<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Restaurant POS Hacks, DNS Cache Poisoning is Back!, Hackers Target Covid Vaccine Orgs  - ThreatWire</title>
        <link>https://stream.echo6.co/videos/watch/6de1e35c-3f60-4bbf-ba78-d740ba799ec1</link>
        <description>Hak5 -- Cyber Security Education, Inspiration, News &amp; Community since 2005: DNS Cache Poisoning is back, POS systems are vulnerable to a new attack, and New Hacks are Targeting COVID-19 Vaccine Organizations! All that coming up now on ThreatWire. #threatwire #hak5 Links: Watch this on youtube: https://youtu.be/Br4_Ez-ONCc Support me on alternative platforms! https://snubsie.com/support Shop ThreatWire Merch Directly! - https://snubsie.com/shop Shop ThreatWire Merch on Teespring! - https://teespring.com/stores/morsecode Join now for access to extra perks and to support ThreatWire!  https://www.patreon.com/threatwire Links: Sad DNS: https://www.zdnet.com/article/how-opendns-powerdns-and-maradns-remained-unaffected-by-the-dns-cache-poisoning-vulnerability/ https://789498207.www.saddns.net/ https://arstechnica.com/information-technology/2020/11/researchers-find-way-to-revive-kaminskys-2008-dns-cache-poisoning-attack/ https://thehackernews.com/2020/11/sad-dns-new-flaws-re-enable-dns-cache.html https://www.zdnet.com/article/dns-cache-poisoning-poised-for-a-comeback-sad-dns/ POS Malware: https://www.welivesecurity.com/2020/11/12/hungry-data-modpipe-backdoor-hits-pos-software-hospitality-sector/ https://www.oracle.com/industries/food-beverage/products/res-3700/ https://thehackernews.com/2020/11/new-modpipe-point-of-sale-pos-malware.html https://www.zdnet.com/article/new-modpipe-malware-targets-hospitality-hotel-point-of-sale-systems/ https://www.cyberscoop.com/point-of-sale-backdoor-modpipe-eset/ Covid19 attacks: https://blogs.microsoft.com/on-the-issues/2020/11/13/health-care-cyberattacks-covid-19-paris-peace-forum/ https://arstechnica.com/information-technology/2020/11/hackers-sponsored-by-russia-and-north-korea-are-targeting-covid-19-researchers/ https://www.cnet.com/news/russian-and-north-korean-hackers-are-targeting-covid-19-vaccine-researchers/ https://threatpost.com/russia-north-korea-attacking-covid-19-vaccine-makers/161205/ https://www.zdnet.com/article/microsoft-says-three-apts-have-targeted-seven-covid-19-vaccine-makers/ Photo credit: https://posquote.com/wp-content/uploads/2019/06/restaurant-pos-systems.jpg -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Our Site → https://www.hak5.org Shop →  https://www.hakshop.com Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1 Support → https://www.patreon.com/threatwire Contact Us → http://www.twitter.com/hak5 Threat Wire RSS → https://shannonmorse.podbean.com/feed/ Threat Wire iTunes → https://itunes.apple.com/us/podcast/threat-wire/id1197048999 Host: Shannon Morse → https://www.twitter.com/snubs Host: Darren Kitchen → https://www.twitter.com/hak5darren Host: Mubix → http://www.twitter.com/mubix -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.</description>
        <lastBuildDate>Wed, 15 Apr 2026 11:44:35 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>Restaurant POS Hacks, DNS Cache Poisoning is Back!, Hackers Target Covid Vaccine Orgs  - ThreatWire</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/videos/watch/6de1e35c-3f60-4bbf-ba78-d740ba799ec1</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/video-comments.xml?videoId=6de1e35c-3f60-4bbf-ba78-d740ba799ec1" rel="self" type="application/rss+xml"/>
    </channel>
</rss>