Mind Mashed - A Transformative Mindfulness & 5D Spirituality Podcast by Quantum Nine. Unleashing the Power of Your Mind with Mind Mashed Podcast. If you're looking for a place to unlock the Secrets of the Mind with 5th Dimensions and Crystals, Mind Mashed is the perfect destination. This podcast offers a unique mash-up of topics including the brain, behavior, mindfulness, leadership, and spirituality. Through the power of mindfulness, Mind Mashed helps you gain greater self-awareness and enj ...
…
continue reading
Quantum Nine Podcasts
Welcome to Wrestle Castle Daily, where your daily wrestling fix is served hot off the press! Hosted by Piyush, we dive headfirst into the adrenaline-pumping world of wrestling, bringing you the latest news, juiciest rumors, and exclusive spoilers. But this podcast is more than just a recap; it's your ringside seat to the heart of the action. Are you tired of missing out on crucial updates in the wrestling universe? Wrestle Castle Daily has your back. We break down the events, analyze the bac ...
…
continue reading
Hosts Kellen and Mikailah welcome you to Quantum Theory. Listen in as we Black niimíipuu (Nez Perce) people come together to share our personal experiences of being biracial. Blood Quantum and the One Drop Rule were designed to directly affect our specific condition in society, so each conversation on this podcast is dedicated to amplifying Black Indigenous voices. Join us as we discuss current events, history, entertainment, business, culture, and becoming agents of change in our community.
…
continue reading
Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats. We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals. Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and sta ...
…
continue reading

1
Defend Against Hacktivist Groups like APT Handala | The Cyber Security Podcast
30:32
30:32
Play later
Play later
Lists
Like
Liked
30:32Hacktivists don’t need zero-days to hurt you—they weaponize people. Host Lieuwe Jan Koning sits down with Yuri Wit (SOC analyst) and Rob Maas (Field CTO) to dissect APT Handala: how they hunt targets, deliver wipers, and brag about leaks. We map their moves to the Lockheed Martin Kill Chain and turn it into a Zero Trust defense playbook you can act…
…
continue reading

1
Promptlock – The First AI-Powered Malware | The Cyber Security Podcast
19:10
19:10
Play later
Play later
Lists
Like
Liked
19:10First documented case: AI inside the breach. Promptlock marks the first time malware has used AI during execution, not just in preparation. In this Threat Talks deep dive, Rob Maas (Field CTO, ON2IT) sits down with Yuri Wit (SOC Analyst, ON2IT) to break down how it works: a Go loader calling an attacker’s LLM in real time, generating fresh payloads…
…
continue reading

1
Data Bouncing: How HTTP Headers Leak Data | The Cyber Security Podcast
21:58
21:58
Play later
Play later
Lists
Like
Liked
21:58Your tools say “secure.” Your headers say “leaking.” In this Threat Talks Deep Dive, ON2IT’s Luca Cipriano (CTI & Red Team Lead) exposes Data Bouncing—a stealthy exfiltration trick that hides inside HTTP headers and abuses DNS lookups through trusted third parties. We show the demo, decode the psychology of the attack, and translate it into Zero Tr…
…
continue reading

1
AI, Play It Safe: Why CISOs Are Wrong to Ban AI
44:54
44:54
Play later
Play later
Lists
Like
Liked
44:54Playing it safe with AI sounds smart, but is banning it really how you prevent data leaks? In this episode of Threat Talks, ON2IT’s Lieuwe Jan Koning (ON2IT Co-Founder) sits down with Rob Maas, Field CTO at ON2IT, to tackle the hard question: How can CISOs and security leaders embrace AI safely—without exposing their organization to destructive dat…
…
continue reading

1
Zero Trust step 5A: Stop Breaches—Inspect Every Event Now | The Cybersecurity Podcast
25:16
25:16
Play later
Play later
Lists
Like
Liked
25:16Zero Trust step 5A is where monitoring turns raw logs into decisive action. Hosts Lieuwe Jan Koning and Rob Maas (Field CTO, ON2IT) expose why MDR alone isn’t protection—and how context closes the gap. Learn to inspect every event, use Indicators of Good/Compromise, and set Rules of Engagement that stop lateral movement and alert fatigue. (00:00) -…
…
continue reading

