Threat Talks - Your Gateway to Cybersecurity Insights cover art

Threat Talks - Your Gateway to Cybersecurity Insights

Threat Talks - Your Gateway to Cybersecurity Insights

Written by: Threat Talks
Listen for free

About this listen

Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats. We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals. Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and stay secure!Threat Talks Politics & Government
Episodes
  • Inside the MongoBleed Memory Leak
    Feb 17 2026

    Imagine your memory just became the attack surface.
    That’s MongoBleed. Or as others know it: CVE-2025-14847. No passwords to crack, no complex exploit chain.

    Just normal protocol behavior, repeated at scale.

    Each request leaks a little more MongoDB memory until something valuable shows up, even in environments that already follow network segmentation best practices.

    Rob Maas (Field CTO, ON2IT) hosts Luca Cipriano (CTI & Red Team Program Lead) to dissect MongoBleed, an unauthenticated memory leak vulnerability in MongoDB, in this episode of Threat Talks.

    They break down how MongoBleed exploits MongoDB’s wire protocol before authentication and why repetition matters more than a single request.

    MongoDB is everywhere: cloud platforms, scalable applications, and data-heavy environments where availability matters more than friction. If MongoDB is part of your environment, or you want to understand how this vulnerability is exploited in practice, the full breakdown is worth your time.

    Timestamps

    Key Topics Covered

    · How malformed compressed messages manipulate MongoDB memory allocation

    · Why BSON string parsing can expose unintended data

    · How repeated burst requests turn small leaks into valuable information

    · Why MongoDB deployments are attractive targets in the cloud

    Resources

    · Threat Talks: https://threat-talks.com/

    · ON2IT (Zero Trust as a Service): https://on2it.net/

    · AMS-IX: https://www.ams-ix.net/ams

    · Threat Talks episode on Citrix Bleed: https://youtu.be/YwDpRPBfAzs


    Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.

    🔔 Follow and Support our channel! 🔔


    ===


    ► YOUTUBE: / @threattalks

    ► SPOTIFY: https://open.spotify.com/show/1SXUyUE...

    ► APPLE: https://podcasts.apple.com/us/podcast...

    👕 Receive your Threat Talks T-shirt

    https://threat-talks.com/

    🗺️ Explore the Hack's Route in Detail 🗺️

    https://threat-talks.com

    🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX

    Show More Show Less
    14 mins
  • How to pass any cybersecurity certification
    Feb 10 2026

    Certifications play a central role in cybersecurity career development.
    Yet many experienced engineers find themselves failing exams they should easily pass.

    The problem isn’t a lack of knowledge or skills.

    It’s the disconnect between real-world security work, and certifications built around memorization, UI trivia, and version-specific details that will be obsolete in two months.

    In this episode of Threat Talks, Rob Maas (Field CTO, ON2IT) and Nicholai Piagentini(Technical Enablement Engineer, ON2IT) break down why this happens, how certification exams are designed, and how to pass any cybersecurity certification without memorization or falling for trick questions.

    They explore how well-written exams validate real job tasks, while poorly designed ones drift into reading comprehension, UI trivia, and version-specific details that lose value the moment the product changes.

    From blueprint-driven preparation to smart elimination tactics and knowing when not to overthink an answer, this is a grounded look at how to pass any certification for meaningful cybersecurity qualifications.

    Timestamps


    Key Topics Covered

    · Why many certification exams fail at measuring real-world cybersecurity skills

    · How to pass cybersecurity certification exams by focusing on concepts, not memorization

    · What makes a good vs bad exam (and how vendors design them)

    · Practical tactics for exam day, preparation strategies, and dealing with nerves

    Resources

    · Threat Talks: https://threat-talks.com/

    · ON2IT (Zero Trust as a Service): https://on2it.net/

    · AMS-IX: https://www.ams-ix.net/ams


    Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.

    🔔 Follow and Support our channel! 🔔


    ===


    ► YOUTUBE: / @threattalks

    ► SPOTIFY: https://open.spotify.com/show/1SXUyUE...

    ► APPLE: https://podcasts.apple.com/us/podcast...

    👕 Receive your Threat Talks T-shirt

    https://threat-talks.com/

    🗺️ Explore the Hack's Route in Detail 🗺️

    https://threat-talks.com

    Show More Show Less
    22 mins
  • The Battle of Defending a Digital City
    Feb 3 2026

    When it comes to running an airport, there’s no room for error.

    Any casualty is one too much.

    That’s the reality of all airports, including DFW Airport. It’s a 28-square-mile operation, bigger than the island of Manhattan, functioning as a city with its own police, fire services, OT environments, and always-on digital infrastructure.

    In this Threat Talks episode, Lieuwe-Jan Koning (Co-Founder and CTO, ON2IT) sits down with Eric Bowerman (CISO of DFW Airport), to unpack how cybersecurity actually works when IT, OT, and physical safety collide.

    From digital transformation security to real-world OT security and IT/OT convergence, this is a rare, grounded look at defending critical infrastructure where failure isn’t theoretical - it’s operational.


    Timestamps


    Key Topics Covered

    • How a major airport functions as a digital city with IT, OT, and cyber-physical risk
    • Practical OT security strategies when patching and downtime aren’t options
    • Why IT/OT convergence changes threat modeling, segmentation, and detection

    Resilience-first security: keeping passengers, planes, and operations moving

    Click here to view the episode transcript.

    Related ON2IT Content & Referenced Resources

    Threat Talks website: https://threat-talks.com/
    ON2IT website: https://on2it.net/


    If you’re responsible for critical infrastructure, OT environments, or large-scale digital transformation, this episode is essential viewing.

    🔔 Subscribe and turn on notifications to stay ahead of emerging cyber threats across IT, OT, and critical infrastructure.

    ===
    ► YOUTUBE: / @threattalks
    ► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E

    ► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520

    Show More Show Less
    47 mins
No reviews yet