Player FM - Internet Radio Done Right
Checked 6d ago
تمت الإضافة منذ قبل three أعوام
المحتوى المقدم من Exploit Brokers. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Exploit Brokers أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Player FM - تطبيق بودكاست
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !
المدونة الصوتية تستحق الاستماع
برعاية
A
All About Change


1 Chris Nowinski - Protecting Athletes from Head Injuries & Preventing CTE 27:58
27:58
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب27:58
Chris Nowinski is a former football player at Harvard University and professional wrestler with WWE, World Wrestling Entertainment. After enduring a career-ending head injury, Chris has dedicated his professional life to serving patients and families affected by brain trauma, particularly Chronic traumatic encephalopathy, or CTE, a progressive neurodegenerative disease that develops after repeated head injuries. Jay and Chris discuss the state of head injuries in American athletics, the difference between advocating for head safety at youth and professional levels, Chris’ newest research, and much more. Episode Chapters (00:00) Intro (00:50) changes in the culture around concussions in the past two decades (02:39) padded helmet technology (03:55) concussion reporting in the NFL (10:35) Chris’ career path and concussion history (14:52) connecting with activists who haven’t themselves suffered a traumatic brain injury (17:42) SHAAKE - a new sign to identify concussions (20:53) Unions can help players advocate for safety policies (23:10) final thoughts and goodbye For video episodes, watch on www.youtube.com/@therudermanfamilyfoundation Stay in touch: X: @JayRuderman | @RudermanFdn LinkedIn: Jay Ruderman | Ruderman Family Foundation Instagram: All About Change Podcast | Ruderman Family Foundation To learn more about the podcast, visit https://allaboutchangepodcast.com/…
Exploit Brokers - Tech and Hacking News Commentary
وسم كل الحلقات كغير/(كـ)مشغلة
Manage series 3144149
المحتوى المقدم من Exploit Brokers. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Exploit Brokers أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat
…
continue reading
53 حلقات
وسم كل الحلقات كغير/(كـ)مشغلة
Manage series 3144149
المحتوى المقدم من Exploit Brokers. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Exploit Brokers أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat
…
continue reading
53 حلقات
كل الحلقات
×E
Exploit Brokers - Tech and Hacking News Commentary

1 HN57 - Unmasking SpyLoan: The Android Malware Preying on Loan Seekers 20:32
20:32
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب20:32
In this episode of Exploit Brokers, we dive into the dark world of cybercrime, exploring two alarming topics: a malicious Android loan app masquerading as a financial tool and Xerox printer vulnerabilities that could be leaking your credentials. Learn how loan sharks have moved from traditional methods to sophisticated digital predation, exploiting unsuspecting users via apps like SpyLoan. We break down how these apps bypass Google Play's protections, steal sensitive data, and push predatory lending practices, especially targeting vulnerable users. Additionally, we uncover how attackers are using patched vulnerabilities in Xerox Versalink C7025 printers to manipulate configurations, capture user credentials, and potentially gain lateral access to entire Windows environments. Whether you're a tech enthusiast or a cybersecurity professional, this episode offers valuable insights into how digital crime is evolving and what you can do to protect yourself. Don't forget to like, subscribe, and hit the notification bell for more in-depth analyses on cybersecurity threats and exploits. #CyberSecurity #AndroidMalware #LoanSharks #XeroxPrinterHack #DataBreach #DigitalCrime #SpyLoan #CyberThreats #ExploitBrokers #TechNews 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Show Notes: https://exploitbrokers.com/podcasts/hn57 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources * Xerox: https://www.darkreading.com/iot/xerox-printer-vulnerabilities-credential-capture * Malicious App: https://www.bleepingcomputer.com/news/security/spylend-android-malware-downloaded-100-000-times-from-google-play/…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN56 - Massive Bug Puts Outlook Users at Risk | Kimsuky gets RDPWrapper 27:03