1
From Stealth to Wipers: Inside Russia’s APT 44 AKA Seashell Blizzard | The Cybersecurity Podcast
25:11
25:11
Play later
Play later
Lists
Like
Liked
25:11Russia’s most notorious cyber unit—Seashell Blizzard (also known as Sandworm, APT 44 and Iron Viking)—has taken down shipping giants, Olympic systems, and Ukraine’s power grid. In this Threat Talks deep dive, Lieuwe Jan Koning, Yuri Wit (Red Team), and Rob Maas (Blue Team) reveal exactly how these attacks unfold, why they’re so hard to stop, and ho…
…
continue reading

1
Signal Gate: One Wrong Number Triggered the Largest U.S. Gov Data Leak | The Cybersecurity Podcast
13:45
13:45
Play later
Play later
Lists
Like
Liked
13:45One mis-typed contact detonates Signal Gate, turning “secure” messaging into a classified-data leak.Host Lieuwe Jan Koning (Co-founder, ON2IT) and Thomas Manolis (Security Officer, AMS-IX) lay out the breach blow-by-blow—then drop the Zero Trust, Shadow IT and information-governance tactics every CISO needs before the next incident hits.High stakes…
…
continue reading

1
Splinternet Reality Check: Zero Trust Strategies for a Fragmenting Web
39:31
39:31
Play later
Play later
Lists
Like
Liked
39:31ON2IT’s Lieuwe Jan Koning goes one-on-one with AMS-IX CEO Peter van Burgel to expose why the once-open internet is splintering into rival, firewalled regions. Discover the geopolitical forces fueling this cybersecurity trend. Learn the Zero Trust resilience moves CISOs must deploy to stay sovereign in the future of the internet.Key Topics Covered• …
…
continue reading

1
Zero Trust Step 4B: How to Secure Admin Access
13:55
13:55
Play later
Play later
Lists
Like
Liked
13:55Administrative accounts come with serious power – and serious power, comes with serious risk. In part B of our deep dive into step four of Zero Trust (create Zero Trust policy), host Lieuwe Jan Koning and ON2IT Field CTO Rob Maas unpack how to build Zero Trust policies specifically for administrative access. They explore: 1) Why admins are a high-v…
…
continue reading

1
Mastering Step Four of Zero Trust: Policy Creation
25:46
25:46
Play later
Play later
Lists
Like
Liked
25:46Now that you’ve defined your protect surfaces, mapped your transaction flows and built your Zero Trust architecture, it’s time for step four of Zero Trust: creating policy. In other words, it’s time to turn strategy into actual rules. In this episode of Threat Talks, host Lieuwe Jan and Koning and Field CTO of ON2IT Rob Maas talk through how to cre…
…
continue reading
What does quantum computing mean for blockchain? And how should platforms respond before Q-day becomes reality? In this episode of Threat Talks, ON2IT Field CTO Rob Maas is joined by Jeroen Scheerder, who leads ON2IT's post-quantum cryptography research group. They explore how quantum algorithms interact with current blockchain designs, what makes …
…
continue reading

1
Windows Recall: Convenience or Catastrophe?
23:08
23:08
Play later
Play later
Lists
Like
Liked
23:08Windows Recall is a new feature in Windows 11 that captures screenshots every few seconds and stores them in a local database. It’s designed to help users find what they’ve seen or done: but that convenience may come at a high cost. In this episode of Threat Talks, ON2IT Field CTO Rob Maas speaks with security expert Jeroen Scheerder about the real…
…
continue reading
Andy Grotto (founder and director of the Program on Geopolitics, Technology and Governance at Stanford University) puts it plainly: there's a 5% chance that within the next 10 years, AI could rule over humans. That number might sound small, but it's enough to take seriously. He joins host Lieuwe Jan Koning and guest Davis Hake (Senior Director for …
…
continue reading

