Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Threat Talks. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Threat Talks or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Salt Typhoon: How Nine Telecom Providers were Compromised - Threat Talks Cybersecurity Podcast - Threat Talks Cybersecurity Podcast

29:53
 
Share
 

Manage episode 499549366 series 3682930
Content provided by Threat Talks. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Threat Talks or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Salt Typhoon: Inside the Coordinated Breach of Nine Telecom Providers

A sweeping cyberattack, known as Salt Typhoon, has exposed the vulnerabilities of nine major telcos, leaving sensitive communications and surveillance data in the hands of attackers. How did this happen, and what lessons can we learn?

In this Threat Talks Deep Dive, host Lieuwe Jan Koning teams up with ON2IT’s Rob Maas (Field CTO) and Jeroen Scheerder (Security Researcher) to dissect every aspect of this high-profile breach.

🔍 What you’ll learn:

  • How attackers exploited known vulnerabilities in Exchange servers, VPNs, and firewalls to infiltrate systems.
  • The risks associated with lawful interception systems and the exposure of call detail records (CDRs).
  • Why legacy infrastructure remains a significant cybersecurity challenge for telecom providers.
  • Actionable steps organizations can take to enhance defenses, including segmentation, behavioral monitoring, and Zero Trust frameworks.

This episode dives into the attack’s technical anatomy, discusses its implications for both governments and private organizations, and explores how individuals can secure their communications in an era of increasing surveillance.

Join us to understand how Salt Typhoon unfolded—and what it means for the future of telecom security.

🔔 Follow and Support our channel! 🔔 === ► YOUTUBE: https://youtube.com/@ThreatTalks ► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E ► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520 👕 Receive your Threat Talks T-shirt https://threat-talks.com/salt-typhoon-how-nine-telcos-were-compromised/ 🗺️ Explore the Hack's Route in Detail 🗺️ https://threat-talks.com/downloads/

🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX

  continue reading

90 episodes

Artwork
iconShare
 
Manage episode 499549366 series 3682930
Content provided by Threat Talks. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Threat Talks or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Salt Typhoon: Inside the Coordinated Breach of Nine Telecom Providers

A sweeping cyberattack, known as Salt Typhoon, has exposed the vulnerabilities of nine major telcos, leaving sensitive communications and surveillance data in the hands of attackers. How did this happen, and what lessons can we learn?

In this Threat Talks Deep Dive, host Lieuwe Jan Koning teams up with ON2IT’s Rob Maas (Field CTO) and Jeroen Scheerder (Security Researcher) to dissect every aspect of this high-profile breach.

🔍 What you’ll learn:

  • How attackers exploited known vulnerabilities in Exchange servers, VPNs, and firewalls to infiltrate systems.
  • The risks associated with lawful interception systems and the exposure of call detail records (CDRs).
  • Why legacy infrastructure remains a significant cybersecurity challenge for telecom providers.
  • Actionable steps organizations can take to enhance defenses, including segmentation, behavioral monitoring, and Zero Trust frameworks.

This episode dives into the attack’s technical anatomy, discusses its implications for both governments and private organizations, and explores how individuals can secure their communications in an era of increasing surveillance.

Join us to understand how Salt Typhoon unfolded—and what it means for the future of telecom security.

🔔 Follow and Support our channel! 🔔 === ► YOUTUBE: https://youtube.com/@ThreatTalks ► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E ► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520 👕 Receive your Threat Talks T-shirt https://threat-talks.com/salt-typhoon-how-nine-telcos-were-compromised/ 🗺️ Explore the Hack's Route in Detail 🗺️ https://threat-talks.com/downloads/

🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX

  continue reading

90 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play