<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Threat Vector | What Happened to Hacker Culture? in Threat Vector</title>
    <link>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-what-happened-to-hacker-culture/ta-p/1238673</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Threat Vector Template.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/69350iFDE08F17F2A4C93E/image-size/large?v=v2&amp;amp;px=999" role="button" title="Threat Vector Template.jpg" alt="Threat Vector Template.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Join&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/davidrmoulton/" target="_blank" rel="noopener"&gt; &lt;SPAN&gt;David Moulton&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;, Senior Director of Thought Leadership for Unit 42, as he sits down with&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/kylewilhoit/" target="_blank" rel="noopener"&gt; &lt;SPAN&gt;Kyle Wilhoit&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;,Technical Director of Threat Research at &lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;Unit 42&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt;, for an intimate conversation about the evolution of hacker culture and cybersecurity. From picking up &lt;/SPAN&gt;&lt;A href="https://www.2600.com" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;2600: The Hacker Quarterly&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; magazines at Barnes &amp;amp; Noble and building beige boxes to leading threat research at Palo Alto Networks, Kyle shares his personal journey into the security community. This conversation explores how AI and automation are lowering barriers for attackers, the professionalization of cybersecurity, and what's been lost and gained in the industry's maturation. Kyle offers practical advice for newcomers who don't fit the traditional mold, emphasizing the importance of curiosity, soft skills, and intellectual humility.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Kyle Wilhoit&lt;/STRONG&gt;&lt;SPAN&gt; is a seasoned cybersecurity researcher, with more than 15 years of experience studying cybercrime and nation-state threats. He's a frequent speaker at global conferences like Black Hat, FIRST, and SecTor, and has authored two industry-respected books: &lt;/SPAN&gt;&lt;A href="https://www.barnesandnoble.com/w/hacking-exposed-industrial-control-systems-clint-bodungen/1123118068?ean=9781259589713" target="_blank" rel="noopener"&gt;&lt;I&gt;&lt;SPAN&gt;Hacking Exposed Industrial Control Systems&lt;/SPAN&gt;&lt;/I&gt;&lt;/A&gt;&lt;SPAN&gt; and &lt;/SPAN&gt;&lt;A href="https://www.barnesandnoble.com/w/operationalizing-threat-intelligence-kyle-wilhoit/1141251900?ean=9781801814683" target="_blank" rel="noopener"&gt;&lt;I&gt;&lt;SPAN&gt;Operationalizing Threat Intelligence&lt;/SPAN&gt;&lt;/I&gt;&lt;/A&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;As a long-standing member of the Black Hat US Review Board and an adjunct instructor, Kyle is deeply involved in shaping both cutting-edge research and the next generation of cybersecurity professionals.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt;&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/kylewilhoit/" target="_blank" rel="noopener"&gt; &lt;SPAN&gt;Connect with Kyle on LinkedIn&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Previous appearances on Threat Vector&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Inside DeepSeek’s Security Flaws (&lt;/STRONG&gt;&lt;SPAN&gt;Mar 31, 2025) &lt;/SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/resources/podcasts/threat-vector-inside-deepseeks-security-flaws" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;https://www.paloaltonetworks.com/resources/podcasts/threat-vector-inside-deepseeks-security-flaws&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;War Room Best Practices&lt;/STRONG&gt;&lt;SPAN&gt; (Nov 07, 2024)&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/resources/podcasts/threat-vector-war-room-best-practices" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;https://www.paloaltonetworks.com/resources/podcasts/threat-vector-war-room-best-practices&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Cybersecurity in the AI Era: Insights from Unit 42's Kyle Wilhoit, Director of Threat Research&lt;/STRONG&gt;&lt;SPAN&gt; (Jan 11, 2024)&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/resources/podcasts/threat-vector-cybersecurity-in-the-ai-era-insights-from-unit-42s-kyle-wilhoit-director-of-threat-research" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;https://www.paloaltonetworks.com/resources/podcasts/threat-vector-cybersecurity-in-the-ai-era-insights-from-unit-42s-kyle-wilhoit-director-of-threat-research&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;Learn more about Unit 42's threat research at &lt;/SPAN&gt;&lt;A href="https://unit42.paloaltonetworks.com/" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;https://unit42.paloaltonetworks.com/&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Related