⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️
Support ThreatWire →
@endingwithali →
Twitch:
Twitter:
Everywhere else:
If you want to help Ali with her research project email her at endingwithaliresearch@ → Please include (1️⃣) the size of your company (2️⃣) what your role title and (3️⃣) a little summary of what your job entails.
[❗] ThreatWire Patreon has moved to →
0:00 - Intro
0:15 - Twitter Bug Bounty Program Flop
2:11 - 16 Year Reverse Engineers the iMessage Protocol
3:46 - Still Developing: MongoDB Breach
4:59 - Ledger Supply Chain Attack and A Research Project
6:00 - Outro
LINKS
🔗Story 1 - Twitter Bug Bounty Program Flop
🔗Story 2 - 16 Year Reverse Engineers the iMessage Protocol
🔗Story 3 - Breaking: MongoDB Data Breach
🔗Story 4 - Ledger Supply Chain Attack
____________________________________________
Founded in 2005, Hak5’s mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.