Threat Talks - Your Gateway to Cybersecurity Insights

Salt Typhoon: Inside the Coordinated Breach of Nine Telecom Providers

A sweeping cyberattack, known as Salt Typhoon, has exposed the vulnerabilities of nine major telcos, leaving sensitive communications and surveillance data in the hands of attackers. How did this happen, and what lessons can we learn?

In this Threat Talks Deep Dive, host Lieuwe Jan Koning teams up with ON2IT’s Rob Maas (Field CTO) and Jeroen Scheerder (Security Researcher) to dissect every aspect of this high-profile breach.

🔍 What you’ll learn:

How attackers exploited known vulnerabilities in Exchange servers, VPNs, and firewalls to infiltrate systems.
The risks associated with lawful interception systems and the exposure of call detail records (CDRs).
Why legacy infrastructure remains a significant cybersecurity challenge for telecom providers.
Actionable steps organizations can take to enhance defenses, including segmentation, behavioral monitoring, and Zero Trust frameworks.

This episode dives into the attack’s technical anatomy, discusses its implications for both governments and private organizations, and explores how individuals can secure their communications in an era of increasing surveillance.
Join us to understand how Salt Typhoon unfolded—and what it means for the future of telecom security.

🔔 Follow and Support our channel! 🔔
===
► YOUTUBE: https://youtube.com/@ThreatTalks
► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E
► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520

👕 Receive your Threat Talks T-shirt
https://threat-talks.com/salt-typhoon-how-nine-telcos-were-compromised/

🗺️ Explore the Hack's Route in Detail 🗺️
https://threat-talks.com/downloads/

🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX

Show Notes

Salt Typhoon: Inside the Coordinated Breach of Nine Telecom Providers

A sweeping cyberattack, known as Salt Typhoon, has exposed the vulnerabilities of nine major telcos, leaving sensitive communications and surveillance data in the hands of attackers. How did this happen, and what lessons can we learn?

In this Threat Talks Deep Dive, host Lieuwe Jan Koning teams up with ON2IT’s Rob Maas (Field CTO) and Jeroen Scheerder (Security Researcher) to dissect every aspect of this high-profile breach.

🔍 What you’ll learn:

  • How attackers exploited known vulnerabilities in Exchange servers, VPNs, and firewalls to infiltrate systems.
  • The risks associated with lawful interception systems and the exposure of call detail records (CDRs).
  • Why legacy infrastructure remains a significant cybersecurity challenge for telecom providers.
  • Actionable steps organizations can take to enhance defenses, including segmentation, behavioral monitoring, and Zero Trust frameworks.


This episode dives into the attack’s technical anatomy, discusses its implications for both governments and private organizations, and explores how individuals can secure their communications in an era of increasing surveillance.

Join us to understand how Salt Typhoon unfolded—and what it means for the future of telecom security.

🔔 Follow and Support our channel! 🔔 === ► YOUTUBE: https://youtube.com/@ThreatTalks ► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E ► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520 👕 Receive your Threat Talks T-shirt https://threat-talks.com/salt-typhoon-how-nine-telcos-were-compromised/ 🗺️ Explore the Hack's Route in Detail 🗺️ https://threat-talks.com/downloads/

🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX

What is Threat Talks - Your Gateway to Cybersecurity Insights?

Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats.

We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals.

Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and stay secure!