Player FM - Internet Radio Done Right
Checked 19d ago
three 年前已添加!
Nội dung được cung cấp bởi Exploit Brokers. Tất cả nội dung podcast bao gồm các tập, đồ họa và mô tả podcast đều được Exploit Brokers hoặc đối tác nền tảng podcast của họ tải lên và cung cấp trực tiếp. Nếu bạn cho rằng ai đó đang sử dụng tác phẩm có bản quyền của bạn mà không có sự cho phép của bạn, bạn có thể làm theo quy trình được nêu ở đây https://vi.player.fm/legal.
Player FM - Ứng dụng Podcast
Chuyển sang chế độ ngoại tuyến với ứng dụng Player FM !
Chuyển sang chế độ ngoại tuyến với ứng dụng Player FM !
Podcast đáng để nghe
TÀI TRỢ BỞI
We're trying something different this week: a full post-show breakdown of every episode in the latest season of Black Mirror! Ari Romero is joined by Tudum's Black Mirror expert, Keisha Hatchett, to give you all the nuance, the insider commentary, and the details you might have missed in this incredible new season. Plus commentary from creator & showrunner Charlie Brooker! SPOILER ALERT: We're talking about the new season in detail and revealing key plot points. If you haven't watched yet, and you don't want to know what happens, turn back now! You can watch all seven seasons of Black Mirror now in your personalized virtual theater . Follow Netflix Podcasts and read more about Black Mirror on Tudum.com .…
HN56 - Massive Bug Puts Outlook Users at Risk | Kimsuky gets RDPWrapper
Manage episode 466449905 series 3144149
Nội dung được cung cấp bởi Exploit Brokers. Tất cả nội dung podcast bao gồm các tập, đồ họa và mô tả podcast đều được Exploit Brokers hoặc đối tác nền tảng podcast của họ tải lên và cung cấp trực tiếp. Nếu bạn cho rằng ai đó đang sử dụng tác phẩm có bản quyền của bạn mà không có sự cho phép của bạn, bạn có thể làm theo quy trình được nêu ở đây https://vi.player.fm/legal.
In today’s episode of Exploit Brokers, we dive deep into two major security threats making waves across the digital world. A critical Remote Code Execution (RCE) vulnerability in Microsoft Outlook is putting millions of users at risk, with hackers exploiting it through spear phishing emails and malicious links. Not only that, but we’re also uncovering the stealthy tactics of the notorious North Korean hacking group, Kimsuky. They’re evolving their methods with custom RDP wrappers and proxy tools to evade detection while gaining unauthorized access to systems. Stay informed about the latest threats, learn how to keep your systems secure, and protect yourself from the growing wave of cyberattacks that are more dangerous than ever. #OutlookRCE #Cybersecurity #Hacking #ExploitBrokers #CyberThreats #Phishing #RDPWrapper #Kimsuky #RemoteCodeExecution #MicrosoftSecurity #TechNews #Malware #DataBreach #EmailSecurity #Hackers #InfoSec #SecurityUpdates #cyberdefense 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Show Notes: https://exploitbrokers.com/podcasts/hn56 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources * Kimsuky hackers: https://www.bleepingcomputer.com/news/security/kimsuky-hackers-use-new-custom-rdp-wrapper-for-remote-access/ * RCE in Outlook: https://www.bleepingcomputer.com/news/security/critical-rce-bug-in-microsoft-outlook-now-exploited-in-attacks/
…
continue reading
55 tập
Manage episode 466449905 series 3144149
Nội dung được cung cấp bởi Exploit Brokers. Tất cả nội dung podcast bao gồm các tập, đồ họa và mô tả podcast đều được Exploit Brokers hoặc đối tác nền tảng podcast của họ tải lên và cung cấp trực tiếp. Nếu bạn cho rằng ai đó đang sử dụng tác phẩm có bản quyền của bạn mà không có sự cho phép của bạn, bạn có thể làm theo quy trình được nêu ở đây https://vi.player.fm/legal.