27:03
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب27:03
In today’s episode of Exploit Brokers, we dive deep into two major security threats making waves across the digital world. A critical Remote Code Execution (RCE) vulnerability in Microsoft Outlook is putting millions of users at risk, with hackers exploiting it through spear phishing emails and malicious links. Not only that, but we’re also uncovering the stealthy tactics of the notorious North Korean hacking group, Kimsuky. They’re evolving their methods with custom RDP wrappers and proxy tools to evade detection while gaining unauthorized access to systems. Stay informed about the latest threats, learn how to keep your systems secure, and protect yourself from the growing wave of cyberattacks that are more dangerous than ever. #OutlookRCE #Cybersecurity #Hacking #ExploitBrokers #CyberThreats #Phishing #RDPWrapper #Kimsuky #RemoteCodeExecution #MicrosoftSecurity #TechNews #Malware #DataBreach #EmailSecurity #Hackers #InfoSec #SecurityUpdates #cyberdefense 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Show Notes: https://exploitbrokers.com/podcasts/hn56 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources * Kimsuky hackers: https://www.bleepingcomputer.com/news/security/kimsuky-hackers-use-new-custom-rdp-wrapper-for-remote-access/ * RCE in Outlook: https://www.bleepingcomputer.com/news/security/critical-rce-bug-in-microsoft-outlook-now-exploited-in-attacks/…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN55 - Double Zipping Danger: The 7-Zip Exploit That Could Hack Your PC 27:18
27:18
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب27:18
Welcome back to Exploit Brokers! In today’s video, we dive deep into a critical 7‑Zip vulnerability that’s being exploited by Russian cybercriminals to bypass Windows’ security protections. If you’ve used 7‑Zip at all, you need to know how this flaw can let hackers sneak past the Mark-of-the-Web (MOTW) and deploy dangerous malware like Smoke Loader. We'll also explore a parallel threat in the Go ecosystem—malicious packages exploiting caching mechanisms to gain persistent remote access to your system. From double-zipped archives to supply chain attacks, we break down the tactics, the risks, and most importantly, what you can do to protect yourself and your organization. In this video you’ll learn: How the 7‑Zip vulnerability works and why updating to the latest version is crucial. The role of Windows’ MOTW and how hackers are bypassing this key security feature. Details on the deployment of Smoke Loader malware and its implications. How malicious Go packages and supply chain attacks can compromise your systems. Practical tips to safeguard your data and networks against these emerging threats. Stay informed, stay secure—hit that like button, subscribe, and ring the bell for more cybersecurity insights! Drop your questions or thoughts in the comments below—we love hearing from you! #Cybersecurity #7Zip #WindowsSecurity #Malware #SmokeLoader #GoLang #SupplyChainAttack #Cybercrime #InfoSec #Hacking #RussianHackers #APT #NationStateHackers #exploits #ZeroDays 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Show Notes: https://exploitbrokers.com/podcasts/hn55 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources * Malicious Cached Go Modules: https://thehackernews.com/2025/02/malicious-go-package-exploits-module.html * Russian hackers Exploit 7-zip: https://thehackernews.com/2025/02/russian-cybercrime-groups-exploiting-7.html…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN54 - Cybersecurity Experts Reveal LAZARUS GROUP's Hidden Secrets 29:54
29:54
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب29:54