episodes: For more conversations about AI's impact on cybersecurity, career development in security, and insights from Unit 42 researchers, explore past episodes at&lt;/SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/podcasts/threat-vector" target="_blank" rel="noopener"&gt; &lt;SPAN&gt;https://www.paloaltonetworks.com/podcasts/threat-vector&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Join the conversation on our social media channels:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Website&lt;/STRONG&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;A href="http://www.paloaltonetworks.com/" target="_blank" rel="noopener"&gt; &lt;SPAN&gt;http://www.paloaltonetworks.com/&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Threat Research:&lt;/STRONG&gt;&lt;A href="https://unit42.paloaltonetworks.com/" target="_blank" rel="noopener"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Facebook:&lt;/STRONG&gt;&lt;A href="https://www.facebook.com/LifeatPaloAltoNetworks/" target="_blank" rel="noopener"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;LinkedIn:&lt;/STRONG&gt;&lt;A href="https://www.linkedin.com/company/unit42/" target="_blank" rel="noopener"&gt; &lt;SPAN&gt;⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&lt;A href="https://www.linkedin.com/company/palo-alto-networks/" target="_blank" rel="noopener"&gt;https://www.linkedin.com/company/palo-alto-networks/&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;YouTube:&lt;/STRONG&gt;&lt;A href="https://www.youtube.com/channel/UCvJQO11qoCHYwZ4Ah4Jf-Tw" target="_blank" rel="noopener"&gt; &lt;SPAN&gt;⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;@paloaltonetworks&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Twitter:&lt;/STRONG&gt;&lt;A href="https://twitter.com/PaloAltoNtwks" target="_blank" rel="noopener"&gt; &lt;SPAN&gt;⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;A href="https://twitter.com/PaloAltoNtwks%E2%81%A0%E2%81%A0%E2%81%A0%E2%81%A0" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;BR /&gt;&lt;IFRAME src="https://playlist.megaphone.fm?e=CYBW3976968349" width="100%" height="200" frameborder="0" scrolling="no"&gt;&lt;/IFRAME&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Thu, 25 Dec 2025 17:00:00 GMT</pubDate>
    <dc:creator>dmoulton</dc:creator>
    <dc:date>2025-12-25T17:00:00Z</dc:date>
    <item>
      <title>Threat Vector | What Happened to Hacker Culture?</title>
      <link>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-what-happened-to-hacker-culture/ta-p/1238673</link>
      <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Threat Vector Template.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/69350iFDE08F17F2A4C93E/image-size/large?v=v2&amp;amp;px=999" role="button" title="Threat Vector Template.jpg" alt="Threat Vector Template.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Join&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/davidrmoulton/" target="_blank" rel="noopener"&gt; &lt;SPAN&gt;David Moulton&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;, Senior Director of Thought Leadership for Unit 42, as he sits down with&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/kylewilhoit/" target="_blank" rel="noopener"&gt; &lt;SPAN&gt;Kyle Wilhoit&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;,Technical Director of Threat Research at &lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;Unit 42&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt;, for an intimate conversation about the evolution of hacker culture and cybersecurity. From picking up &lt;/SPAN&gt;&lt;A href="https://www.2600.com" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;2600: The Hacker Quarterly&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; magazines at Barnes &amp;amp; Noble and building beige boxes to leading threat research at Palo Alto Networks, Kyle shares his personal journey into the security community. This conversation explores how AI and automation are lowering barriers for attackers, the professionalization of cybersecurity, and what's been lost and gained in the industry's maturation. Kyle offers practical advice for newcomers who don't fit the traditional mold, emphasizing the importance of curiosity, soft skills, and intellectual humility.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Kyle Wilhoit&lt;/STRONG&gt;&lt;SPAN&gt; is a seasoned cybersecurity researcher, with more than 15 years of experience studying cybercrime and nation-state threats. He's a frequent speaker at global conferences like Black Hat, FIRST, and SecTor, and has authored two industry-respected books: &lt;/SPAN&gt;&lt;A href="https://www.barnesandnoble.com/w/hacking-exposed-industrial-control-systems-clint-bodungen/1123118068?ean=9781259589713" target="_blank" rel="noopener"&gt;&lt;I&gt;&lt;SPAN&gt;Hacking Exposed Industrial Control Systems&lt;/SPAN&gt;&lt;/I&gt;&lt;/A&gt;&lt;SPAN&gt; and &lt;/SPAN&gt;&lt;A href="https://www.barnesandnoble.com/w/operationalizing-threat-intelligence-kyle-wilhoit/1141251900?ean=9781801814683" target="_blank" rel="noopener"&gt;&lt;I&gt;&lt;SPAN&gt;Operationalizing Threat Intelligence&lt;/SPAN&gt;&lt;/I&gt;&lt;/A&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;As a long-standing member of the Black Hat US Review Board and an adjunct instructor, Kyle is deeply involved in shaping both cutting-edge research and the next generation of cybersecurity professionals.