⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️
Support ThreatWire →
@endingwithali →
Twitch:
Twitter:
Everywhere else:
If you want to help Ali with her research project email her at endingwithaliresearch@ → Please include (1️⃣) the size of your company (2️⃣) what your role title and (3️⃣) a little summary of what your job entails.
[❗] ThreatWire Patreon has moved to →
0:00 - Intro
0:15 - Twitter Bug Bounty Program Flop
2:11 - 16 Year Reverse Engineers the iMessage Protocol
3:46 - Still Developing: MongoDB Breach
4:59 - Ledger Supply Chain Attack and A Research Project
6:00 - Outro
LINKS
🔗Story 1 - Twitter Bug Bounty Program Flop
🔗Story 2 - 16 Year Reverse Engineers the iMessage Protocol
🔗Story 3 - Breaking: MongoDB Data Breach
🔗Story 4 - Ledger Supply Chain Attack
____________________________________________
Founded in 2005, Hak5’s mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.
1 view
0
0
4 months ago 00:03:22 1
Jessi (제시) - ’어떤X (What Type of X)’ MV
4 months ago 00:00:19 1
PETER GRIFFIN PLAYS FORTNITE
4 months ago 01:02:09 3
Opiuo & The Opulent Orchestra - Live From Red Rocks Amphitheatre
4 months ago 01:55:07 1
YOU WILL EAT THE BUGS (Or Will You?): A Conversation with Jay Dyer | Winter Latina Show | Episode 19