1
Zero Trust Step Three: Build a Zero Trust Architecture
39:04
39:04
Play later
Play later
Lists
Like
Liked
39:04It’s time to get practical. After identifying protect surfaces and mapping flows, the third step in Zero Trust is about designing the actual architecture.In this episode of Threat Talks, Lieuwe Jan and Rob Maas talk about segmentation, control selection, and why this is the most operational step in your Zero Trust journey.They cover:✅ Why segmentat…
…
continue reading
From sovereign clouds to Zero Trust, and from cross-border investments to threat intelligence sharing, cooperation between the US and Europe is crucial, but still complex. With differing policies, fragmented markets, and varying strategies, the cyber world remains anything but unified.In this special episode of Threat Talks, Davis Hake (Senior Dire…
…
continue reading
AI vs. Human Pentesting: Who Wins?What happens when you try to automate something that’s part science, part art? In an industry rushing to adopt AI for everything from detection to response, the real question is: can a machine truly replace the craft of a human pentester?In this episode of Threat Talks, host Lieuwe Jan Koning is joined by Melanie R…
…
continue reading
PLCs with default passwords. Devices searchable online. Siloed asset inventories. These OT challenges are common, but they’re also fixable. In this episode of Threat Talks, host Lieuwe Jan Koning sits down with Venable’s Caitlin Clarke and Schneider Electric’s Patrick Ford to discuss why the OT side of your business deserves the same focus and atte…
…
continue reading
Once you have defined a few protect surfaces (see: Step 1 of Zero Trust-video link below), the next step is to start mapping the transaction flows: how these protect surfaces communicate with one another. Understanding how data travels to, from and around protect surfaces is your next logical movie. Why? Because if you don’t know how your systems…
…
continue reading
Now that we know what a PLC, HMI and SCADA are (check out last week’s episode for a refresher if you need one!), we’re ready for part two of our OT deep dive: how does an OT attack work? In this Deep Dive, Rob Maas and Luca Cipriano break down just how complex an OT attack really is. From needing to stay hidden, to requiring access to very specific…
…
continue reading
From heating systems in Ukraine to petrochemical plant safety controls, Operational Technology (OT) systems are the hidden workhorses behind critical infrastructure: and they're wide open to cyber threats. In this Deep Dive, Rob Maas sits down with Luca Cipriano to break down what OT is, why it’s different from IT, where the two overlap and how we …
…
continue reading
From ships and cities to hospitals and airports, Operational Technology (OT) keeps the world running. The problem? It was never designed with cybersecurity in mind. In this episode of Threat Talks, host Karin Muller is joined by TC Hoot (VP of Contracts at TAC) and Luca Cipriano (Threat Intel Specialist at ON2IT) to explore how airports, hospitals,…
…
continue reading
Zero Trust is about more than just IP addresses and firewalls: it’s about understanding what truly matters to your business. In step one of Zero Trust: define your protect surface, we focus on how to prioritize what you want to protect, how to avoid common pitfalls, and how to kick off your Zero Trust journey from a solid, business-aligned foundati…
…
continue reading

1
Zero Trust Demystified: What is Zero Trust Really About?
20:29
20:29
Play later
Play later
Lists
Like
Liked
20:29Zero Trust is everywhere – but what does this actually mean? Is it a cybersecurity strategy, a set of tactics, a product you can buy, or just clever marketing? In this kickoff episode of this Zero Trust series, Lieuwe Jan Koning and Rob Maas explore what Zero Trust actually is, how to think about it strategically, and why it’s not just about identi…
…
continue reading

1
Inside Volt Typhoon: China’s Silent Cyber Threat
34:02
34:02
Play later
Play later
Lists
Like
Liked
34:02What happens when a cyber threat actor doesn’t want to make headlines? Volt Typhoon, a state-sponsored group tied to the People’s Republic of China, has been quietly infiltrating Western critical infrastructure, staying under the radar by avoiding malware, using native tools, and taking things slow. In this episode of Threat Talks, Lieuwe Jan Konin…
…
continue reading

1
Cybercrime-as-a-Service: The Disney+ of the Dark Web
31:14
31:14
Play later
Play later
Lists
Like
Liked
31:14Dark Markets are making cybercrime more accessible than ever. Malware, remote access tools, phishing kits, credit cards information: all of it is readily available, and oftentimes available as a service, if you just know where to look. Subscribing to these illicit services is now as easy as signing up for Disney+. In this Deep Dive, host Rob Maas a…
…
continue reading

1
Inside the Dark Web Economy: $10 for Your Identity & Corporate Access?
37:57
37:57
Play later
Play later
Lists
Like
Liked
37:57The Dark Web Economy: Hacks for $10? Would you pay $10 for access to a corporate system? Because someone on the dark web already has. In this episode of Threat Talks, host Lieuwe Jan Koning talks to cybersecurity researcher Michele Campobasso about the business of cybercrime. From ransomware services to stolen credentials, the dark web is thriving.…
…
continue reading

