Threat Talks - Your Gateway to Cybersecurity Insights Podcast By Threat Talks cover art

Threat Talks - Your Gateway to Cybersecurity Insights

Threat Talks - Your Gateway to Cybersecurity Insights

By: Threat Talks
Listen for free

Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats. We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals. Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and stay secure!Threat Talks Politics & Government
Episodes
  • China is Already Inside your infrastructure
    Mar 3 2026

    China is Already Inside your infrastructure.

    And the EU is done ignoring it.

    In this exclusive first discussion of the upcoming EU Cybersecurity Act revision, Bart Groothuis, MEP, joins Lieuwe-Jan Koning, CTO and Co-Founder, to explain why vendor dependency is now a board-level security risk.

    Groothuis breaks down how the revised EU Cybersecurity Act will shift Europe from soft guidance to hard enforcement - introducing formal “high-risk vendor” treatment inside critical infrastructure.

    This isn’t about secret backdoors.

    It’s about who controls the next update.
    Who enters your data center.
    And who can one day - switch off the grid.

    The revision brings non-technical risk - state influence, intelligence laws, geopolitical leverage - directly into cyber certification decisions. That means supply chain risk is no longer theoretical. It’s regulatory.


    And the impact goes far beyond telecom.
    Energy. Cloud. Transport. Enterprise IT.

    If your infrastructure depends on a vendor tied to a high-risk state, this conversation matters.

    Timestamps
    00:00 Opening & guest intro: MEP Bart Roos - rapporteur on EU legislation
    01:23 What the CSA revision targets - certification, telecoms, cloud
    09:11 Non-technical risk: intelligence laws, vendor-state ties, 5G implications
    15:10 What’s new in the Security Act Revision, 4G vs 5G - why virtualisation changes the security model

    17:17 Energy, inverters, and real-world dependency risks - blackouts
    21:53 What organisations & buyers should do now (roadmaps, phasing out risk)
    25:53 Final call to action & closing

    Key Topics Covered
    • Why the EU Cybersecurity Act revision treats non-technical vendor risk as policy, not just code review.
    • The difference between technical vulnerabilities and vendor/state dependencies (intelligence laws, personnel access).
    • 5G’s virtualised architecture: “winner takes all” risks and the limits of code audits.
    • Practical next steps for CISOs: vendor inventory, risk-based roadmaps, procurement levers and phasing strategies.

    Related ON2IT content & explicitly referenced resources
    ON2IT website: https://on2it.net/
    Threat Talks website: https://threat-talks.com/
    European Commission - Cybersecurity Act overview: https://digital-strategy.ec.europa.eu/en/policies/cybersecurity-act
    Proposal for a Regulation for the EU Cybersecurity Act: https://digital-strategy.ec.europa.eu/en/library/proposal-regulation-eu-cybersecurity-act

    Subscribe and turn on notifications to stay ahead of emerging cyber policy, supply chain risk, and critical infrastructure security across IT and OT.
    ► YOUTUBE: /@threattalks
    ► Spotify / Apple Podcasts:

    Show more Show less
    30 mins
  • OpenClaw and The Dark Side of Agentic AI
    Feb 24 2026

    Your biggest threat this year isn’t malware. It’s your own AI assistant.

    OpenClaw connects an LLM directly to your terminal, browser, email, and chat.
    It runs with your permissions.
    It executes tasks without hesitation.

    Days after launch, researchers found a One-Click RCE.

    Cisco called it a security nightmare.

    Gartner called it an unacceptable risk.

    OpenClaw (formerly known as Clawdbot and Moltbot) represents a new phase of agentic AI: autonomous assistants operating inside your environment with almost no guardrails.

    The headlines around OpenClaw have been clear: it’s a serious threat. But how should we handle agentic AIs like OpenClaw moving forward?

    In this Threat Talks episode, Field CTO Rob Maas and SOC analyst Yuri Wit break down what OpenClaw actually does, where AI agent security breaks, and whether or not you should deploy OpenClaw.

    OpenClaw is powerful. It’s useful.

    It’s also proof that many of us are not ready for AI agents with this level of autonomy.

    Before you let an AI agent into your systems, understand what happens when it runs unchecked.

    Timestamps

    Key Topics Covered

    · How OpenClaw works and why agentic AI changes the security model

    · The One-Click RCE and what it reveals about AI agent security

    · Malicious skills, default allow design, and autonomous privilege abuse

    · Realistic mitigation strategies including sandboxing and controlled environments

    Resources

    · Threat Talks: https://threat-talks.com/

    · ON2IT (Zero Trust as a Service): https://on2it.net/

    · AMS-IX: https://www.ams-ix.net/ams


    Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.


    Click here to view the episode transcript.

    🔔 Follow and Support our channel! 🔔

    ===


    ► YOUTUBE: / @threattalks

    ► SPOTIFY: https://open.spotify.com/show/1SXUyUE...

    ► APPLE: https://podcasts.apple.com/us/podcast...

    👕 Receive your Threat Talks T-shirt

    https://threat-talks.com/

    🗺️ Explore the Hack's Route in Detail 🗺️

    https://threat-talks.com

    🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX

    Show more Show less
    20 mins
  • Inside the MongoBleed Memory Leak
    Feb 17 2026

    Imagine your memory just became the attack surface.
    That’s MongoBleed. Or as others know it: CVE-2025-14847. No passwords to crack, no complex exploit chain.

    Just normal protocol behavior, repeated at scale.

    Each request leaks a little more MongoDB memory until something valuable shows up, even in environments that already follow network segmentation best practices.

    Rob Maas (Field CTO, ON2IT) hosts Luca Cipriano (CTI & Red Team Program Lead) to dissect MongoBleed, an unauthenticated memory leak vulnerability in MongoDB, in this episode of Threat Talks.

    They break down how MongoBleed exploits MongoDB’s wire protocol before authentication and why repetition matters more than a single request.

    MongoDB is everywhere: cloud platforms, scalable applications, and data-heavy environments where availability matters more than friction. If MongoDB is part of your environment, or you want to understand how this vulnerability is exploited in practice, the full breakdown is worth your time.

    Timestamps

    Key Topics Covered

    · How malformed compressed messages manipulate MongoDB memory allocation

    · Why BSON string parsing can expose unintended data

    · How repeated burst requests turn small leaks into valuable information

    · Why MongoDB deployments are attractive targets in the cloud

    Resources

    · Threat Talks: https://threat-talks.com/

    · ON2IT (Zero Trust as a Service): https://on2it.net/

    · AMS-IX: https://www.ams-ix.net/ams

    · Threat Talks episode on Citrix Bleed: https://youtu.be/YwDpRPBfAzs


    Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.

    🔔 Follow and Support our channel! 🔔


    ===


    ► YOUTUBE: / @threattalks

    ► SPOTIFY: https://open.spotify.com/show/1SXUyUE...

    ► APPLE: https://podcasts.apple.com/us/podcast...

    👕 Receive your Threat Talks T-shirt

    https://threat-talks.com/

    🗺️ Explore the Hack's Route in Detail 🗺️

    https://threat-talks.com

    🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX

    Show more Show less
    14 mins
No reviews yet