In today’s episode of Exploit Brokers, we dive deep into two major security threats making waves across the digital world. A critical Remote Code Execution (RCE) vulnerability in Microsoft Outlook is putting millions of users at risk, with hackers exploiting it through spear phishing emails and malicious links. Not only that, but we’re also uncovering the stealthy tactics of the notorious North Korean hacking group, Kimsuky. They’re evolving their methods with custom RDP wrappers and proxy tools to evade detection while gaining unauthorized access to systems. Stay informed about the latest threats, learn how to keep your systems secure, and protect yourself from the growing wave of cyberattacks that are more dangerous than ever. #OutlookRCE #Cybersecurity #Hacking #ExploitBrokers #CyberThreats #Phishing #RDPWrapper #Kimsuky #RemoteCodeExecution #MicrosoftSecurity #TechNews #Malware #DataBreach #EmailSecurity #Hackers #InfoSec #SecurityUpdates #cyberdefense 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Show Notes: https://exploitbrokers.com/podcasts/hn56 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources * Kimsuky hackers: https://www.bleepingcomputer.com/news/security/kimsuky-hackers-use-new-custom-rdp-wrapper-for-remote-access/ * RCE in Outlook: https://www.bleepingcomputer.com/news/security/critical-rce-bug-in-microsoft-outlook-now-exploited-in-attacks/
…
continue reading
55 tập
همه قسمت ها
×
1 HN59 - Microsoft AI Discovers 20 Zero-Day Vulnerabilities in Bootloaders! 19:22
19:22
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích19:22
# Title * HN59 - Microsoft AI Discovers 20 Zero-Day Vulnerabilities in Bootloaders! ## Description 🔍 Microsoft’s AI Uncovers 20 Zero-Day Threats | CoffeeLoader Malware Gets Smarter In this episode of Exploit Brokers, Cipherceval dives into how Microsoft Security Copilot, powered by AI, discovered over 20 previously unknown vulnerabilities in popular bootloaders like GRUB2, U-Boot, and Barebox. These flaws could allow attackers to bypass Secure Boot and install stealthy bootkits. We also explore the terrifying evolution of CoffeeLoader malware — now equipped with GPU-based cloaking, Windows fibers, and sleep obfuscation — making it one of the most advanced malware loaders in circulation today. Whether you're into cybersecurity, AI advancements, or just curious about the future of hacking and defense, this episode breaks it all down. 📌 Like, Subscribe & Hit the Bell to stay ahead of the threats! #CyberSecurity #AI #MicrosoftCopilot #CoffeeLoader #Malware #Rootkit #ZeroDay #ExploitBrokers #InfoSec #Hacking #EDREvasion 💬 What’s your take on AI in security? Tool or threat? Drop your thoughts below! 🎙️ Hosted by Cipherceval | Exploit Brokers Podcast 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Show Notes: https://exploitbrokers.com/podcasts/hn59 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers ⏱️ Timeline: 00:00 – Intro 00:44 – Microsoft AI Finds 20+ Critical Bootloader Vulnerabilities 10:02 – CoffeeLoader Malware’s Advanced Evasion Techniques 17:50 – Final Thoughts: AI in Cybersecurity & What Comes Next 🔗 References & Sources * Microsoft Uses AI for Security: https://www.bleepingcomputer.com/news/security/microsoft-uses-ai-to-find-flaws-in-grub2-u-boot-barebox-bootloaders/ * CoffeeLoader: https://www.darkreading.com/threat-intelligence/coffeeloader-malware-evasion-tricks…

1 HN58 - Havoc in the Cloud: The Shocking Click Fix Exploit Revealed 24:22
24:22
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích24:22
Welcome to Exploit Brokers with your host Cipherceval! In this deep dive, we uncover a sophisticated cyber assault where hackers exploited Microsoft SharePoint to launch the Havoc C2 via a stealthy click fix attack. Learn how a single click can trigger malicious PowerShell commands, turning everyday corporate tools into gateways for cybercrime. In this episode, we explore: • How click fix attacks trick users into executing harmful commands • The role of social engineering in modern cyber warfare • The rising threat of ransomware targeting Middle Eastern banks and financial institutions • The importance of patching, penetration testing, and proactive cybersecurity measures Whether you're a cybersecurity expert or just curious about digital threats, this breakdown provides essential insights into how cybercriminals are reshaping the rules of digital warfare. Stay informed and protect yourself from these evolving dangers. Don't forget to like, subscribe, and hit the bell icon for more updates on cybersecurity trends! #CyberSecurity #HavocC2 #ClickFix #SharePointHack #Ransomware #DigitalWarfare #CyberAttack #Malware #SocialEngineering #ExploitBrokers 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Show Notes: https://exploitbrokers.com/podcasts/hn58 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers Timeline: 0:00 Intro 0:19 Opener 0:45 Subscribe 1:06 Sharepoint Malware 12:03 Ransomware Targets Middle East banks 23:36 Conclusion and Outro 🔗 References & Sources * ClickFix Attack: https://www.bleepingcomputer.com/news/security/new-clickfix-attack-deploys-havoc-c2-via-microsoft-sharepoint/ * UAE : https://www.darkreading.com/cyber-risk/targeted-ransomware-middle-east-banks-security…