1
Why Precision Time Matters in Cybersecurity | PTP vs NTP Explained
22:31
22:31
Play later
Play later
Lists
Like
Liked
22:31⏳ What happens when time goeswrong? Time synchronizationis an overlooked but essential part of cybersecurity. A few microseconds ofdrift can lead to failed transactions, inaccurate forensic logs, or evensecurity breaches. In this episode of ThreatTalks, host Rob Maas (Field CTO, ON2IT) and guest Jan van Boesschoten(Innovation Manager, AMS-IX) discu…
…
continue reading
Many organizations hesitate to implement SSL decryption due to concerns over complexity, privacy, and performance. However, the reality is that failing to decrypt means failing to see threats.In this Deep Dive, host Lieuwe Jan Koning and Rob Maas (Field CTO at ON2IT) explore why decrypting SSL traffic is critical for cybersecurity. Why is SSL decry…
…
continue reading

1
Intrusion Kill Chain: Stop Playing Defense with Rick Howard
28:23
28:23
Play later
Play later
Lists
Like
Liked
28:23Cybersecurity shouldn’t always be about playing defense – it can also be about disrupting attackers before they succeed. In this Deep Dive, host Lieuwe Jan Koning and cybersecurity expert Rick Howard break down the Intrusion Kill Chain and the strategic shift it introduced in the world of cybersecurity. How does the Intrusion Kill Chain flip the sc…
…
continue reading

1
Reboot of Strategy: Back to cybersecurity basics with Rick Howard
49:58
49:58
Play later
Play later
Lists
Like
Liked
49:58I think, therefore I am, is René Descartes’first principle. But how does that relate to cybersecurity? In this episode of Threat Talks, hostLieuwe Jan Koning is joined by Rick Howard – former Commander of the US Army’sComputer Emergency Response Team and former CSO of Palo Alto Networks – todiscuss the first principle of cybersecurity. ❓What’s the …
…
continue reading

1
The Rising Threat of Deepfakes - Threat Talks Cybersecurity Podcast
20:20
20:20
Play later
Play later
Lists
Like
Liked
20:20🚨 Can you still trust what you see? 🚨 Deepfakes aren’t just for entertainment anymore: they’re now an increasingly powerful tool for cybercriminals. With AI advancing rapidly, attackers can clone voices, fake identities, and manipulate live video in real time. In this episode of Threat Talks, we explore how deepfake scams have already cost companie…
…
continue reading

1
Post-Quantum Threat to Encryption: Are You Ready? - Threat Talks Cybersecurity Podcast
21:23
21:23
Play later
Play later
Lists
Like
Liked
21:23Quantum computing promises unprecedented computational power, but it also threatens the encryption standards we trust today. In this episode of Threat Talks, Jeroen Scheerder from ON2IT delves into post-quantum cryptography and answers key questions: What is Quantum Computing? Why does it challenge RSA and other encryption standards? What is Q-Day,…
…
continue reading

1
Breaking the Defenses: EDR Bypass - Threat Talks Cybersecurity Podcast
25:17
25:17
Play later
Play later
Lists
Like
Liked
25:17🔒 Are endpoint protection solutions enough to safeguard your organization? In this episode of Threat Talks – The Deep Dive, Rob Maas hosts Luca Cipriano, ON2IT’s Cyber Threat Specialist, to uncover the truth. Learn✅ The differences between AVs, EDRs, and XDRs ✅ Common bypass techniques used by attackers ✅ Why defense-in-depth and Zero Trust are mus…
…
continue reading

1
Inside the Hackers Mind with Tom van de Wiele - Threat Talks Cybersecurity Podcast
58:51
58:51
Play later
Play later
Lists
Like
Liked
58:51Ever wondered what it’s like to see cybersecurity through a hacker’s eyes? In this episode of Threat Talks, Lieuwe Jan Koning talks with Tom van der Wiele, ethical hacker and founder of Hacker Minded, about how cybercriminals operate and how businesses can defend themselves. 📌 What You’ll Learn: The psychology and strategies of hackers• How AI enha…
…
continue reading

