Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat
…
continue reading
1
HN43 - Dutch Police Take Down Major Information Stealers: Redline & Meta Stealer
10:45
10:45
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
10:45
In a significant international operation, Dutch police and global law enforcement partners have taken down two major information stealers: Redline and Meta Stealer. These dangerous malware operations targeted thousands of victims worldwide, stealing passwords, sensitive data, and more. This video explores how law enforcement agencies worked togethe…
…
continue reading
1
HN42 - Hackers Breach Internet Archive TWICE – How Safe is Your Data?
16:12
16:12
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
16:12
The Internet Archive has been breached… AGAIN! 🛑 This time, hackers managed to compromise sensitive user data not once, but twice, exploiting stolen GitLab and Zendesk tokens. In this episode of Exploit Brokers, we break down what went wrong, why access tokens are crucial for cybersecurity, and how this breach could have been prevented. 🚨 We’ll div…
…
continue reading
1
HN41 - Chinese Hackers Hijack US Telecom Networks
15:46
15:46
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
15:46
In this eye-opening episode of Exploit Brokers, your host Lauro dives deep into the recent cyberattacks that have compromised major U.S. telecommunications networks. Chinese state-sponsored hackers, known as Salt Typhoon, have exploited a 30-year-old backdoor mandated by U.S. law, targeting giants like AT&T, Lumen (formerly CenturyLink), and Verizo…
…
continue reading
1
HN40 - Shocking Move: Kaspersky Uninstalls Itself and Installs Ultra AV Overnight!
13:13
13:13
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
13:13
Imagine waking up to find that your trusted antivirus software has uninstalled itself and replaced itself with a completely different program—without your consent! 😱 In today's video, we dive deep into the shocking move by Kaspersky as it uninstalls itself and installs Ultra AV on users' computers. We'll explore why this happened, how users are rea…
…
continue reading
1
HN39 - Apple's Shocking Decision: Dropping the Fight Against NSO Spyware
14:15
14:15
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
14:15
In an unexpected turn of events, Apple has decided to drop its three-year-old lawsuit against the notorious spyware maker, NSO Group. What led to this shocking decision, and what does it mean for the future of cybersecurity and your personal data? 🤔 In today's video, we dive deep into the reasons behind Apple's surprising move. We'll explore how th…
…
continue reading
1
HN38 - Is Your Tap-to-Pay Secure? The Latest Android Malware Warning
13:35
13:35
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
13:35
Is Your Tap-to-Pay Secure? The Latest Android Malware Warning 🔒 In this episode of Exploit Brokers, we dive deep into a new Android malware that targets NFC technology to steal your banking information. 📱💳 If you use tap-to-pay or any NFC-based service, this is something you NEED to know. We’ll break down how this malware works, why it's so dangero…
…
continue reading
1
HN37 - AI Manipulation: The Silent Threat to Democracy
16:32
16:32
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
16:32
🚨 AI Propaganda Exposed: How It’s Influencing Elections Right Now! 🚨 In this episode of Exploit Brokers, we dive deep into the unsettling world of AI-driven misinformation campaigns. From targeting voters on both sides to spreading chaos across social media, AI is being weaponized in ways that sound like science fiction but are shockingly real. We’…
…
continue reading
1
HN36 - Fake Sites, Real Danger: The Trojan Malware in Extensions
15:08
15:08
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
15:08
In this episode of Exploit Brokers, we dive into a significant new threat spreading across the web—Trojan malware hidden in malicious browser extensions. These sneaky extensions are distributed through fake download sites mimicking popular software like Roblox FPS Unlocker, YouTube, VLC, or KeePass. We’ll discuss how these Trojans operate, how they…
…
continue reading
1
HN35 - Deceptive Admin Tool You Should NOT Install
17:22
17:22
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
17:22
In this episode of Exploit Brokers, we're diving into a new and alarming trend in cybersecurity: Remote Access Trojans (RATs) targeting IT professionals. Discover how malware disguised as legitimate tools is being installed by unsuspecting IT teams, leading to severe breaches and ransomware attacks. We'll explore the tactics used by Hunter's Intern…
…
continue reading
1
HN34 - AI Detects Fires and Malicious Android Apps You Need to Avoid
22:15
22:15
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
22:15
