Podcast Episodes

Back to Search
Dutch Law Enforcement Data Breach - Threat Talks Cybersecurity Podcast
Dutch Law Enforcement Data Breach - Threat Talks Cybersecurity Podcast

Season 1 Episode 48

Imagine the names, job functions, email addresses and phone numbers of police officers, DAs, and even critical key witnesses being hacked and leaked …

1 year, 4 months ago

Short Long
View Episode
Conti Ransomware Attack on Costarican Government - Threat Talks Cybersecurity Podcast
Conti Ransomware Attack on Costarican Government - Threat Talks Cybersecurity Podcast

Season 1 Episode 42

🌎 Conti Attack on Costa Rica: When Ransomware Halts a Nation 🌎

What happens when a ransomware group attacks an entire country? In this Threat Talk, w…

1 year, 4 months ago

Short Long
View Episode
MGM Resorts ALPHV/BlackCat Ransomware Attack - Threat Talks Cybersecurity Podcast
MGM Resorts ALPHV/BlackCat Ransomware Attack - Threat Talks Cybersecurity Podcast

Season 1 Episode 41

🎙 Threat Talks: Unpacking the MGM Resorts ALPHV/BlackCat Ransomware Attack 🕵️‍♂️

In this Threat Talk, we dive deep into a cybersecurity incident in 2…

1 year, 4 months ago

Short Long
View Episode
Prevent, Pay or Insure - Threat Talks Cybersecurity Podcast
Prevent, Pay or Insure - Threat Talks Cybersecurity Podcast

Season 1 Episode 42

💰Prevent, Pay or Insure? 💰

Days before MGM’s computer systems were taken down in a cyberattack, fellow casino operator Caesars paid a $15 million ran…

1 year, 4 months ago

Short Long
View Episode
UNIX CUPS Remote Code Execution - The Fallacy of Default Trust - Threat Talks Cybersecurity Podcast
UNIX CUPS Remote Code Execution - The Fallacy of Default Trust - Threat Talks Cybersecurity Podcast

Season 1 Episode 41

"Hello! I'm a Printer! Please Let Me In!"

“Hello! I’m a printer! Please let me enter, thank you!” – It may sound absurd, but this is how attackers ca…

1 year, 5 months ago

Short Long
View Episode
XZ Utils Critical Backdoor (CVE- 2024-3094) - The Fallacy of Secure Open Source Code
XZ Utils Critical Backdoor (CVE- 2024-3094) - The Fallacy of Secure Open Source Code

Season 1 Episode 40

⏰ How much time would you spend on executing the perfect hack? ⏰  

The user going by the name of ‘JIAT75’ spent almost three years infiltrating and c…

1 year, 5 months ago

Short Long
View Episode
CrowdStrike Auto-Update Disaster - Threat Talks Cybersecurity Podcast
CrowdStrike Auto-Update Disaster - Threat Talks Cybersecurity Podcast

Season 1 Episode 39

☠️ CrowdStrike: 8.5 million blue screens of death ☠️

Did you know that last July’s CrowdStrike outage led to closed airports, inaccessible bank accou…

1 year, 5 months ago

Short Long
View Episode
Breaking the Illusion: Exposing Security Fallacies - Threat Talks Cybersecurity Podcast
Breaking the Illusion: Exposing Security Fallacies - Threat Talks Cybersecurity Podcast

Season 1 Episode 38

🔍 Breaking the Illusion: Confronting Cybersecurity’s Biggest Fallacies 🔍

Think you know the route a hacker might take? Think again! In this eye-openi…

1 year, 5 months ago

Short Long
View Episode
Binance BNB Smartchain Attack - Deep Dive - Threat Talks Cybersecurity Podcast
Binance BNB Smartchain Attack - Deep Dive - Threat Talks Cybersecurity Podcast

Season 1 Episode 37

Imagine creating millions in cryptocurrency…without spending a cent. 💸

🔍 Explore the Binance BNB Chain Attack, where attackers used cross-chain bridg…

1 year, 6 months ago

Short Long
View Episode
Hack the Boat Ballast System - Deep Dive - Threat Talks Cybersecurity Podcast
Hack the Boat Ballast System - Deep Dive - Threat Talks Cybersecurity Podcast

Season 1 Episode 36

𝐄𝐯𝐞𝐫 𝐛𝐞𝐞𝐧 𝐚𝐬𝐤𝐞𝐝 𝐭𝐨 𝐡𝐚𝐜𝐤 𝐚 𝐛𝐨𝐚𝐭? When Luca Cipriano and Jeroen Scheerder were given the challenge, they took an unexpected approach—step one: build th…

1 year, 6 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us