Podcast Episodes

Back to Search
Inside the MongoBleed Memory Leak
Inside the MongoBleed Memory Leak

Imagine your memory just became the attack surface.
That’s MongoBleed. Or as others know it: CVE-2025-14847. No passwords to crack, no complex exploit…

2 months, 1 week ago

Short Long
View Episode
How to pass any cybersecurity certification
How to pass any cybersecurity certification

Certifications play a central role in cybersecurity career development.
Yet many experienced engineers find themselves failing exams they should easil…

2 months, 2 weeks ago

Short Long
View Episode
The Battle of Defending a Digital City
The Battle of Defending a Digital City

When it comes to running an airport, there’s no room for error.

Any casualty is one too much.

 

That’s the reality of all airports, including DFW Airpor…

2 months, 3 weeks ago

Short Long
View Episode
From IPs to people
From IPs to people

Detection fails without identity. 
When activity isn’t tied to a person, anomalies stop telling a story - they’re just signals without context. And wh…

3 months ago

Short Long
View Episode
Beyond NIS2 Compliance
Beyond NIS2 Compliance

Most organizations ask one question:
 “Are we compliant?”


The question that actually matters is:
 “Will we still be operating when things go wrong?”


In t…

3 months, 1 week ago

Short Long
View Episode
Maritime Cybersecurity: Predictable = Hackable
Maritime Cybersecurity: Predictable = Hackable

You’re Port Control. A vessel requests entry.
No captain. No crew. Just autonomy.

In maritime cybersecurity, the risk isn’t that the ship is autonomous…

3 months, 2 weeks ago

Short Long
View Episode
Before the Mayday: Cyber ​​Attacks at Sea
Before the Mayday: Cyber ​​Attacks at Sea

Could Stuxnet happen again - this time at sea?

In this Threat Talks episode, host Lieuwe Jan Koning sits down with Professor Stephen McCombie, global …

3 months, 3 weeks ago

Short Long
View Episode
Looking Back at 2025: Cybersecurity at a Turning Point
Looking Back at 2025: Cybersecurity at a Turning Point

2025 was the year detection stopped being enough.
Because attacks stopped behaving the way detection was built to handle.

OT systems were hit with real…

3 months, 4 weeks ago

Short Long
View Episode
BGP Vortex: Internet Kill Switch?
BGP Vortex: Internet Kill Switch?

Could a single BGP trick really break the internet?

A new “BGP Vortex” claim says yes  - by abusing route oscillation and BGP communities to trigger e…

4 months ago

Short Long
View Episode
WSUS RCE: Update Weaponized
WSUS RCE: Update Weaponized

Attackers are abusing a WSUS flaw - Microsoft’s Windows Server Update Services - to detonate PowerCat, spawn reverse shells, and plant ShadowPad. All…

4 months, 1 week ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us