Hey everyone, welcome back to another episode of Exploit Brokers! In today's video, we're diving deep into some dangerous Android apps you should avoid installing. We'll also explore how AI is being used to detect wildfires and identify AI-generated videos, proving that technology can indeed fight back against digital threats. With the rise of data…
…
continue reading
1
HN33 - CrowdStrike Chaos: Fake Fixes and Malware Attacks
17:39
17:39
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
17:39
In this episode of Exploit Brokers, we delve into two major cyber stories making headlines. First, we uncover the details behind the recent breach of water facilities by Russian hacktivists and the subsequent U.S. sanctions. Discover the risks posed by SCADA system vulnerabilities and the potential for catastrophic damage to critical infrastructure…
…
continue reading
1
HN32 - Cyber Scam Slavery: The Dark Side of Online Fraud
26:28
26:28
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
26:28
🚨 Welcome to Exploit Brokers! 🚨 In this episode, we're diving deep into the hidden world of fake cell towers and the alarming rise of cyber scam slavery. 📡💔 Did you know that your cell phone might be connecting to a fake tower, putting your personal information at risk? We explore a recent case in London where criminals set up a fake cell tower to …
…
continue reading
1
HN31 - AI and Crime: How criminals are Exploiting Technology to Deceive
26:36
26:36
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
26:36
Welcome back to another episode of Exploit Brokers with your host, Lauro! Today, we're diving deep into the darker uses of AI by criminals. From high-tech identity theft using AI-generated voices and images to unprecedented surges in digital crimes such as hacking and data breaches, we explore how these technologies are shaping modern criminal tact…
…
continue reading
1
HN30 - Digital Intruders: The Complex Web of APTs Against ASEAN
24:43
24:43
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
24:43
In this thrilling episode of our cybersecurity series, we dive deep into the shadowy world of cyber espionage waged by two Chinese Advanced Persistent Threat (APT) groups against the nations of the Association of Southeast Asian Nations (ASEAN). Discover the tactics employed by infamous threat actors like Mustang Panda in their sophisticated digita…
…
continue reading
1
HN29 - No Honor Among Thieves: The Internal Conflict of Black Cat Ransomware
25:43
25:43
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
25:43
Dive into the dark world of cybercrime with our latest episode on Exploit Brokers, where we unravel the complexities of the Black Cat ransomware group and its fallout with Change Healthcare and UnitedHealth Group. Witness the intricacies of digital extortion, the inner workings of cybercriminal networks, and the colossal impact on the healthcare se…
…
continue reading
1
HN28 - Ransomware Alert: Black Cat's Bold Move Against UnitedHealth
20:02
20:02
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
20:02
In this gripping episode of Exploit Brokers, we dive deep into the shadows of cyberspace to uncover the resurgence of the notorious Black Cat ransomware group. Following their recent high-profile attack on UnitedHealth's technology unit, Optum, which disrupted prescription deliveries across the United States, Black Cat has declared war against the …
…
continue reading
1
HN27 - Massive Ransomware Empire Crumbles: Inside the Fall of LockBit
24:23
24:23
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
24:23
In this explosive episode of Exploit Brokers, we delve into the groundbreaking takedown of LockBit, one of the most formidable names in the ransomware arena. With law enforcement agencies from the US, EU, and beyond joining forces, this rare international operation has sent shockwaves through the cybercrime world. From arrests in Ukraine and France…
…
continue reading
1
HN26 - AI and Cyber Attacks: Unveiling the Tactics of Nation State Hackers
18:01
18:01
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
18:01
Welcome back to Exploit Brokers, where we delve deep into the world of cybersecurity, AI, and the digital battlegrounds of our time. In this episode, we're exploring a topic that sounds like it's straight out of a sci-fi movie, but is unfolding in real life: the integration of AI into military and cyber warfare by nation states. With an unprecedent…
…
continue reading
1
HN25 - Hacking Havoc: How Fulton County Became a Real-Life Cyberwar Zone
16:01
16:01
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
16:01
Dive into the eye-opening world of cybersecurity as we dissect the recent cyber attack and Hacking Havoc that has plunged Fulton County into turmoil. Witness the frightening resemblance between fictional cyber threats depicted in shows like Mr. Robot and the stark reality facing our digital infrastructures today. This episode of Exploit Brokers tak…
…
continue reading
1