1
Salt Typhoon: How Nine Telecom Providers were Compromised - Threat Talks Cybersecurity Podcast - Threat Talks Cybersecurity Podcast
29:53
29:53
Play later
Play later
Lists
Like
Liked
29:53Salt Typhoon: Inside the Coordinated Breach of Nine Telecom Providers A sweeping cyberattack, known as Salt Typhoon, has exposed the vulnerabilities of nine major telcos, leaving sensitive communications and surveillance data in the hands of attackers. How did this happen, and what lessons can we learn? In this Threat Talks Deep Dive, host Lieuwe J…
…
continue reading

1
ONCD: The Cyber Catalyst with Davis Hake - Threat Talks Cybersecurity Podcast
45:23
45:23
Play later
Play later
Lists
Like
Liked
45:23ONCD: The Cyber Catalyst with Davis Hake How can governments lead the charge in global cybersecurity efforts? In this compelling episode of Threat Talks, host Lieuwe Jan Koning sits down with returning guest Davis Hake, cybersecurity expert and advisor, to explore the critical role governments play in the cyber landscape. 👾 The ONCD’s mission and i…
…
continue reading

1
The State of Cybersecurity in the European Union with Hans de Vries - Threat Talks
38:21
38:21
Play later
Play later
Lists
Like
Liked
38:21The State of Cybersecurity in the European Union Cyber threats know no borders, and in the European Union, harmonizing cybersecurity efforts across 27 member states is no small feat. In this episode of Threat Talks, host Lieuwe Jan Koning speaks with Hans de Vries, Chief Cybersecurity and Operational Officer at ENISA, about the critical work being …
…
continue reading

1
Cyber Outlook 2025 - One Year of Threat Talks
41:43
41:43
Play later
Play later
Lists
Like
Liked
41:432025: The Year of AI and Cybersecurity Evolution Kick off 2025 with the latest insights from Threat Talks! In this episode, host Lieuwe Jan Koning sits down with Peter van Burgel, CEO of AMS-IX, to discuss how AI and cybersecurity are reshaping the landscape this year. 🚀 What’s inside this episode? 🔹 A sneak peek into AI advancements: Could we see …
…
continue reading

1
2024: The Breaking Point - One Year of Threat Talks
47:03
47:03
Play later
Play later
Lists
Like
Liked
47:03🎥 Threat Talks - One Year of Insights with Peter van Burgel, CEO of AMS-IXAs 2024 comes to a close, we’re celebrating a year of transformative conversations with a special edition of Threat Talks! Join Lieuwe Jan Koning and Peter van Burgel, CEO of AMS-IX, as they reflect on the past year’s most significant developments in cybersecurity and the les…
…
continue reading

1
Dutch Law Enforcement Data Breach - Threat Talks Cybersecurity Podcast
19:55
19:55
Play later
Play later
Lists
Like
Liked
19:55Imagine the names, job functions, email addresses and phone numbers of police officers, DAs, and even critical key witnesses being hacked and leaked to the public. This isn’t the opening to some spy novel – it’s what actually happened when the Dutch Law Enforcement suffered a serious data breach in September of this year. Initially reported as a br…
…
continue reading

1
Conti Ransomware Attack on Costarican Government - Threat Talks Cybersecurity Podcast
21:55
21:55
Play later
Play later
Lists
Like
Liked
21:55🌎 Conti Attack on Costa Rica: When Ransomware Halts a Nation 🌎 What happens when a ransomware group attacks an entire country? In this Threat Talk, we dive deep into the Conti ransomware attack that crippled the Costa Rican government. From healthcare systems shutting down to unpaid government salaries and even tax collection grinding to a halt—thi…
…
continue reading

1
MGM Resorts ALPHV/BlackCat Ransomware Attack - Threat Talks Cybersecurity Podcast
29:18
29:18
Play later
Play later
Lists
Like
Liked
29:18🎙 Threat Talks: Unpacking the MGM Resorts ALPHV/BlackCat Ransomware Attack 🕵️♂️ In this Threat Talk, we dive deep into a cybersecurity incident in 2023: the MGM Resorts ransomware attack by ALPHV/BlackCat and Scattered Spider. From sophisticated social engineering tactics to deploying a shadow identity provider for persistence, this attack demonst…
…
continue reading

