<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Finally, a Golang Supply Chain Attack - ThreatWire</title>
        <link>https://stream.echo6.co/videos/watch/377b9d9c-f7e4-4c57-abbc-42b6f9412712</link>
        <description>⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️ @endingwithali → Twitch: https://twitch.tv/endingwithali Twitter: https://twitter.com/endingwithali YouTube: https://youtube.com/@endingwithali Everywhere else: https://links.ali.dev Want to work with Ali? endingwithalicollabs@gmail.com [❗] Join the Patreon→ https://patreon.com/threatwire 0:00  0 - Intro 00:17 1 - DOGE Hacked 01:12 2 - New PAN-OS 0 Day Discovered 02:13 3 - iPhone Cable Bypass 03:07 4 - Non-Python Supply Chain Attack 04:37 5 - Outro LINKS 🔗 Story 1: DOGE Hacked https://www.404media.co/anyone-can-push-updates-to-the-doge-gov-website-2/ 🔗 Story 2:  New PAN-OS 0 Day Discovered https://securityadvisories.paloaltonetworks.com/CVE-2025-0108 https://thehackernews.com/2025/02/palo-alto-networks-patches.html https://www.assetnote.io/resources/research/nginx-apache-path-confusion-to-auth-bypass-in-pan-os 🔗 Story 3: iPhone Cable Bypass https://techcrunch.com/2025/02/10/apple-fixes-iphone-and-ipad-bug-used-in-an-extremely-sophisticated-attack/ https://support.apple.com/en-us/122174 🔗 Story 4: A Non-Python Supply Chain Attack https://socket.dev/blog/malicious-package-exploits-go-module-proxy-caching-for-persistence -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Our Site → https://www.hak5.org Shop →  http://hakshop.myshopify.com/ Community → https://www.hak5.org/community Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1 Support → https://www.patreon.com/threatwire Contact Us → http://www.twitter.com/hak5 Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.</description>
        <lastBuildDate>Mon, 13 Apr 2026 20:41:48 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>Finally, a Golang Supply Chain Attack - ThreatWire</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/videos/watch/377b9d9c-f7e4-4c57-abbc-42b6f9412712</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/video-comments.xml?videoId=377b9d9c-f7e4-4c57-abbc-42b6f9412712" rel="self" type="application/rss+xml"/>
    </channel>
</rss>