1 HN57 - Unmasking SpyLoan: The Android Malware Preying on Loan Seekers 20:32
20:32
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích20:32
In this episode of Exploit Brokers, we dive into the dark world of cybercrime, exploring two alarming topics: a malicious Android loan app masquerading as a financial tool and Xerox printer vulnerabilities that could be leaking your credentials. Learn how loan sharks have moved from traditional methods to sophisticated digital predation, exploiting unsuspecting users via apps like SpyLoan. We break down how these apps bypass Google Play's protections, steal sensitive data, and push predatory lending practices, especially targeting vulnerable users. Additionally, we uncover how attackers are using patched vulnerabilities in Xerox Versalink C7025 printers to manipulate configurations, capture user credentials, and potentially gain lateral access to entire Windows environments. Whether you're a tech enthusiast or a cybersecurity professional, this episode offers valuable insights into how digital crime is evolving and what you can do to protect yourself. Don't forget to like, subscribe, and hit the notification bell for more in-depth analyses on cybersecurity threats and exploits. #CyberSecurity #AndroidMalware #LoanSharks #XeroxPrinterHack #DataBreach #DigitalCrime #SpyLoan #CyberThreats #ExploitBrokers #TechNews 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Show Notes: https://exploitbrokers.com/podcasts/hn57 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources * Xerox: https://www.darkreading.com/iot/xerox-printer-vulnerabilities-credential-capture * Malicious App: https://www.bleepingcomputer.com/news/security/spylend-android-malware-downloaded-100-000-times-from-google-play/…

1 HN56 - Massive Bug Puts Outlook Users at Risk | Kimsuky gets RDPWrapper 27:03
27:03
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích27:03
In today’s episode of Exploit Brokers, we dive deep into two major security threats making waves across the digital world. A critical Remote Code Execution (RCE) vulnerability in Microsoft Outlook is putting millions of users at risk, with hackers exploiting it through spear phishing emails and malicious links. Not only that, but we’re also uncovering the stealthy tactics of the notorious North Korean hacking group, Kimsuky. They’re evolving their methods with custom RDP wrappers and proxy tools to evade detection while gaining unauthorized access to systems. Stay informed about the latest threats, learn how to keep your systems secure, and protect yourself from the growing wave of cyberattacks that are more dangerous than ever. #OutlookRCE #Cybersecurity #Hacking #ExploitBrokers #CyberThreats #Phishing #RDPWrapper #Kimsuky #RemoteCodeExecution #MicrosoftSecurity #TechNews #Malware #DataBreach #EmailSecurity #Hackers #InfoSec #SecurityUpdates #cyberdefense 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Show Notes: https://exploitbrokers.com/podcasts/hn56 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources * Kimsuky hackers: https://www.bleepingcomputer.com/news/security/kimsuky-hackers-use-new-custom-rdp-wrapper-for-remote-access/ * RCE in Outlook: https://www.bleepingcomputer.com/news/security/critical-rce-bug-in-microsoft-outlook-now-exploited-in-attacks/…

1 HN55 - Double Zipping Danger: The 7-Zip Exploit That Could Hack Your PC 27:18
27:18
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích27:18
Welcome back to Exploit Brokers! In today’s video, we dive deep into a critical 7‑Zip vulnerability that’s being exploited by Russian cybercriminals to bypass Windows’ security protections. If you’ve used 7‑Zip at all, you need to know how this flaw can let hackers sneak past the Mark-of-the-Web (MOTW) and deploy dangerous malware like Smoke Loader. We'll also explore a parallel threat in the Go ecosystem—malicious packages exploiting caching mechanisms to gain persistent remote access to your system. From double-zipped archives to supply chain attacks, we break down the tactics, the risks, and most importantly, what you can do to protect yourself and your organization. In this video you’ll learn: How the 7‑Zip vulnerability works and why updating to the latest version is crucial. The role of Windows’ MOTW and how hackers are bypassing this key security feature. Details on the deployment of Smoke Loader malware and its implications. How malicious Go packages and supply chain attacks can compromise your