<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>How Attackers Hacked the Feds with VPN Vulnerabilities  - ThreatWire</title>
        <link>https://stream.echo6.co/videos/watch/bcafcc91-a9f2-4e2e-b2ff-6ee0723078ce</link>
        <description>Hak5 -- Cyber Security Education, Inspiration, News &amp; Community since 2005: An active directory flaw is being actively exploited, coffee makers can be hacked (which, are we surprised?), and a VPN vulnerability was used to hack the feds! All that coming up now on ThreatWire. #threatwire #hak5 Links: Subscribe for future giveaways! https://youtube.com/shannonmorse Support me on alternative platforms! https://snubsie.com/support Shop ThreatWire Merch Directly! - https://snubsie.com/shop Shop ThreatWire Merch on Teespring! - https://teespring.com/stores/morsecode Join now for access to extra perks and to support ThreatWire!  https://www.patreon.com/threatwire Links: ZeroLogon: https://thehackernews.com/2020/09/detecting-and-preventing-critical.html https://krebsonsecurity.com/2020/09/microsoft-attackers-exploiting-zerologon-windows-flaw/ https://www.zdnet.com/article/microsoft-says-it-detected-active-attacks-leveraging-zerologon-vulnerability/ https://www.secura.com/blog/zero-logon https://arstechnica.com/information-technology/2020/09/one-of-this-years-most-severe-windows-bugs-is-now-under-active-exploit/ https://arstechnica.com/information-technology/2020/09/feds-issue-emergency-order-for-agencies-to-patch-critical-windows-flaw/ https://us-cert.cisa.gov/ncas/current-activity/2020/09/21/samba-releases-security-update-cve-2020-1472 Coffee Maker Vulnerability: https://www.pentestpartners.com/security-blog/hacking-kettles-extracting-plain-text-wpa-psks-yes-really/ https://www.evilsocket.net/2016/10/09/IoCOFFEE-Reversing-the-Smarter-Coffee-IoT-machine-protocol-to-make-coffee-using-terminal/index.html https://arstechnica.com/information-technology/2020/09/how-a-hacker-turned-a-250-coffee-maker-into-ransom-machine/ https://decoded.avast.io/martinhron/the-fresh-smell-of-ransomed-coffee/ https://www.youtube.com/watch?v=bJrIh94RSiI VPN Vuln Attack Hits Feds: https://us-cert.cisa.gov/ncas/analysis-reports/ar20-268a https://threatpost.com/feds-cyberattack-data-stolen/159541/ https://www.zdnet.com/article/cisa-says-a-hacker-breached-a-federal-agency/ Photo credit: https://cdn.pixabay.com/photo/2020/06/06/15/08/washington-monument-5266903_1280.jpg -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Our Site → https://www.hak5.org Shop →  https://www.hakshop.com Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1 Support → https://www.patreon.com/threatwire Contact Us → http://www.twitter.com/hak5 Threat Wire RSS → https://shannonmorse.podbean.com/feed/ Threat Wire iTunes → https://itunes.apple.com/us/podcast/threat-wire/id1197048999 Host: Shannon Morse → https://www.twitter.com/snubs Host: Darren Kitchen → https://www.twitter.com/hak5darren Host: Mubix → http://www.twitter.com/mubix -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.</description>
        <lastBuildDate>Wed, 15 Apr 2026 09:15:31 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>How Attackers Hacked the Feds with VPN Vulnerabilities  - ThreatWire</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/videos/watch/bcafcc91-a9f2-4e2e-b2ff-6ee0723078ce</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/video-comments.xml?videoId=bcafcc91-a9f2-4e2e-b2ff-6ee0723078ce" rel="self" type="application/rss+xml"/>
    </channel>
</rss>