Listen "Deep Dive - APT Sand Eagle"
Episode Synopsis
๐๐ฌ ๐ญ๐ก๐ ๐๐๐ง๐ ๐๐๐ ๐ฅ๐ ๐๐๐ ๐ญ๐ก๐ ๐๐๐ฌ๐จ๐ง ๐๐จ๐ฎ๐ซ๐ง๐ ๐จ๐ ๐๐ฒ๐๐๐ซ-๐๐ญ๐ญ๐๐๐ค๐ฌ? ๐ถ๏ธ
ย
Just as Bourne eluded the most advanced surveillance and security systems in the world, the Sand Eagle APT made headlines ๐ฐ for its ability to infiltrate and bypass layers of digital defense on supposedly the most secure devices on the market โ iPhones. ๐ฑ
From exploiting legacy system vulnerabilities to the use of advanced return-oriented programming, this APT made use of not one, not two, but four zero-days to reach its goal โ cyber espionage.Host Lieuwe Jan Koning is joined by Martijn Peijer (Cybersecurity Expert SOC at the Dutch Tax Office) and Rob Maas (Field CTO at ON2IT) for this break down on how this threat operated undetected for so long, what the goal was and the immense resources likely involved in its development.
๐ง ๐๐ฎ๐ง๐ ๐ข๐ง ๐ญ๐จ ๐๐ฉ๐ข๐ฌ๐จ๐๐ 32 ๐จ๐ ๐๐ก๐ซ๐๐๐ญ ๐๐๐ฅ๐ค๐ฌ! ๐ง
ย
๐ Find our infographics and receive your
own ๐ Threat Talks T-shirt: threat-talks.com ย
ย
๐ต๏ธ Threat Talks is a collaboration between ON2IT and AMS-IX
#cybersecurityexperts #threatintelligence #zeroday #threattalks
More episodes of the podcast Threat Talks - Your Gateway to Cybersecurity Insights
WSUS RCE: Update Weaponized
16/12/2025
From Hacker to Hero
03/12/2025
The Npm Worm Outbreak
25/11/2025
Inside the SalesLoft Breach
18/11/2025
The Secret Diplomats Fighting Cyber Wars
04/11/2025
Patch Smarter, Not Harder
28/10/2025
Why Your Cyber Hygiene Matters?
14/10/2025
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.