Lazarus Group’s Secret Admin Layer EXPOSED – Major Cybersecurity Discovery! 🔥💻 Security researchers have uncovered a hidden admin layer used by North Korea’s Lazarus Group to manage their Command and Control (C2) servers. This sophisticated network of VPNs and proxies allows them to execute cyberattacks worldwide—mainly targeting cryptocurrency developers and software supply chains. In today’s episode, we break down: ✅ How Lazarus Group operates and funds North Korea’s cybercrime efforts ✅ The Operation 99 attack targeting Web3 developers ✅ The supply chain risks that could impact thousands ✅ How Android 16’s new security features are stepping up protection ✅ Why 2G connectivity and sideloading bans are crucial for mobile security With nation-state hackers, malware campaigns, and evolving cyber threats, it’s more important than ever to stay informed. Don’t forget to like, subscribe, and hit the bell to keep up with the latest in cybersecurity! 💬 What do you think? Are these security updates enough, or do we need even stricter measures? Let me know in the comments! #Cybersecurity #LazarusGroup #Hacking #NorthKorea #Android16 #CyberThreats #Infosec #Malware #TechNews #CryptoSecurity #SupplyChainAttack #EthicalHacking #PrivacyMatters #TechExplained 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Show Notes: https://exploitbrokers.com/podcasts/hn54 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources * Lazarus C2 Infrastructure: https://www.darkreading.com/cyberattacks-data-breaches/researchers-uncover-lazarus-admin-layer-c2-servers * Operation 99: https://securityscorecard.com/blog/operation-99-north-koreas-cyber-assault-on-software-developers/ * Advanced Protection Mode: https://www.androidauthority.com/android-16-advanced-protection-mode-3518368/…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN53 - AI’s Dirty Little Secret: Employees Leaking Data by Accident 24:46
24:46
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب24:46
In this episode, we’re uncovering the darker side of Generative AI and the emerging threats lurking behind everyday tools like ChatGPT and Copilot. Learn how sensitive information—ranging from customer data to employee benefits—can be leaked simply by typing it into a Gen AI prompt. We’ll also expose how cybercriminals are escalating their tactics, hiding malware in places you’d never expect—like Google Ads, YouTube comments, and misleading download links for supposedly “free” or pirated software. 📢 Don’t Forget to: 👍 Like this epsidoe if you found it informative 🔔 Subscribe to Exploit Brokers and hit the bell icon to stay updated with the latest in cybersecurity 💬 Share your thoughts in the comments below – Have you been affected by a data breach? #AI #ChatGPT #GenerativeAI #Cybersecurity #DataLeak #DarkReading #InfoStealer #Malware #GoogleAds #YouTubeComments #TechNews #Hacking #CyberThreats #DataBreach #ExploitBrokers #SecurityTips #TechPodcast 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Show Notes: https://exploitbrokers.com/podcasts/hn53 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources * Google Ads: https://www.darkreading.com/threat-intelligence/cyberattackers-infostealers-youtube-comments-google-search * Employees and Gen AI: https://www.darkreading.com/threat-intelligence/employees-sensitive-data-genai-prompts…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN52 - 800K Volkswagen EVs Hacked! Massive Data Breach & Mirai Botnet Attack Explained 21:55
21:55
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب21:55
🔒🚗 Volkswagen’s Massive 800K EV Data Breach & Mirai Botnet Threats Explained | Exploit Brokers Welcome back to Exploit Brokers! In today’s episode, we dive deep into two major cybersecurity threats shaking the automotive and industrial sectors: Volkswagen’s 800,000 EV Data Breach Discover how a misconfigured Amazon cloud storage led to the exposure of sensitive personal information for Volkswagen, Audi, Seat, and Skoda electric vehicle owners. Learn what data was compromised, the potential risks for affected individuals, and what this means for the future of connected vehicles. Mirai Botnets Targeting Industrial Routers Uncover the latest developments with the Mirai Botnet variant exploiting vulnerabilities in Forfaith industrial routers. Understand how these botnets operate, the scale of their DDoS attacks, and the broader implications for global cybersecurity. 🔍 What You’ll Learn: The specifics of the Volkswagen data breach and its impact on EV owners. How Mirai Botnets are evolving to target industrial infrastructure. The importance of proper cloud configuration and security measures. Tips to protect yourself and your devices from similar cyber threats. 