<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>WPA3 Passwords Still Vulnerable To Hacks, Capital One Hack Breakdown - ThreatWire</title>
        <link>https://stream.echo6.co/videos/watch/40aa5b83-df06-4741-96eb-eb335dcae479</link>
        <description>Hak5 -- Cyber Security Education, Inspiration, News &amp; Community since 2005: Everything we know about the Capital One breach, WPA3 is still vulnerable to hacks, and US utility companies are targeted in attacks! All that coming up now on ThreatWire. #threatwire #hak5 Links: Support me on alternative platforms! https://snubsie.com/support https://www.youtube.com/shannonmorse --  subscribe to my new channel! ThreatWire is only possible because of our Patreon patrons! https://www.patreon.com/threatwire Links: Capital One https://www.cyberscoop.com/capital-one-cybersecurity-data-breach-what-went-wrong/ https://www.prnewswire.com/news-releases/capital-one-announces-data-security-incident-300892738.html https://krebsonsecurity.com/2019/08/what-we-can-learn-from-the-capital-one-hack/ https://www.capitalone.com/applications/responsible-disclosure/ https://www.justice.gov/usao-wdwa/press-release/file/1188626/download https://techcrunch.com/2019/07/31/capital-one-breach-vodafone-ford-researchers/ https://www.scribd.com/document/420587413/GitHub-CapitalOne-Complaint https://www.cyberscoop.com/capital-one-data-breach-credit-freeze-credit-cards/ WPA3 Hacking https://www.zdnet.com/article/dragonblood-vulnerabilities-disclosed-in-wifi-wpa3-standard/ https://www.zdnet.com/article/new-dragonblood-vulnerabilities-found-in-wifi-wpa3-standard/ https://thehackernews.com/2019/08/hack-wpa3-wifi-password.html https://wpa3.mathyvanhoef.com/#new https://eprint.iacr.org/2019/383.pdf US Utilities targeted in hack https://www.proofpoint.com/us/threat-insight/post/lookback-malware-targets-united-states-utilities-sector-phishing-attacks https://arstechnica.com/information-technology/2019/08/new-advanced-malware-possibly-nation-sponsored-is-targeting-us-utilities/ https://www.zdnet.com/article/suspected-state-sponsored-hacking-group-tried-to-break-into-us-utilities/ https://www.cyberscoop.com/apt-10-utilities-phishing-proofpoint/ -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Our Site → https://www.hak5.org Shop →  https://www.hakshop.com Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1 Support → https://www.patreon.com/threatwire Contact Us → http://www.twitter.com/hak5 Threat Wire RSS → https://shannonmorse.podbean.com/feed/ Threat Wire iTunes → https://itunes.apple.com/us/podcast/threat-wire/id1197048999 Host: Shannon Morse → https://www.twitter.com/snubs Host: Darren Kitchen → https://www.twitter.com/hak5darren Host: Mubix → http://www.twitter.com/mubix -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Photo credit: https://upload.wikimedia.org/wikipedia/commons/0/03/Sympetrum_flaveolum_-side%28aka%29.jpg Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.</description>
        <lastBuildDate>Wed, 15 Apr 2026 11:42:35 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>WPA3 Passwords Still Vulnerable To Hacks, Capital One Hack Breakdown - ThreatWire</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/videos/watch/40aa5b83-df06-4741-96eb-eb335dcae479</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/video-comments.xml?videoId=40aa5b83-df06-4741-96eb-eb335dcae479" rel="self" type="application/rss+xml"/>
    </channel>
</rss>