systems. Practical tips to safeguard your data and networks against these emerging threats. Stay informed, stay secure—hit that like button, subscribe, and ring the bell for more cybersecurity insights! Drop your questions or thoughts in the comments below—we love hearing from you! #Cybersecurity #7Zip #WindowsSecurity #Malware #SmokeLoader #GoLang #SupplyChainAttack #Cybercrime #InfoSec #Hacking #RussianHackers #APT #NationStateHackers #exploits #ZeroDays 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Show Notes: https://exploitbrokers.com/podcasts/hn55 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources * Malicious Cached Go Modules: https://thehackernews.com/2025/02/malicious-go-package-exploits-module.html * Russian hackers Exploit 7-zip: https://thehackernews.com/2025/02/russian-cybercrime-groups-exploiting-7.html…

1 HN54 - Cybersecurity Experts Reveal LAZARUS GROUP's Hidden Secrets 29:54
29:54
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích29:54
Lazarus Group’s Secret Admin Layer EXPOSED – Major Cybersecurity Discovery! 🔥💻 Security researchers have uncovered a hidden admin layer used by North Korea’s Lazarus Group to manage their Command and Control (C2) servers. This sophisticated network of VPNs and proxies allows them to execute cyberattacks worldwide—mainly targeting cryptocurrency developers and software supply chains. In today’s episode, we break down: ✅ How Lazarus Group operates and funds North Korea’s cybercrime efforts ✅ The Operation 99 attack targeting Web3 developers ✅ The supply chain risks that could impact thousands ✅ How Android 16’s new security features are stepping up protection ✅ Why 2G connectivity and sideloading bans are crucial for mobile security With nation-state hackers, malware campaigns, and evolving cyber threats, it’s more important than ever to stay informed. Don’t forget to like, subscribe, and hit the bell to keep up with the latest in cybersecurity! 💬 What do you think? Are these security updates enough, or do we need even stricter measures? Let me know in the comments! #Cybersecurity #LazarusGroup #Hacking #NorthKorea #Android16 #CyberThreats #Infosec #Malware #TechNews #CryptoSecurity #SupplyChainAttack #EthicalHacking #PrivacyMatters #TechExplained 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Show Notes: https://exploitbrokers.com/podcasts/hn54 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources * Lazarus C2 Infrastructure: https://www.darkreading.com/cyberattacks-data-breaches/researchers-uncover-lazarus-admin-layer-c2-servers * Operation 99: https://securityscorecard.com/blog/operation-99-north-koreas-cyber-assault-on-software-developers/ * Advanced Protection Mode: https://www.androidauthority.com/android-16-advanced-protection-mode-3518368/…

1 HN53 - AI’s Dirty Little Secret: Employees Leaking Data by Accident 24:46
24:46
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích24:46
In this episode, we’re uncovering the darker side of Generative AI and the emerging threats lurking behind everyday tools like ChatGPT and Copilot. Learn how sensitive information—ranging from customer data to employee benefits—can be leaked simply by typing it into a Gen AI prompt. We’ll also expose how cybercriminals are escalating their tactics, hiding malware in places you’d never expect—like Google Ads, YouTube comments, and misleading download links for supposedly “free” or pirated software. 📢 Don’t Forget to: 👍 Like this epsidoe if you found it informative 🔔 Subscribe to Exploit Brokers and hit the bell icon to stay updated with the latest in cybersecurity 💬 Share your thoughts in the comments below – Have you been affected by a data breach? #AI #ChatGPT #GenerativeAI #Cybersecurity #DataLeak #DarkReading #InfoStealer #Malware #GoogleAds #YouTubeComments #TechNews #Hacking #CyberThreats #DataBreach #ExploitBrokers #SecurityTips #TechPodcast 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Show Notes: https://exploitbrokers.com/podcasts/hn53 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources * Google Ads: https://www.darkreading.com/threat-intelligence/cyberattackers-infostealers-youtube-comments-google-search * Employees and Gen AI: https://www.darkreading.com/threat-intelligence/employees-sensitive-data-genai-prompts…

1 HN52 - 800K Volkswagen EVs Hacked! Massive Data Breach & Mirai Botnet Attack Explained 21:55
21:55
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích21:55