📢 Don’t Forget to: 👍 Like this video if you found it informative 🔔 Subscribe to Exploit Brokers and hit the bell icon to stay updated with the latest in cybersecurity 💬 Share your thoughts in the comments below – Have you been affected by a data breach? #CyberSecurity #DataBreach #VolkswagenHack #MiraiBotnet #EVSecurity #CyberCrime #CloudSecurity #DDoS #IndustrialCyberSecurity #ExploitBrokers #TechNews #CyberThreats #ConnectedCars #IoTSecurity #Malware #ZeroDay #EthicalHacking #TechPodcast 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Show Notes: https://exploitbrokers.com/podcasts/hn52 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources * Volkswagen: https://www.darkreading.com/cyberattacks-data-breaches/volkswagen-breach-exposes-data-of-800k-customers * Mirai: https://thehackernews.com/2025/01/mirai-botnet-variant-exploits-four.html…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN51 - Chinese Hackers Breach U.S. Treasury AND 3M Fake GitHub Stars Exposed 23:16
23:16
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب23:16
In this episode, we dive deep into two explosive cybersecurity stories making headlines right now: a major breach at the U.S. Treasury Department allegedly carried out by Chinese state-sponsored hackers, and the discovery of over 3.1 million fake stars on GitHub used to boost malicious repositories. We’ll explore how third-party vendor BeyondTrust and telecom hacks tie into this growing wave of advanced persistent threats (APTs) and discuss how manipulative tactics on GitHub can sneak malware into widespread use. Whether you’re a seasoned developer or just curious about the rising tide of global cyber threats, this episode will give you an in-depth look at how these hacks happen and why they matter. Stay informed, stay alert, and learn about the latest vulnerabilities, breaches, and protective measures you can take. Don’t forget to like, subscribe, and hit the notification bell for more cybersecurity breakdowns! #Cybersecurity #DataBreach #USTreasuryHack #ChineseHackers #SaltTyphoon #APTGroups #BeyondTrust #GitHub #FakeStars #Malware #CyberThreats #NetworkSecurity #NationStateHackers #APISecurity #SupplyChainAttack #DarkReading #BleepingComputer #Encryption #SoftwareDevelopment #TechNews #HackingUpdate #ZeroDay #Phishing #InformedSecurity #ExploitBrokers 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Show Notes: https://exploitbrokers.com/podcasts/hn51 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources * US Treasury Hacked: https://www.darkreading.com/cyberattacks-data-breaches/chinese-state-hackers-breach-us-treasury-department * Github Fake Stars: https://www.bleepingcomputer.com/news/security/over-31-million-fake-stars-on-github-projects-used-to-boost-rankings/…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN50 - IoT Webcams Hacked & 900k+ Health Records Exposed 25:36
25:36
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب25:36
In this eye-opening episode, we uncover the disturbing reality of IoT webcam vulnerabilities and explore how hackers are leveraging outdated firmware and previously discovered but unpatched exploits to infiltrate personal devices. From prying eyes in your own home to the colossal health data breach exposing over 900,000 patient records, the digital security landscape has never looked more dire. Learn what you can do to protect your data, secure your devices, and safeguard your personal information. We’ll break down the incidents, share insights on the tactics used by cybercriminals, and provide actionable steps to bolster your online defenses. #DataBreach #CyberSecurity #IoTHacks #WebcamSecurity #HealthcareCybersecurity #MedicalData #PrivacyMatters #InformationSecurity #HackerNews #PersonalData #DigitalThreats #Infosec #ProtectYourData #TelehealthSecurity #PatientPrivacy #OnlineSecurity #Malware #DataProtection #NetworkSecurity #FirmwareUpdates 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Show Notes: https://exploitbrokers.com/podcasts/hn50 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers https://exploitbrokers.com/podcasts/hn50/ 🔗 References & Sources * Webcams Hacked: https://www.bleepingcomputer.com/news/security/fbi-spots-hiatusrat-malware-attacks-targeting-web-cameras-dvrs/ * Health Data breach: https://www.bleepingcomputer.com/news/security/connectoncall-breach-exposes-health-data-of-over-910-000-patients/…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN49 - Fortnite Refund Update: Millions Refunded + Lazarus Group’s Crypto Hacks Revealed 23:15
