<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Android Zero Day Actively Exploited In the Wild! - ThreatWire</title>
        <link>https://stream.echo6.co/videos/watch/b61fc213-222c-4725-b8a5-d254273e5b7e</link>
        <description>Hak5 -- Cyber Security Education, Inspiration, News &amp; Community since 2005: Governments want Facebook to delay further encryption, Signal fixes a snooping exploit, and An Android Zero Day is being used in the wild! All that coming up now on ThreatWire. #threatwire #hak5 Links: Support me on alternative platforms! https://snubsie.com/support https://www.youtube.com/shannonmorse --  subscribe to my new channel! ThreatWire is only possible because of our Patreon patrons! https://www.patreon.com/threatwire Links: https://www.buzzfeednews.com/article/ryanmac/bill-barr-facebook-letter-halt-encryption https://www.facebook.com/notes/mark-zuckerberg/a-privacy-focused-vision-for-social-networking/10156700570096634/ https://www.cnet.com/news/the-uss-renewed-calls-for-backdoor-access-to-encryption-has-all-the-same-flaws/ https://www.cyberscoop.com/facebook-encryption-william-barr-letter/ https://threatpost.com/ag-barr-facebook-dont-encrypt-messaging/148913/ https://www.cnet.com/news/governments-call-on-facebook-to-pause-encryption-efforts/ https://www.zdnet.com/article/signal-fixes-facetime-like-eavesdropping-bug/ https://bugs.chromium.org/p/project-zero/issues/detail?id=1943 https://www.vice.com/en_us/article/3kx7n8/signal-bug-could-have-let-hackers-listen-to-android-users-via-microphone https://thehackernews.com/2019/10/signal-messenger-bug.html https://bugs.chromium.org/p/project-zero/issues/detail?id=1942 https://www.zdnet.com/article/google-finds-android-zero-day-impacting-pixel-samsung-huawei-xiaomi-devices/ https://thehackernews.com/2019/10/android-kernel-vulnerability.html https://threatpost.com/google-warns-of-zero-day/148924/ https://www.cnet.com/news/android-exploit-leaves-some-pixel-galaxy-phones-vulnerable-to-hacks/ https://arstechnica.com/information-technology/2019/10/attackers-exploit-0day-vulnerability-that-gives-full-control-of-android-phones/ Photo credit: https://i.gadgets360cdn.com/large/google_android_reuters_1557489952979.JPG?output-quality=80 -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Our Site → https://www.hak5.org Shop →  https://www.hakshop.com Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1 Support → https://www.patreon.com/threatwire Contact Us → http://www.twitter.com/hak5 Threat Wire RSS → https://shannonmorse.podbean.com/feed/ Threat Wire iTunes → https://itunes.apple.com/us/podcast/threat-wire/id1197048999 Host: Shannon Morse → https://www.twitter.com/snubs Host: Darren Kitchen → https://www.twitter.com/hak5darren Host: Mubix → http://www.twitter.com/mubix -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.</description>
        <lastBuildDate>Mon, 13 Apr 2026 20:33:20 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>Android Zero Day Actively Exploited In the Wild! - ThreatWire</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/videos/watch/b61fc213-222c-4725-b8a5-d254273e5b7e</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/video-comments.xml?videoId=b61fc213-222c-4725-b8a5-d254273e5b7e" rel="self" type="application/rss+xml"/>
    </channel>
</rss>