🔒🚗 Volkswagen’s Massive 800K EV Data Breach & Mirai Botnet Threats Explained | Exploit Brokers Welcome back to Exploit Brokers! In today’s episode, we dive deep into two major cybersecurity threats shaking the automotive and industrial sectors: Volkswagen’s 800,000 EV Data Breach Discover how a misconfigured Amazon cloud storage led to the exposure of sensitive personal information for Volkswagen, Audi, Seat, and Skoda electric vehicle owners. Learn what data was compromised, the potential risks for affected individuals, and what this means for the future of connected vehicles. Mirai Botnets Targeting Industrial Routers Uncover the latest developments with the Mirai Botnet variant exploiting vulnerabilities in Forfaith industrial routers. Understand how these botnets operate, the scale of their DDoS attacks, and the broader implications for global cybersecurity. 🔍 What You’ll Learn: The specifics of the Volkswagen data breach and its impact on EV owners. How Mirai Botnets are evolving to target industrial infrastructure. The importance of proper cloud configuration and security measures. Tips to protect yourself and your devices from similar cyber threats. 📢 Don’t Forget to: 👍 Like this video if you found it informative 🔔 Subscribe to Exploit Brokers and hit the bell icon to stay updated with the latest in cybersecurity 💬 Share your thoughts in the comments below – Have you been affected by a data breach? #CyberSecurity #DataBreach #VolkswagenHack #MiraiBotnet #EVSecurity #CyberCrime #CloudSecurity #DDoS #IndustrialCyberSecurity #ExploitBrokers #TechNews #CyberThreats #ConnectedCars #IoTSecurity #Malware #ZeroDay #EthicalHacking #TechPodcast 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Show Notes: https://exploitbrokers.com/podcasts/hn52 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources * Volkswagen: https://www.darkreading.com/cyberattacks-data-breaches/volkswagen-breach-exposes-data-of-800k-customers * Mirai: https://thehackernews.com/2025/01/mirai-botnet-variant-exploits-four.html…

1 HN51 - Chinese Hackers Breach U.S. Treasury AND 3M Fake GitHub Stars Exposed 23:16
23:16
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích23:16
In this episode, we dive deep into two explosive cybersecurity stories making headlines right now: a major breach at the U.S. Treasury Department allegedly carried out by Chinese state-sponsored hackers, and the discovery of over 3.1 million fake stars on GitHub used to boost malicious repositories. We’ll explore how third-party vendor BeyondTrust and telecom hacks tie into this growing wave of advanced persistent threats (APTs) and discuss how manipulative tactics on GitHub can sneak malware into widespread use. Whether you’re a seasoned developer or just curious about the rising tide of global cyber threats, this episode will give you an in-depth look at how these hacks happen and why they matter. Stay informed, stay alert, and learn about the latest vulnerabilities, breaches, and protective measures you can take. Don’t forget to like, subscribe, and hit the notification bell for more cybersecurity breakdowns! #Cybersecurity #DataBreach #USTreasuryHack #ChineseHackers #SaltTyphoon #APTGroups #BeyondTrust #GitHub #FakeStars #Malware #CyberThreats #NetworkSecurity #NationStateHackers #APISecurity #SupplyChainAttack #DarkReading #BleepingComputer #Encryption #SoftwareDevelopment #TechNews #HackingUpdate #ZeroDay #Phishing #InformedSecurity #ExploitBrokers 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Show Notes: https://exploitbrokers.com/podcasts/hn51 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources * US Treasury Hacked: https://www.darkreading.com/cyberattacks-data-breaches/chinese-state-hackers-breach-us-treasury-department * Github Fake Stars: https://www.bleepingcomputer.com/news/security/over-31-million-fake-stars-on-github-projects-used-to-boost-rankings/…

1 HN50 - IoT Webcams Hacked & 900k+ Health Records Exposed 25:36
25:36
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích25:36
In this eye-opening episode, we uncover the disturbing reality of IoT webcam vulnerabilities and explore how hackers are leveraging outdated firmware and previously discovered but unpatched exploits to infiltrate personal devices. From prying eyes in your own home to the colossal health data breach exposing over 900,000 patient records, the digital security landscape has never looked more dire. Learn what you can do to protect your data, secure your devices, and safeguard your personal information. We’ll break down the incidents, share insights on the tactics used by cybercriminals, and provide actionable steps to bolster your online defenses. #DataBreach #CyberSecurity #IoTHacks #WebcamSecurity #HealthcareCybersecurity #MedicalData #PrivacyMatters #InformationSecurity #HackerNews #PersonalData #DigitalThreats #Infosec #ProtectYourData #TelehealthSecurity #PatientPrivacy #OnlineSecurity #Malware #DataProtection #NetworkSecurity #FirmwareUpdates 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Show Notes: https://exploitbrokers.com/podcasts/hn50 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers https://exploitbrokers.com/podcasts/hn50/ 🔗 References & Sources * Webcams Hacked: https://www.bleepingcomputer.com/news/security/fbi-spots-hiatusrat-malware-attacks-targeting-web-cameras-dvrs/ * Health Data breach: https://www.bleepingcomputer.com/news/security/connectoncall-breach-exposes-health-data-of-over-910-000-patients/…