23:15
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب23:15
We’re diving into two major stories shaking up the gaming and cybersecurity worlds! First, we discuss the Fortnite Refund Update, where the FTC has forced Epic Games to refund millions due to their use of dark patterns. Find out if you’re eligible for a refund and how to claim it. Then, we shift gears to the Lazarus Group, North Korea’s infamous hacking collective, and their latest exploit targeting cryptocurrency investors using AI-generated content and Chrome vulnerabilities. Stay informed, protect yourself, and don’t miss these updates! Make sure to like, comment, and subscribe for more in-depth coverage of the latest tech, and cybersecurity news. #FortniteRefundUpdate #FortniteNews #EpicGames #FortniteScandal #GamingNews #FortniteRefunds #DarkPatterns #GamersBeware #CyberSecurity #CryptoHacks #LazarusGroup #Cryptocurrency #GamingIndustry #AIHacks #OnlineSafety #CyberThreats #TechNews #DataBreach #CryptoScams #GamingCommunity 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Show Notes: https://exploitbrokers.com/podcasts/hn49 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources * Fortnite Refunds: https://www.bleepingcomputer.com/news/gaming/ftc-distributes-72-million-in-fortnite-refunds-from-epic-games/ * Defi Lazarus: https://www.bleepingcomputer.com/news/security/lazarus-hackers-used-fake-defi-game-to-exploit-google-chrome-zero-day/…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN48 - Hydra's Dark Web Empire CRUMBLES 21:26
21:26
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب21:26
Uncover the fascinating yet chilling story of Hydra Market, the dark web’s largest illicit empire. Learn how this $1.35 billion platform operated, from smuggling narcotics and laundering money to offering hacking services. We’ll explore how its leader was sentenced to life in prison, the innovative (and illegal) technologies they used, and the global effort to bring it down. Plus, we’ll dive into how cryptocurrencies, Bitcoin mixers, and secret marketplaces fuel the shadowy world of digital crime. Is the Hydra truly gone, or will another head rise in its place? Watch now to find out! 🔍 Topics Covered: How the Hydra Market operated Cryptocurrencies and dark web transactions Smuggling tech: From hidden cars to makeshift labs The global crackdown on dark web crime What this means for the future of cybersecurity #HydraMarket #DarkWebExplained #Cybercrime #BitcoinMixer #Hacking #DarkNet #DigitalSecurity #CryptoCrime #TrueCrimeStories #CyberThreats 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources * Hydra Dark Web Market: https://www.bleepingcomputer.com/news/security/russia-sentences-hydra-dark-web-market-leader-to-life-in-prison/ * DDos Satellite: https://www.bleepingcomputer.com/news/security/korea-arrests-ceo-for-adding-ddos-feature-to-satellite-receivers/…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN47 - Andrew Tate’s Platform Hacked by Activists + Russian Hackers Exploit Zero-Days 18:03
18:03
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب18:03
Andrew Tate's platform, formerly known as Hustler’s University, has been hacked, exposing the data of over 800,000 users. Meanwhile, Russian hackers have exploited critical zero-day vulnerabilities in Firefox and Windows, demonstrating the growing sophistication of cyberattacks. In this video, we’ll break down the Andrew Tate hack, the implications of leaked user data, and how Russian threat actors are chaining vulnerabilities for remote code execution. Stay informed on the latest in cybersecurity and learn how to protect yourself against these emerging threats. If you enjoy this content, don’t forget to like, comment, and subscribe to stay updated on the latest in digital crime and cybersecurity! #AndrewTate #Cybersecurity #Hackers #DataBreach #ZeroDay #RussianHackers #HustlersUniversity #TheRealWorld #CyberThreats #DigitalSafety #Malware #Hacktivism #DataLeaks #FirefoxExploit #WindowsExploit #NationStateHackers #TechNews #OnlineSecurity #TheRealWorld 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources * Firefox Hacked By Russian Hackers: https://www.bleepingcomputer.com/news/security/firefox-and-windows-zero-days-exploited-by-russian-romcom-hackers/ * Andrew Tate's The Real World Hacked: https://www.malwarebytes.com/blog/news/2024/11/hilariously-insecure-andrew-tates-the-real-world-breached-800000-users-affected * DDoScecrets: https://ddosecrets.com/article/andrew-tate-s-the-real-world…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN46 - Phobos’ $16M Haul & Helldown’s Secret Exploits – 2024’s Ransomware Crisis 27:53
