdated protocols and software threaten patient privacy and disrupt healthcare services.

    Here is the link to Sina's DICOM talk: https://www.youtube.com/watch?v=CgJIxTP8ydQ&t=0s

    Download the infographic here: https://threat-talks.com/healthcare-responsibilities-regulations-and-legacies/



    Show more Show less
    43 mins
  • Palo Alto Networks CVE-2024-3400: a comprehensive analysis of the vulnerability
    May 7 2024

    Tune into this special episode of Threat Talks, as we dissect the critical CVE 2024 3400 vulnerability in Palo Alto Networks' GlobalProtect servers.

    Join our cybersecurity experts for a deep dive into the vulnerability's implications, our response strategies, and practical tips to bolster your defenses against similar threats.


    For those who crave even more detailed insights, be sure to check out our comprehensive information page on this topic: https://on2it.net/nl/cve-2024-3400-pan-os-os-command-injection-vulnerability-in-globalprotect/

    And read our blog posts for a deeper dive into the technical aspects and implications of CVE-2024-3400:

    ☞ https://on2it.net/palo-alto-networks-cve-2024-3400-alert/ ☞ https://on2it.net/vpn-firewall-integration-a-strategic-analysis/


    Download the infographic here: https://threat-talks.com/unraveling-cve-2024-3400/

    Show more Show less
    40 mins
  • Deep Dive - Reflection Attack - The most simple dos attack
    Apr 30 2024

    Understanding Reflection Attacks: A Simple Yet Powerful DOS Method.

    👕 Request your own Threat Talks T'shirt: https://threat-talks.com/cant-deny-ddos-in-2024/ Distributed Denial of Service (DDoS) Attacks Explained Picture this: a DDOS attack, but turbocharged by the clever use of network request reflections. This discussion sheds light on how attackers harness the normal functions of protocols to unleash powerful assaults on unprepared targets. Interestingly, these attacks don't rely on exploiting software flaws; instead, they use the basic architecture of protocols like DNS and NTP to increase their destructive power. Here's a breakdown of what you need to know about reflection attacks, from their conception to how they're combatted: The Basics: What exactly is a reflection attack? We delve into the fundamental components of these attacks, detailing the roles of the attacker, the servers, and the victims caught in the digital crossfire. Why UDP?: Discover why UDP is the preferred protocol for reflection attacks. What makes it uniquely vulnerable, and how does it help the attacker? Defense Strategies: What strategies can organizations employ against the relentless flood of unwanted network responses? We explore practical steps for mitigation, helping you fortify your defenses against such insidious attacks. Join us as we dive into the strategic approach to a cyber attack, where knowing how to anticipate and counter the adversary's tactics is critical to protecting your digital assets. Let's explore together and strengthen our defenses! ✅ All our Threat Talks can be found on https://threat-talks.com 👕 Request your own Threat Talks T'shirt: https://threat-talks.com/cant-deny-ddos-in-2024/ 🕵️ Threat Talks is a collaboration between on2IT and AMS-IX

    Show more Show less
    12 mins
  • Deep Dive - MOVEit: The danger of delegating data to third-party software
    Apr 23 2024

    Dive into the largest data breach of 2023, a devastating supply chain attack involving the MOVEit software, which impacted over 60 million individuals.

    Learn how the Klo Ransomware Group exploited a zero-day vulnerability through SQL injection to carry out their attack, and the challenges this presents for cybersecurity measures today.

    Interested in the full technical info of the discussed threats? For more detailed information or to access the infographic, please visit https://threat-talks.com/deep-dive-moveit/

    Show more Show less
    15 mins
  • Deep Dive - Log4j: The danger of software dependencies
    Apr 16 2024

    Join us for a deep dive episode of Threat Talks, focusing on Log4j, the critical logging library at the heart of Java development.

    Discover Log4j's flexibility in message configuration and how it enhances Java programming. Perfect for those looking to deepen their Java and Log4j knowledge.

    Interested in the full technical info of the discussed threats? For more detailed information or to access the infographic, please visit https://threat-talks.com/deep-dive-log4j-the-danger-of-software-dependencies/.

    Show more Show less
    19 mins