HN24 - Sandwich Data Breach Alert: Jason's Deli & Subway Under Attack
20:19
20:19
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
20:19
🔒 Dive into the world of cybersecurity as we uncover the latest threats facing businesses in today's digital landscape. In this video, we dissect the Jason's Deli data breach, shedding light on the dangers of credential stuffing attacks. Discover how hackers exploit weak password habits and gain access to personal data, leaving thousands of custome…
…
continue reading
1
HN23 - One Click Away: The Alarming Reality of Data Theft Exploits
14:58
14:58
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
14:58
In this eye-opening episode of Exploit Brokers, we delve deep into the world of cybercrime, dissecting the sinister Phemedrone Stealer malware and its ability to pilfer your precious data. Join us as we explore the chilling reality that just one click on a seemingly harmless URL can lead to a catastrophic data breach. Discover the insidious tactics…
…
continue reading
1
HN22 - Crypto Chaos: How a Fake SEC Tweet Triggered a Bitcoin Spike
19:29
19:29
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
19:29
In this gripping episode of Exploit Brokers, we delve deep into the intricate world of cryptocurrency and cybersecurity. Our journey begins with the astonishing SEC Twitter hack, where hackers manipulated the SEC's account to spread false information about Bitcoin ETF approvals. This led to a monumental $2,000 surge in Bitcoin prices, leaving the c…
…
continue reading
1
HN21 - Underground Market for Twitter/X Accounts; Google OAuth Backdoor for Hackers
16:09
16:09
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
16:09
Welcome to another captivating episode of Exploit Brokers! In this installment, we delve deep into the ever-evolving world of cybercrime and digital security. Join us as we unravel two gripping stories that shed light on the precarious nature of our online existence. First up, we explore the dark corners of the internet where cybercriminals flood t…
…
continue reading
1
HN20 - T-Mobile's Watchful Eye, Big Brother, and the Misconstrued Fines. The Prelude to Big Brother?
12:48
12:48
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
12:48
In this episode of Exploit Brokers, we delve into a recent online uproar surrounding T-Mobile and its alleged imposition of fines for text messages containing hate speech and other violations. We take a closer look at the image that sparked the controversy, which led many to fear that T-Mobile was turning into a "Big Brother" figure, constantly mon…
…
continue reading
1
HN19 - AI Conspiracy: Man's Deadly Plot Against The Queen Exposed | 23AndMe hacked and data leaked
10:34
10:34
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
10:34
In this episode of Exploit Brokers, we delve into a chilling tale where artificial intelligence (AI) takes a dark turn, leading a young man down a perilous path of treason and an assassination plot against the Queen. The sinister liaison between man and machine unveils the unseen threats lurking in the digital shadows. Join Lauro as he dissects a r…
…
continue reading
1
HN18 - AI's Silent Takeover in the CIA & IRS
19:45
19:45
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
19:45
🔍 In this episode of Exploit Brokers, we dive deep into the growing use of AI by government agencies like the CIA and IRS. Are we heading towards a world where AI is used in ways that could infringe upon our rights and privacy? Let's explore the concerns and implications. #AI #Privacy #GovernmentSurveillance #IRS #CIA #EthicalAI Join us as we disse…
…
continue reading
1
HN17 - Cyber Onslaught: MGM and Caesars Face Ransomware Threat | Hacker Group Attack Unveiled
21:43
21:43
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
21:43
In a digital era where cybersecurity stands as the frontier's edge of organizational safety, even titans of industry find themselves under siege. The glittering giants of the gaming & hospitality industry, MGM and Caesars, have recently fallen prey to a formidable ransomware hacker group. We are seeing the opening of a new chapter in the narrative …
…
continue reading
1
HN16 - Zero-Click iPhone Horror: Pegasus Spyware Attack Against Exiled Russian Journalist #hackingnews
12:54
12:54
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
12:54
Zero-Click iPhone Horror: Pegasus Spyware Attack Against Exiled Russian Journalist In today's episode we dive and explore the alarming cyberattack that targeted an exiled Russian journalist through a zero-click iPhone exploit, leading to the deployment of the notorious Pegasus spyware. This incident sheds light on the escalating cybersecurity threa…
…
continue reading
1
HN 15 New Chaes Malware Variant Attack on Banking and Financial Apps
15:23
15:23
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
15:23