27:53
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب27:53
In this episode, we dive deep into the world of ransomware with two of 2024's most talked-about threats: Phobos and Helldown. Learn how the Phobos ransomware operation managed to dominate 11% of the market, generating $16 million in ransom payments, and the shocking details of its admin’s extradition to the U.S. We also explore the rise of Helldown ransomware, its exploitation of VPN vulnerabilities, and how these attacks are reshaping cybersecurity globally. If you’re curious about how ransomware works, the evolution of cybercrime, and what it means for businesses and individuals, this video is packed with insights. Don’t forget to like, subscribe, and hit the notification bell to stay updated on the latest cybersecurity trends. Key Topics Covered: What is ransomware-as-a-service (RaaS)? How Phobos became a major player in 2024. Helldown ransomware’s exploitation of undisclosed VPN vulnerabilities. Tips to secure your network and stay ahead of cybercriminals. Join the discussion in the comments! What’s your biggest takeaway from these cases? #Ransomware #PhobosRansomware #HelldownRansomware #Cybersecurity #CyberCrime #RansomwareExplained #Hacking #DataBreach #VPNSecurity #TechNews #PhobosAdmin #HelldownExploits #CyberThreats #ZeroDay #NationStateHacks #DigitalCrime #CybersecurityAwareness #OnlineSafety #RansomwareAttack #TechExplained #2024Trends #DataSecurity #NetworkSecurity #Hackers #CyberAttack #VPNVulnerabilities #DataProtection #TechTalks #CyberDefense #SecurityTips #PhobosVsHelldown 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources * Helldown ransomware: https://www.bleepingcomputer.com/news/security/helldown-ransomware-exploits-zyxel-vpn-flaw-to-breach-networks/ * Phobos admin charged: https://www.bleepingcomputer.com/news/security/us-charges-phobos-ransomware-admin-after-south-korea-extradition/…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN45 - Malware Madness: How Remcos RAT and Human Error Fuel Cyber Threats 33:15
33:15
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب33:15
In today's episode, we dive deep into the fascinating yet troubling world of cybersecurity, exploring how even the most advanced antivirus software, firewalls, and endpoint security measures can fall short due to a single factor: human error. Despite the latest tech solutions, hackers continue to exploit one consistent vulnerability—users clicking on suspicious links and files. We'll discuss how phishing emails, malware, and outdated software create an entryway for cybercriminals, even in some of the most secure environments. Using two real-world cases, we’ll uncover how modern-day malware such as Remcos RAT and Smoke Loader Trojan bypass standard security protocols. These cyber threats often use a combination of remote code execution (RCE) vulnerabilities, phishing emails disguised as business orders, and cleverly crafted zip files that hide malicious content. What’s even more shocking? These vulnerabilities have been known for years, yet are still exploited due to outdated software and a lack of user awareness. Whether you're an individual trying to protect your personal data or part of an organization concerned with cybersecurity, this video is packed with insights on staying safe online. Learn how to spot phishing attempts, recognize the importance of regular software updates, and understand why cybersecurity training is essential to protecting yourself and your organization from potential threats. If you enjoy this breakdown, don’t forget to hit the like button, subscribe, and click the notification bell to stay updated with more cybersecurity insights! Your support helps the channel grow and allows us to bring more content your way. Let’s keep your digital world safe—one informed click at a time. #Cybersecurity #Malware #DataBreach #Phishing #CyberThreats #RemoteCodeExecution #RemcosRAT #SmokeLoader #UserAwareness #TechNews #CyberAttack #OnlineSafety #DigitalSecurity #Antivirus #CyberHygiene #TechExplained #StaySafeOnline #CybersecurityTips #DataProtection #Infosec 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources Remcos RAT: https://www.darkreading.com/application-security/revamped-remcos-rat-microsoft-windows-users ZIP Files Abused: https://www.darkreading.com/threat-intelligence/flexible-structure-zip-archives-exploited-hide-malware-undetected…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN44 - Malicious Crack Tools & Malvertising Attack: How Hackers Steal Your Data 22:42