1 HN49 - Fortnite Refund Update: Millions Refunded + Lazarus Group’s Crypto Hacks Revealed 23:15
23:15
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích23:15
We’re diving into two major stories shaking up the gaming and cybersecurity worlds! First, we discuss the Fortnite Refund Update, where the FTC has forced Epic Games to refund millions due to their use of dark patterns. Find out if you’re eligible for a refund and how to claim it. Then, we shift gears to the Lazarus Group, North Korea’s infamous hacking collective, and their latest exploit targeting cryptocurrency investors using AI-generated content and Chrome vulnerabilities. Stay informed, protect yourself, and don’t miss these updates! Make sure to like, comment, and subscribe for more in-depth coverage of the latest tech, and cybersecurity news. #FortniteRefundUpdate #FortniteNews #EpicGames #FortniteScandal #GamingNews #FortniteRefunds #DarkPatterns #GamersBeware #CyberSecurity #CryptoHacks #LazarusGroup #Cryptocurrency #GamingIndustry #AIHacks #OnlineSafety #CyberThreats #TechNews #DataBreach #CryptoScams #GamingCommunity 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Show Notes: https://exploitbrokers.com/podcasts/hn49 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources * Fortnite Refunds: https://www.bleepingcomputer.com/news/gaming/ftc-distributes-72-million-in-fortnite-refunds-from-epic-games/ * Defi Lazarus: https://www.bleepingcomputer.com/news/security/lazarus-hackers-used-fake-defi-game-to-exploit-google-chrome-zero-day/…

1 HN48 - Hydra's Dark Web Empire CRUMBLES 21:26
21:26
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích21:26
Uncover the fascinating yet chilling story of Hydra Market, the dark web’s largest illicit empire. Learn how this $1.35 billion platform operated, from smuggling narcotics and laundering money to offering hacking services. We’ll explore how its leader was sentenced to life in prison, the innovative (and illegal) technologies they used, and the global effort to bring it down. Plus, we’ll dive into how cryptocurrencies, Bitcoin mixers, and secret marketplaces fuel the shadowy world of digital crime. Is the Hydra truly gone, or will another head rise in its place? Watch now to find out! 🔍 Topics Covered: How the Hydra Market operated Cryptocurrencies and dark web transactions Smuggling tech: From hidden cars to makeshift labs The global crackdown on dark web crime What this means for the future of cybersecurity #HydraMarket #DarkWebExplained #Cybercrime #BitcoinMixer #Hacking #DarkNet #DigitalSecurity #CryptoCrime #TrueCrimeStories #CyberThreats 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources * Hydra Dark Web Market: https://www.bleepingcomputer.com/news/security/russia-sentences-hydra-dark-web-market-leader-to-life-in-prison/ * DDos Satellite: https://www.bleepingcomputer.com/news/security/korea-arrests-ceo-for-adding-ddos-feature-to-satellite-receivers/…

1 HN47 - Andrew Tate’s Platform Hacked by Activists + Russian Hackers Exploit Zero-Days 18:03
18:03
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích18:03
Andrew Tate's platform, formerly known as Hustler’s University, has been hacked, exposing the data of over 800,000 users. Meanwhile, Russian hackers have exploited critical zero-day vulnerabilities in Firefox and Windows, demonstrating the growing sophistication of cyberattacks. In this video, we’ll break down the Andrew Tate hack, the implications of leaked user data, and how Russian threat actors are chaining vulnerabilities for remote code execution. Stay informed on the latest in cybersecurity and learn how to protect yourself against these emerging threats. If you enjoy this content, don’t forget to like, comment, and subscribe to stay updated on the latest in digital crime and cybersecurity! #AndrewTate #Cybersecurity #Hackers #DataBreach #ZeroDay #RussianHackers #HustlersUniversity #TheRealWorld #CyberThreats #DigitalSafety #Malware #Hacktivism #DataLeaks #FirefoxExploit #WindowsExploit #NationStateHackers #TechNews #OnlineSecurity #TheRealWorld 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources * Firefox Hacked By Russian Hackers: https://www.bleepingcomputer.com/news/security/firefox-and-windows-zero-days-exploited-by-russian-romcom-hackers/ * Andrew Tate's The Real World Hacked: https://www.malwarebytes.com/blog/news/2024/11/hilariously-insecure-andrew-tates-the-real-world-breached-800000-users-affected * DDoScecrets: https://ddosecrets.com/article/andrew-tate-s-the-real-world…

1 HN46 - Phobos’ $16M Haul & Helldown’s Secret Exploits – 2024’s Ransomware Crisis 27:53
27:53
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích27:53