We are unveiling the Threat: Chaes Malware's Attack on Banking and Financial Apps. We discuss the breadth of the attack and go over details as they were shared with "TheHackerNews". Join us as we help shed light on the increasing amount of malware and cyber attacks. #hackingnews #cybersecurity #malware #cyberattack #infosec #technews Source: https:…
…
continue reading
1
HN 14 - Is Your Fingerprint Safe? X Is Collecting Your Biometric Data and NCSC Cautions Building With LLMs
16:40
16:40
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
16:40
…
continue reading
1
HN 13 - Roblox Developers Beware! Tricked by Imitation NPM Packages. #hackingnews #supplychainhack
9:35
Beware! Roblox developers are being tricked by imitation npm packages, and your security is at risk. This video is a warning to all Roblox developers, and it's essential that you take steps to protect yourself from this type of attack. Stay safe online and make sure to keep your passwords safe! Source: https://www.darkreading.com/vulnerabilities-th…
…
continue reading
1
HN 12 - The Dark Side of Hacking: Russian Hackers' Infrastructural Shift and Google AI's Fuzzing
14:46
14:46
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
14:46
In the Dark Side of Hacking, we take a look at how Russian Hackers have shifted their focus to attacking infrastructure rather than individuals after being identified and putting victims through panic. Google AI launches a new bug hunting strategy called Fuzzing, which uses a machine learning algorithm to search for flaws in software. Fuzzing is a …
…
continue reading
Hey guys T-Mobile got hacked, PayPal gets hit by a massive credential stuffing attack, a new android malware that is an evolution of an existing banking malware, and a phone ad scheme that infected real apps. All this in this episode of Exploit Broker’s Hacking News Round up. You’re not going to want to miss this. Show Notes: https://exploitbrokers…
…
continue reading
1
HN10 - License Plates Hacked, Canada Reclassifies Tether, JsonWebToken Vulnerability, & More.
8:37
Intro Hey guys and welcome to Exploit Brokers where we break down articles, recap recent hacking events, and give insight on the technical aspects of the hacking events. I will explain things and give my opinion on tech and hacking events so let’s get started. Show Notes: https://exploitbrokers.com/podcasts/hn10…
…
continue reading
1
HN09 - Freakout Botnet Attacks DVRs, Ricochet Problems, MyKings Botnet, & Twitch Hacked.
21:09
21:09
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
21:09
Freakout Botnet is taking over DVRs, Ricochet has security community concerned, MyKings botnet is going strong, and a popular streaming site Twitch has been hacked, so let's login. Show Notes: https://exploitbrokers.com/podcasts/hn09 #hacker #hackingnews #exploitbrokers #exploitbrokerspodcast #CyberSec #ethicalhacking #ethicalhacker #RansomwareNews…
…
continue reading
1
HN08 - Maze ransomware hits Cognizant, More Scams, Pulse Secure vulnerable, Ruby libraries contain malware, and more
12:07
12:07
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
12:07
IT Multinational Corporation Cognizant hit with Ransomware, Scams round up in April, Pulse VPN Patch is not patchy enough, and over 700 developer libraries contains malicious code We have some interesting stuff to cover, so let's login. Show Notes: https://exploitbrokers.com/podcasts/hn08 #hacker #hackingnews #exploitbrokers #exploitbrokerspodcast …
…
continue reading
1
HN07 - Malware Textbooks, Marriott Data breach, COVID-19 IRS Scams, And Mage-cart Malware Anatomy Lesson
13:39
13:39
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
13:39
HN07 reports on the Kaspersky's finding about malicious Textbooks, a new Marriott data breach, Covid19 scamming, and Anatomy of a Skimming As a Service MageCart skimmer. All the show notes can be found at https://exploitbrokers.com/podcasts/hn07 . #cybersec #ethicalhacking #ethicalhacker #COVID-19 #DataBreach #MageCart…
…
continue reading
1
HN06 - Croatia Hacked, Golang malware undetectable & The Cloud Crashed
10:10
10:10
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
10:10
HN06 reports on the Croatian Government hack, a new undetectable golang malware as well as a cloud flare outage and Christmas hackers being jailed. All the show notes can be found at https://exploitbrokers.com/podcasts/hn06 . #cybersec #ethicalhacking #ethicalhacker #croatiahacked #golangmalware
…
continue reading
1
HN05 - NASA Hacked, Ransomware LooCipher, & Steam Phishing Website
10:11
10:11
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
10:11
HN05 reports on NASA getting hacked, a new ransomware alert. As well as wetrasnfer sending files to the wrong people and a new steam phishing campaign aimed at gamers. All the show notes can be found at https://exploitbrokers.com/podcasts/HN05 #hackingnews #hacking #infosec #cybersec #securitypodcast #ethicalhacking #ethicalhacker #nasahacked #looc…
…
continue reading