1
Prevent, Pay or Insure - Threat Talks Cybersecurity Podcast
58:25
58:25
Play later
Play later
Lists
Like
Liked
58:25💰Prevent, Pay or Insure? 💰 Days before MGM’s computer systems were taken down in a cyberattack, fellow casino operator Caesars paid a $15 million ransom to attackers who infiltrated its systems. MGM chose not to pay and dealt with different costs because of it - did the two casino giants wind up paying similar amounts down the line? And what role d…
…
continue reading

1
UNIX CUPS Remote Code Execution - The Fallacy of Default Trust - Threat Talks Cybersecurity Podcast
20:32
20:32
Play later
Play later
Lists
Like
Liked
20:32"Hello! I'm a Printer! Please Let Me In!" “Hello! I’m a printer! Please let me enter, thank you!” – It may sound absurd, but this is how attackers can trick your Linux systems through the cups-browsed service.. In this latest Threat Talk, Lieuwe-Jan Koning reveals, with ON2IT’s Rob Maas and Luca Cipriano how a seemingly harmless printer can turn in…
…
continue reading

1
XZ Utils Critical Backdoor (CVE- 2024-3094) - The Fallacy of Secure Open Source Code
29:36
29:36
Play later
Play later
Lists
Like
Liked
29:36⏰ How much time would you spend on executing the perfect hack? ⏰ The user going by the name of ‘JIAT75’ spent almost three years infiltrating and contributing to a GitHub repo for one singular reason – access to release manager rights for the next XZ Utils update. In this episode of Threat Talks, host Lieuwe Jan Koning is joined by Thomas Manolis, …
…
continue reading

1
CrowdStrike Auto-Update Disaster - Threat Talks Cybersecurity Podcast
22:33
22:33
Play later
Play later
Lists
Like
Liked
22:33☠️ CrowdStrike: 8.5 million blue screens of death ☠️ Did you know that last July’s CrowdStrike outage led to closed airports, inaccessible bank accounts and hospitals that were only delivering emergency care that did not require any computers? In this Threat Talk, Lieuwe Jan Koning is joined by Rob Maas and Jeroen Scheerder as they discuss the Crow…
…
continue reading

1
Breaking the Illusion: Exposing Security Fallacies - Threat Talks Cybersecurity Podcast
53:32
53:32
Play later
Play later
Lists
Like
Liked
53:32🔍 Breaking the Illusion: Confronting Cybersecurity’s Biggest Fallacies 🔍 Think you know the route a hacker might take? Thinkagain! In this eye-opening Threat Talk, Lieuwe Jan Koning dives into the critical fallacies of cybersecurity with top experts Fleur van Leusden, CISO and host of CISO Praat, and Jeroen Scheerder. ✨ Fleur unpacks one of the ind…
…
continue reading

1
Binance BNB Smartchain Attack - Deep Dive - Threat Talks Cybersecurity Podcast
26:02
26:02
Play later
Play later
Lists
Like
Liked
26:02Imagine creating millions in cryptocurrency…without spending a cent. 💸 🔍 Explore the Binance BNB Chain Attack, where attackers used cross-chain bridges to create crypto assets out of thin air. 👾 Dive into the exploit’s details, from blockchain’s cryptographic structures to vulnerabilities in cross-chain transfers. With breakdowns of Merkle trees an…
…
continue reading

1
Hack the Boat Ballast System - Deep Dive - Threat Talks Cybersecurity Podcast
25:06
25:06
Play later
Play later
Lists
Like
Liked
25:06𝐄𝐯𝐞𝐫 𝐛𝐞𝐞𝐧 𝐚𝐬𝐤𝐞𝐝 𝐭𝐨 𝐡𝐚𝐜𝐤 𝐚 𝐛𝐨𝐚𝐭?When Luca Cipriano and Jeroen Scheerder were given the challenge, they took an unexpected approach—step one: build the boat themselves.It was a scale model, but they made sure it closely mirrored a real boat’s systems. With help from Damen Shipyards engineers, they even included a working ballast system.Of course the …
…
continue reading

1
Securing AIS - Deep Dive - Threat Talks Cybersecurity Podcast
19:55
19:55
Play later
Play later
Lists
Like
Liked
19:55AIS (Advanced Identification System) is a key tool in maritime navigation. It helps ships transmit their location and data to other vessels and satellites, preventing collisions and supporting rescue operations. 🛟 It’s a crucial technology for navigating 🗺️ the unpredictable oceans 🌊 —but it’s not without its vulnerabilities. 🏴☠️ Pirates can use A…
…
continue reading