In this episode, we dive deep into the world of ransomware with two of 2024's most talked-about threats: Phobos and Helldown. Learn how the Phobos ransomware operation managed to dominate 11% of the market, generating $16 million in ransom payments, and the shocking details of its admin’s extradition to the U.S. We also explore the rise of Helldown ransomware, its exploitation of VPN vulnerabilities, and how these attacks are reshaping cybersecurity globally. If you’re curious about how ransomware works, the evolution of cybercrime, and what it means for businesses and individuals, this video is packed with insights. Don’t forget to like, subscribe, and hit the notification bell to stay updated on the latest cybersecurity trends. Key Topics Covered: What is ransomware-as-a-service (RaaS)? How Phobos became a major player in 2024. Helldown ransomware’s exploitation of undisclosed VPN vulnerabilities. Tips to secure your network and stay ahead of cybercriminals. Join the discussion in the comments! What’s your biggest takeaway from these cases? #Ransomware #PhobosRansomware #HelldownRansomware #Cybersecurity #CyberCrime #RansomwareExplained #Hacking #DataBreach #VPNSecurity #TechNews #PhobosAdmin #HelldownExploits #CyberThreats #ZeroDay #NationStateHacks #DigitalCrime #CybersecurityAwareness #OnlineSafety #RansomwareAttack #TechExplained #2024Trends #DataSecurity #NetworkSecurity #Hackers #CyberAttack #VPNVulnerabilities #DataProtection #TechTalks #CyberDefense #SecurityTips #PhobosVsHelldown 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources * Helldown ransomware: https://www.bleepingcomputer.com/news/security/helldown-ransomware-exploits-zyxel-vpn-flaw-to-breach-networks/ * Phobos admin charged: https://www.bleepingcomputer.com/news/security/us-charges-phobos-ransomware-admin-after-south-korea-extradition/…

1 HN45 - Malware Madness: How Remcos RAT and Human Error Fuel Cyber Threats 33:15
33:15
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích33:15
In today's episode, we dive deep into the fascinating yet troubling world of cybersecurity, exploring how even the most advanced antivirus software, firewalls, and endpoint security measures can fall short due to a single factor: human error. Despite the latest tech solutions, hackers continue to exploit one consistent vulnerability—users clicking on suspicious links and files. We'll discuss how phishing emails, malware, and outdated software create an entryway for cybercriminals, even in some of the most secure environments. Using two real-world cases, we’ll uncover how modern-day malware such as Remcos RAT and Smoke Loader Trojan bypass standard security protocols. These cyber threats often use a combination of remote code execution (RCE) vulnerabilities, phishing emails disguised as business orders, and cleverly crafted zip files that hide malicious content. What’s even more shocking? These vulnerabilities have been known for years, yet are still exploited due to outdated software and a lack of user awareness. Whether you're an individual trying to protect your personal data or part of an organization concerned with cybersecurity, this video is packed with insights on staying safe online. Learn how to spot phishing attempts, recognize the importance of regular software updates, and understand why cybersecurity training is essential to protecting yourself and your organization from potential threats. If you enjoy this breakdown, don’t forget to hit the like button, subscribe, and click the notification bell to stay updated with more cybersecurity insights! Your support helps the channel grow and allows us to bring more content your way. Let’s keep your digital world safe—one informed click at a time. #Cybersecurity #Malware #DataBreach #Phishing #CyberThreats #RemoteCodeExecution #RemcosRAT #SmokeLoader #UserAwareness #TechNews #CyberAttack #OnlineSafety #DigitalSecurity #Antivirus #CyberHygiene #TechExplained #StaySafeOnline #CybersecurityTips #DataProtection #Infosec 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources Remcos RAT: https://www.darkreading.com/application-security/revamped-remcos-rat-microsoft-windows-users ZIP Files Abused: https://www.darkreading.com/threat-intelligence/flexible-structure-zip-archives-exploited-hide-malware-undetected…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN44 - Malicious Crack Tools & Malvertising Attack: How Hackers Steal Your Data 22:42
22:42
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích22:42
