In recent months, IT departments worldwide have been in the eye of the storm. As countries prepare for significant elections, a wave of cyberattacks has swept across the political landscape.
Lawmakers find their private communications exposed by phone hacks, while data breaches on an unprecedented scale threaten the personal information of thousands.
This surge in cyber assaults underscores a broader narrative: we are entrenched in a digital battleground.
Today, possessing advanced threat intelligence isn’t just beneficial; it’s imperative for detecting, understanding, and countering the sophisticated threats that loom over us.
In this ‘Evolution of Cyber Warfare’ episode of Threat Talks, we explore whether or not we stand a chance in this continuous arms race in cyber technologies, what Advanced Persistent Threats (APTs) are, and how these modern threats can affect literally everyone.
P.S. Think you can spot the secret code in this episode? Join the treasure hunt, submit the code and win your very own Threat Talks t-shirt!
China Nexus Barracuda Hack
In today’s world, cyber threats and hackers are as real and sophisticated as their fictional counterparts from a James Bond movie.
Do we stand a chance defending ourselves against modern day cyber espionage?
In this Threat Talks Deep Dive, host Lieuwe Jan Koning is joined by Rob Maas and Luca Cipriano as they walk you through the intricacies and tactics used in the Nexus Barracuda Hack, as well as what steps could have been taken to prevent it from happening.
Are these modern hackers unstoppable? Or can we take them on like any Bond villain?
Russia GRU Viasat Hack
The China Barracuda Nexus hack, which targeted email security gateways, has raised significant concerns across the cybersecurity community.
In this Deep Dive into the Barracuda Hack, host Lieuwe Jan Koning is joined by Rob Maas and Luca Cipriano as they offer a detailed analysis of the attack’s impact and the sophisticated techniques used in this attack, including how the threat actors exploited vulnerabilities to gain persistent access to sensitive systems.
Looking for practical advice on how organizations can bolster their defenses against similar threats? Ready to consider the broader implications of this hack, especially in the context of state-sponsored cyber activities?
APT Sand Eagle – Operation Triangulation
The Sand Eagle APT made headlines for its ability to infiltrate and bypass layers of digital defense on supposedly the most secure devices on the market – iPhones.
From exploiting legacy system vulnerabilities to the use of advanced return-oriented programming, this APT made use of not one, not two, but four zero-days to reach its goal – cyber espionage.
For this Deep Dive on the Sand Eagle APT, host Lieuwe Jan Koning is joined by Martijn Peijer and Rob Maas as they break down how this threat operated undetected for so long, what the goal was and the immense resources likely involved in its development.
Follow our Threat Talks podcast
Stay up to date with the latest developments in the world of cybersecurity! Alongside industry experts, we explore recent cyber threats, what their impact was and how to prevent these threats in the future.