<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>All AT&amp;T Users Affected - ThreatWire</title>
        <link>https://stream.echo6.co/videos/watch/b706f1b3-8be5-4ee8-9981-95ec1e2c68f2</link>
        <description>⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️ @endingwithali → Twitch: https://twitch.tv/endingwithali Twitter: https://twitter.com/endingwithali YouTube: https://youtube.com/@endingwithali Everywhere else: https://links.ali.dev Want to work with Ali? endingwithalicollabs@gmail.com [❗] Join the Patreon→ https://patreon.com/threatwire 0:00  0 - Intro 00:11 1 - GitLab CI/CD Vulnerability 00:48 2 - Signal Plain Text Encryption Key 02:23 3 - SeigedSec is Shutting Down 03:36 4 - AT&amp;T Data Breach 06:54 5 - Outro LINKS 🔗 Story 1: GitLab CI/CD Vulnerability https://about.gitlab.com/releases/2024/07/10/patch-release-gitlab-17-1-2-released/ https://www.darkreading.com/application-security/-gitlab-sends-users-scrambling-again-with-new-ci-cd-pipeline-takeover-vuln 🔗 Story 2: Signal Plain Text Encryption Key https://www.bleepingcomputer.com/news/security/signal-downplays-encryption-key-flaw-fixes-it-after-x-drama/ https://x.com/mysk_co/status/1809287118235070662 https://github.com/signalapp/Signal-Desktop/pull/6849#issuecomment-2218845070 🔗 Story 3: SeigedSec is Shutting Down https://www.dailydot.com/debug/heritage-foundation-hack-sieged-sec-chat-log-retirement/ https://www.theregister.com/2024/07/12/gay_furry_hackers_2025/ https://cyberscoop.com/hackvists-release-two-gigabytes-of-heritage-foundation-data/ https://x.com/Komrade5738/status/1811157725696463086 🔗 Story 4: AT&amp;T Data Breach https://www.sec.gov/ix?doc=/Archives/edgar/data/0000732717/000073271724000046/t-20240506.htm https://www.wired.com/story/atandt-paid-hacker-300000-to-delete-stolen-call-records/ https://arstechnica.com/tech-policy/2024/07/nearly-all-att-subscribers-call-records-stolen-in-snowflake-cloud-hack/ https://www.cnn.com/2024/07/12/business/att-customers-massive-breach/index.html https://www.att.com/support/article/my-account/000102979?cjevent=4094868642bb11ef821d01fc0a82b820&amp;source=EC1NAT10600aff12A&amp;wtExtndSource=100095187 -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Our Site → https://www.hak5.org Shop →  http://hakshop.myshopify.com/ Community → https://www.hak5.org/community Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1 Support → https://www.patreon.com/threatwire Contact Us → http://www.twitter.com/hak5 Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.</description>
        <lastBuildDate>Wed, 15 Apr 2026 11:43:08 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>All AT&amp;T Users Affected - ThreatWire</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/videos/watch/b706f1b3-8be5-4ee8-9981-95ec1e2c68f2</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/video-comments.xml?videoId=b706f1b3-8be5-4ee8-9981-95ec1e2c68f2" rel="self" type="application/rss+xml"/>
    </channel>
</rss>