@hak5
  @hak5
Hak5 | China is able to trace your Airdrops - ThreatWire @hak5 | Uploaded 7 months ago | Updated 3 hours ago
⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️

Support ThreatWire → https://patreon.com/threatwire

@endingwithali →
Twitch: https://twitch.tv/endingwithali
Twitter: https://twitter.com/endingwithali
Everywhere else: https://links.ali.dev

If you want to help Ali with her research project email her at endingwithaliresearch@gmail.com
→ Please include (1️⃣) the size of your company (2️⃣) what your role title is and (3️⃣) a little summary of what your job entails.

[❗] ThreatWire Patreon has moved to → https://patreon.com/threatwire

00:00 Intro
0:12 - SEC Twitter (x) Hacked!
1:52 - IT kind of does their job and gets in trouble
3:16 - China is able to trace your Airdrops
4:09 - Outro

LINKS
🔗 Story 1: SEC Twitter (x) Hacked!
https://www.sec.gov/secgov-x-account
https://www.bleepingcomputer.com/news/security/sec-confirms-x-account-was-hacked-in-sim-swapping-attack/
https://twitter.com/GulGeeOfficial/status/1744864569712144760


🔗 Story 2: IT kind of does their job and gets in trouble
https://bleepingcomputer.com/news/security/court-charges-dev-with-hacking-after-cybersecurity-issue-disclosure/
https://www.heise.de/news/Warum-ein-Sicherheitsforscher-im-Fall-Modern-Solution-verurteilt-wurde-9601392.html

🔗 Story 3: China is able to trace your Airdrops
https://sfj.beijing.gov.cn/sfj/sfdt/ywdt82/flfw93/436331732/index.html
https://time.com/6553473/china-cracked-apple-airdrop/

🔗 Bonus Story - https://arstechnica.com/gadgets/2024/01/convicted-murderer-filesystem-creator-writes-of-regrets-to-linux-list/
____________________________________________

Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.
China is able to trace your Airdrops - ThreatWireOWASP Oopsies and Calling XZ What It Is - ThreatWireHax 4 BIOS, WordPress & Counter-Strike, oh my! - ThreatWireCyber Kidnapping & Cartas Controversial Cap Table Tactics Exposed! - ThreatWireStealth Payload Tips - Obfuscation & Lock key triggers - Hak5Writing Threatwire Live with @endingwithaliCovertly Implanting a USB Rubber Ducky into a MouseSignal Zero Day? - #threatwire #shorts #hak5 #informationsecurity #newsI-S00N China File Drop - ThreatWireIntroducing HIDX StealthLinkQuantum Cracks, Citrix & npm Risks - ThreatWireSlack AI is Reading Your Chats - ThreatWire

China is able to trace your Airdrops - ThreatWire @hak5