<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>How to Gain Instant ESXi Admin - ThreatWire</title>
        <link>https://stream.echo6.co/videos/watch/fdd6056b-6e37-452e-b72a-191bea589b3e</link>
        <description>⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️ @endingwithali → Twitch: https://twitch.tv/endingwithali Twitter: https://twitter.com/endingwithali YouTube: https://youtube.com/@endingwithali Everywhere else: https://links.ali.dev Want to work with Ali? endingwithalicollabs@gmail.com [❗] Join the Patreon→ https://patreon.com/threatwire 0:00  0 - Intro 00:06 1 - Group Leads to Direct Admin 01:27 2 - CrowdStrike Update 02:13 3 - GitHub Ghost Network 04:17 4 - GCP Creds Stolen Via Supply Chain 05:35 5 - Outro LINKS 🔗 Story 1: Domain Group Leads to Direct Admin https://www.microsoft.com/en-us/security/blog/2024/07/29/ransomware-operators-exploit-esxi-hypervisor-vulnerability-for-mass-encryption/ https://www.vmware.com/products/cloud-infrastructure/esxi-and-esx 🔗 Story 2: CrowdStrike Update https://www.linkedin.com/posts/georgekurtz_falcon-content-update-remediation-and-guidance-activity-7222323091652108289-19Xv https://www.crn.com/news/security/2024/crowdstrike-confirms-uber-gift-cards-sent-to-partners https://www.cnbc.com/2024/07/23/google-wiz-deal-dead.html 🔗 Story 3: GitHub Ghost Network https://research.checkpoint.com/2024/stargazers-ghost-network/ https://thehackernews.com/2024/07/stargazer-goblin-creates-3000-fake.html 🔗 Story 4: GCP Creds Stolen Via Supply Chain https://checkmarx.com/blog/malicious-python-package-targets-macos-developers-to-access-their-gcp-accounts/ -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Our Site → https://www.hak5.org Shop →  http://hakshop.myshopify.com/ Community → https://www.hak5.org/community Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1 Support → https://www.patreon.com/threatwire Contact Us → http://www.twitter.com/hak5 Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.</description>
        <lastBuildDate>Wed, 15 Apr 2026 11:31:00 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>How to Gain Instant ESXi Admin - ThreatWire</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/videos/watch/fdd6056b-6e37-452e-b72a-191bea589b3e</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/video-comments.xml?videoId=fdd6056b-6e37-452e-b72a-191bea589b3e" rel="self" type="application/rss+xml"/>
    </channel>
</rss>