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt;&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/kylewilhoit/" target="_blank" rel="noopener"&gt; &lt;SPAN&gt;Connect with Kyle on LinkedIn&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Previous appearances on Threat Vector&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Inside DeepSeek’s Security Flaws (&lt;/STRONG&gt;&lt;SPAN&gt;Mar 31, 2025) &lt;/SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/resources/podcasts/threat-vector-inside-deepseeks-security-flaws" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;https://www.paloaltonetworks.com/resources/podcasts/threat-vector-inside-deepseeks-security-flaws&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;War Room Best Practices&lt;/STRONG&gt;&lt;SPAN&gt; (Nov 07, 2024)&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/resources/podcasts/threat-vector-war-room-best-practices" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;https://www.paloaltonetworks.com/resources/podcasts/threat-vector-war-room-best-practices&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Cybersecurity in the AI Era: Insights from Unit 42's Kyle Wilhoit, Director of Threat Research&lt;/STRONG&gt;&lt;SPAN&gt; (Jan 11, 2024)&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/resources/podcasts/threat-vector-cybersecurity-in-the-ai-era-insights-from-unit-42s-kyle-wilhoit-director-of-threat-research" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;https://www.paloaltonetworks.com/resources/podcasts/threat-vector-cybersecurity-in-the-ai-era-insights-from-unit-42s-kyle-wilhoit-director-of-threat-research&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;Learn more about Unit 42's threat research at &lt;/SPAN&gt;&lt;A href="https://unit42.paloaltonetworks.com/" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;https://unit42.paloaltonetworks.com/&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Related episodes: For more conversations about AI's impact on cybersecurity, career development in security, and insights from Unit 42 researchers, explore past episodes at&lt;/SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/podcasts/threat-vector" target="_blank" rel="noopener"&gt; &lt;SPAN&gt;https://www.paloaltonetworks.com/podcasts/threat-vector&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Join the conversation on our social media channels:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Website&lt;/STRONG&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;A href="http://www.paloaltonetworks.com/" target="_blank" rel="noopener"&gt; &lt;SPAN&gt;http://www.paloaltonetworks.com/&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Threat Research:&lt;/STRONG&gt;&lt;A href="https://unit42.paloaltonetworks.com/" target="_blank" rel="noopener"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Facebook:&lt;/STRONG&gt;&lt;A href="https://www.facebook.com/LifeatPaloAltoNetworks/" target="_blank" rel="noopener"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;LinkedIn:&lt;/STRONG&gt;&lt;A href="https://www.linkedin.com/company/unit42/" target="_blank" rel="noopener"&gt; &lt;SPAN&gt;⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&lt;A href="https://www.linkedin.com/company/palo-alto-networks/" target="_blank" rel="noopener"&gt;https://www.linkedin.com/company/palo-alto-networks/&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;YouTube:&lt;/STRONG&gt;&lt;A href="https://www.youtube.com/channel/UCvJQO11qoCHYwZ4Ah4Jf-Tw" target="_blank" rel="noopener"&gt; &lt;SPAN&gt;⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;@paloaltonetworks&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Twitter:&lt;/STRONG&gt;&lt;A href="https://twitter.com/PaloAltoNtwks" target="_blank" rel="noopener"&gt; &lt;SPAN&gt;⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;A href="https://twitter.com/PaloAltoNtwks%E2%81%A0%E2%81%A0%E2%81%A0%E2%81%A0" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;BR /&gt;&lt;IFRAME src="https://playlist.megaphone.fm?e=CYBW3976968349" width="100%" height="200" frameborder="0" scrolling="no"&gt;&lt;/IFRAME&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Thu, 25 Dec 2025 17:00:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-what-happened-to-hacker-culture/ta-p/1238673</guid>
      <dc:creator>dmoulton</dc:creator>
      <dc:date>2025-12-25T17:00:00Z</dc:date>
    </item>
  </channel>
</rss>