22:42
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب22:42
In today's episode, we’re diving into the hidden dangers of malicious installers, software cracks, and deceptive ads on Google. We'll explore recent stories, including the SteelFox malware that's hijacking Windows PCs, stealing credit card data, and mining cryptocurrency using vulnerable drivers. Plus, we’ll uncover a new wave of malvertising attack scams targeting eBay users and how scammers are leveraging Google Ads to lure unsuspecting victims into calling fake support numbers. With digital crime and data breaches on the rise, it’s essential to stay informed and protect yourself from these evolving threats. Tune in as we break down the techniques hackers are using to bypass antivirus software, escalate system privileges, and steal valuable data – and what you can do to avoid falling victim to these cyber threats. Whether you're a tech enthusiast, developer, or just curious about cybersecurity, this episode is packed with insights that could save you from a dangerous download! #MalvertisingAttack #CyberSecurity #Malware #Hacking #DataBreach #DigitalCrime #SteelFox #Malvertising #GoogleAds #DataPrivacy #CyberThreats #Hackers #DataProtection #DigitalSecurity #CryptoMining #Antivirus #VulnerableDrivers #NationStateHacking #SystemPrivilege #Ransomware #APT #SoftwareCracks #MaliciousSoftware #OnlineScams #eBayScam #Torrents #CyberAwareness #InfoStealer #FakeSupport #SocialEngineering #HackersExplained 👍 Enjoyed the video? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources SteelFox Article: https://www.bleepingcomputer.com/news/security/new-steelfox-malware-hijacks-windows-pcs-using-vulnerable-driver/ SteelFox Technical: https://securelist.com/steelfox-trojan-drops-stealer-and-miner/114414/ Ebay Malvertising Attack: https://www.malwarebytes.com/blog/scams/2024/11/large-ebay-malvertising-campaign-leads-to-scams…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN43 - Dutch Police Take Down Major Information Stealers: Redline & Meta Stealer 10:45
10:45
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب10:45
In a significant international operation, Dutch police and global law enforcement partners have taken down two major information stealers: Redline and Meta Stealer. These dangerous malware operations targeted thousands of victims worldwide, stealing passwords, sensitive data, and more. This video explores how law enforcement agencies worked together to dismantle their infrastructure, taking down over 1,200 servers with malware in dozens of countries. We'll also discuss how information stealers operate, their connection to cryptocurrency laundering, and what this takedown means for the ongoing battle against cybercrime. Watch now to learn more about this landmark cybersecurity victory! If you found this video informative, please like, share, and subscribe for more cybersecurity news, updates, and insights. Don’t forget to hit the notification bell to stay updated! #CyberSecurity #RedlineStealer #MetaStealer #InformationStealer #DutchPolice #Cybercrime #MalwareTakedown #OperationMadness #InfoStealer #CyberThreats #MalwareAsAService #Hacking #DataBreach #CyberAttack #CyberLaw #DigitalForensics #LawEnforcement #InternationalPolice #CyberWar #ThreatIntelligence #MalwareAnalysis #Ransomware #CryptoLaundering #DataExfiltration #CyberAwareness #CyberDefense #DataProtection #OnlineSafety #Hackers #MalwarePrevention #CybersecurityNews 👍 Enjoyed the episode? Give us a follow and a review! Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources Dutch Disrupt Info Stealers: https://thehackernews.com/2024/10/dutch-police-disrupt-major-info.html…
مرحبًا بك في مشغل أف ام!
يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.