<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Apple’s Accidental Stalkerware - ThreatWire</title>
        <link>https://stream.echo6.co/videos/watch/b57005cc-c954-4bfe-b536-769c443f28da</link>
        <description>⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️ @endingwithali → Twitch: https://twitch.tv/endingwithali Twitter: https://twitter.com/endingwithali YouTube: https://youtube.com/@endingwithali Everywhere else: https://links.ali.dev Want to work with Ali? endingwithalicollabs@gmail.com [❗] Join the Patreon→ https://patreon.com/threatwire 0:00 Intro 00:10 1 - GitHub Enterprise Authentication Bypass 01:10 2 - Apple’s Accidental Stalkerware 03:55 3 - New DNSBomb Attack 06:16 4 - Outro LINKS 🔗 Story 1: https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.15 https://www.darkreading.com/vulnerabilities-threats/github-authentication-bypass-opens-enterprise-server-attackers 🔗 Story 2: Apple’s Accidental Stalkerware https://www.theregister.com/2024/05/23/apple_wifi_positioning_system/ https://www.govinfosecurity.com/surveillance-risk-apples-wifi-based-positioning-system-a-25330 https://krebsonsecurity.com/2024/05/why-your-wi-fi-router-doubles-as-an-apple-airtag/ https://cybersecuritynews.com/apples-wi-fi-positioning-system/ https://www.cs.umd.edu/~dml/papers/wifi-surveillance-sp24.pdf 🔗 Story 3: New DNSBomb Attack https://dnsbomb.net/ https://cybersecuritynews.com/new-dos-attack-dnsbomb-exploiting/ -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Our Site → https://www.hak5.org Shop →  http://hakshop.myshopify.com/ Community → https://www.hak5.org/community Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1 Support → https://www.patreon.com/threatwire Contact Us → http://www.twitter.com/hak5 Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.</description>
        <lastBuildDate>Wed, 15 Apr 2026 13:45:50 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>Apple’s Accidental Stalkerware - ThreatWire</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/videos/watch/b57005cc-c954-4bfe-b536-769c443f28da</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/video-comments.xml?videoId=b57005cc-c954-4bfe-b536-769c443f28da" rel="self" type="application/rss+xml"/>
    </channel>
</rss>