<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Stealing Data from Air-Gapped PCs using PSUs as Speakers - ThreatWire</title>
        <link>https://stream.echo6.co/videos/watch/bb0ad535-3619-4454-b6ee-47b0beabb500</link>
        <description>Hak5 -- Cyber Security Education, Inspiration, News &amp; Community since 2005: Attackers are Accessing Data Centers Using a Salt Bug, Turning PSUs Into Speakers To Steal Data, and the new lockbit ransomware starts gaining traction! All that coming up now on ThreatWire. #threatwire #hak5 Links: Support me on alternative platforms! https://snubsie.com/support Shop ThreatWire Merch! - https://snubsie.com/shop https://www.youtube.com/shannonmorse --  subscribe to my tech channel! ThreatWire is only possible because of our Patreon patrons! https://www.patreon.com/threatwire Check out my new video about the last active Morse Code Radio Station in the US - https://www.youtube.com/watch?v=UPTzvciqgJ0 Links: https://threatpost.com/salt-bugs-full-rce-root-cloud-servers/155383/ https://labs.f-secure.com/advisories/saltstack-authorization-bypass https://www.zdnet.com/article/saltstack-salt-critical-bugs-allow-data-center-cloud-server-hijacking-as-root/ https://thehackernews.com/2020/05/saltstack-rce-exploit.html https://www.zdnet.com/article/ghost-blogging-platform-servers-hacked-and-infected-with-crypto-miner/ https://arxiv.org/abs/2005.00395 https://thehackernews.com/2020/05/air-gap-malware-power-speaker.html https://www.zdnet.com/article/academics-turn-pc-power-unit-into-a-speaker-to-leak-secrets-from-air-gapped-systems/ https://arstechnica.com/information-technology/2020/05/lockbit-the-new-ransomware-for-hire-a-sad-and-cautionary-tale/ https://news.sophos.com/en-us/2020/04/24/lockbit-ransomware-borrows-tricks-to-keep-up-with-revil-and-maze/ https://www.wired.com/story/lockbit-is-the-new-ransomware-for-hire/ https://www.mcafee.com/blogs/other-blogs/mcafee-labs/tales-from-the-trenches-a-lockbit-ransomware-story/ Photo credit: https://upload.wikimedia.org/wikipedia/commons/2/24/OCZ_600W_power_supply_unit.JPG -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Our Site → https://www.hak5.org Shop →  https://www.hakshop.com Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1 Support → https://www.patreon.com/threatwire Contact Us → http://www.twitter.com/hak5 Threat Wire RSS → https://shannonmorse.podbean.com/feed/ Threat Wire iTunes → https://itunes.apple.com/us/podcast/threat-wire/id1197048999 Host: Shannon Morse → https://www.twitter.com/snubs Host: Darren Kitchen → https://www.twitter.com/hak5darren Host: Mubix → http://www.twitter.com/mubix -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.</description>
        <lastBuildDate>Wed, 15 Apr 2026 09:24:19 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>Stealing Data from Air-Gapped PCs using PSUs as Speakers - ThreatWire</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/videos/watch/bb0ad535-3619-4454-b6ee-47b0beabb500</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/video-comments.xml?videoId=bb0ad535-3619-4454-b6ee-47b0beabb500" rel="self" type="application/rss+xml"/>
    </channel>
</rss>