<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>CISA Director Uploaded Documents to ChatGPT - Threat Wire</title>
        <link>https://stream.echo6.co/videos/watch/6ce7a53e-1629-4336-8d59-4f68417e6c49</link>
        <description>⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️ @endingwithali → Twitch: https://twitch.tv/endingwithali Twitter: https://twitter.com/endingwithali YouTube: https://youtube.com/@endingwithali Everywhere else: https://links.ali.dev Want to work with Ali? endingwithalicollabs@gmail.com [❗] Join the Patreon→ https://patreon.com/threatwire 00:00  0 - Intro 00:00:15 - Big Tech Makes Moves to Secure 00:02:55  - Google Engineer Tried Stealing 00:05:04  - Backdoor Delivered by Infrastructure Vuln 00:06:18  - Ingress Nginx End of Life Alarms 00:08:07  - DDoSecrets Has Changed Domains 00:08:35  - Other Stories 00:09:51  - Comment Section 00:11:08  - Outro LINKS 🔗 Story 1: Big Tech Makes Moves to Secure https://blog.whatsapp.com/whatsapps-latest-privacy-protection-strict-account-settings https://www.bleepingcomputer.com/news/apple/new-apple-privacy-feature-limits-location-tracking-on-iphones-ipads/ https://techcommunity.microsoft.com/blog/windows-itpro-blog/advancing-windows-security-disabling-ntlm-by-default/4489526 https://www.bleepingcomputer.com/news/security/whatsapp-gets-new-lockdown-feature-that-blocks-cyberattacks/ 🔗 Story 2: Google Engineer Tried Stealing https://www.bleepingcomputer.com/news/security/us-convicts-ex-google-engineer-for-sending-ai-tech-data-to-china/ https://thehackernews.com/2026/01/ex-google-engineer-convicted-for.html 🔗 Story 3: Backdoor Delivered by Infrastructure Vuln https://www.rapid7.com/blog/post/tr-chrysalis-backdoor-dive-into-lotus-blossoms-toolkit/ https://thehackernews.com/2026/02/notepad-official-update-mechanism.html https://notepad-plus-plus.org/news/hijacked-incident-info-update/ 🔗 Story 4: Ingress Nginx End of Life Alarms https://kubernetes.io/blog/2026/01/29/ingress-nginx-statement/ https://en.wikipedia.org/wiki/XZ_Utils_backdoor 🔗 Story 5: DDoSecrets Has Changed Domains https://ddosecrets.org/article/important-notice-ddosecrets-domain-change https://en.wikipedia.org/wiki/XZ_Utils_backdoor 🔗 Story 6: Other Stories https://www.bleepingcomputer.com/news/security/match-group-breach-exposes-data-from-hinge-tinder-okcupid-and-match/ https://www.bleepingcomputer.com/news/security/hackers-breach-fortinet-fortigate-devices-steal-firewall-configs/ https://cybersecuritynews.com/openclaw-ai-instances-exposed/ https://www.paloaltonetworks.com/blog/network-security/why-moltbot-may-signal-ai-crisis/ https://www.malwarebytes.com/blog/threat-intel/2026/01/clawdbots-rename-to-moltbot-sparks-impersonation-campaign -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Our Site → https://www.hak5.org Shop →  http://hakshop.myshopify.com/ Community → https://www.hak5.org/community Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1 Support → https://www.patreon.com/threatwire Contact Us → http://www.twitter.com/hak5 Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.</description>
        <lastBuildDate>Wed, 15 Apr 2026 09:27:44 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>CISA Director Uploaded Documents to ChatGPT - Threat Wire</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/videos/watch/6ce7a53e-1629-4336-8d59-4f68417e6c49</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/video-comments.xml?videoId=6ce7a53e-1629-4336-8d59-4f68417e6c49" rel="self" type="application/rss+xml"/>
    </channel>
</rss>