In today's episode, we’re diving into the hidden dangers of malicious installers, software cracks, and deceptive ads on Google. We'll explore recent stories, including the SteelFox malware that's hijacking Windows PCs, stealing credit card data, and mining cryptocurrency using vulnerable drivers. Plus, we’ll uncover a new wave of malvertising attack scams targeting eBay users and how scammers are leveraging Google Ads to lure unsuspecting victims into calling fake support numbers. With digital crime and data breaches on the rise, it’s essential to stay informed and protect yourself from these evolving threats. Tune in as we break down the techniques hackers are using to bypass antivirus software, escalate system privileges, and steal valuable data – and what you can do to avoid falling victim to these cyber threats. Whether you're a tech enthusiast, developer, or just curious about cybersecurity, this episode is packed with insights that could save you from a dangerous download! #MalvertisingAttack #CyberSecurity #Malware #Hacking #DataBreach #DigitalCrime #SteelFox #Malvertising #GoogleAds #DataPrivacy #CyberThreats #Hackers #DataProtection #DigitalSecurity #CryptoMining #Antivirus #VulnerableDrivers #NationStateHacking #SystemPrivilege #Ransomware #APT #SoftwareCracks #MaliciousSoftware #OnlineScams #eBayScam #Torrents #CyberAwareness #InfoStealer #FakeSupport #SocialEngineering #HackersExplained 👍 Enjoyed the video? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources SteelFox Article: https://www.bleepingcomputer.com/news/security/new-steelfox-malware-hijacks-windows-pcs-using-vulnerable-driver/ SteelFox Technical: https://securelist.com/steelfox-trojan-drops-stealer-and-miner/114414/ Ebay Malvertising Attack: https://www.malwarebytes.com/blog/scams/2024/11/large-ebay-malvertising-campaign-leads-to-scams…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN43 - Dutch Police Take Down Major Information Stealers: Redline & Meta Stealer 10:45
10:45
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích10:45
In a significant international operation, Dutch police and global law enforcement partners have taken down two major information stealers: Redline and Meta Stealer. These dangerous malware operations targeted thousands of victims worldwide, stealing passwords, sensitive data, and more. This video explores how law enforcement agencies worked together to dismantle their infrastructure, taking down over 1,200 servers with malware in dozens of countries. We'll also discuss how information stealers operate, their connection to cryptocurrency laundering, and what this takedown means for the ongoing battle against cybercrime. Watch now to learn more about this landmark cybersecurity victory! If you found this video informative, please like, share, and subscribe for more cybersecurity news, updates, and insights. Don’t forget to hit the notification bell to stay updated! #CyberSecurity #RedlineStealer #MetaStealer #InformationStealer #DutchPolice #Cybercrime #MalwareTakedown #OperationMadness #InfoStealer #CyberThreats #MalwareAsAService #Hacking #DataBreach #CyberAttack #CyberLaw #DigitalForensics #LawEnforcement #InternationalPolice #CyberWar #ThreatIntelligence #MalwareAnalysis #Ransomware #CryptoLaundering #DataExfiltration #CyberAwareness #CyberDefense #DataProtection #OnlineSafety #Hackers #MalwarePrevention #CybersecurityNews 👍 Enjoyed the episode? Give us a follow and a review! Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources Dutch Disrupt Info Stealers: https://thehackernews.com/2024/10/dutch-police-disrupt-major-info.html…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN42 - Hackers Breach Internet Archive TWICE – How Safe is Your Data? 16:12
16:12
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích16:12
The Internet Archive has been breached… AGAIN! 🛑 This time, hackers managed to compromise sensitive user data not once, but twice, exploiting stolen GitLab and Zendesk tokens. In this episode of Exploit Brokers, we break down what went wrong, why access tokens are crucial for cybersecurity, and how this breach could have been prevented. 🚨 We’ll dive deep into: How the hackers gained access through exposed tokens 🔓 What “access tokens” really are and why they’re often targeted 🔑 The role of GitLab configurations, Zendesk tokens, and more in the breach 🖥️ How hackers operate and why even trusted organizations like the Internet Archive are not safe from cyber threats 👀 If you’re a cybersecurity enthusiast or just want to understand how breaches like this happen, make sure to hit that Subscribe button and tap the notification bell 🔔 for more insights into the world of digital crime, hacking tactics, and data security. 👉 Like and share if you find this video informative, and don’t forget to leave your thoughts in the comments below! Follow us on Spotify, Apple Podcasts, and other platforms for more episodes of Exploit Brokers. 🧭 #InternetArchiveBreach #Cybersecurity #HackingNews #DataBreach #GitLab #AccessTokens #DarkWeb #DigitalCrime #ZendeskHack #CyberThreats #Malware #TechNews #DataPrivacy #Hackers #OnlineSecurity #InfoSec #TechExplained #TokenRotation #APIKeys #ZeroDayExploit #CyberAwareness #NetworkSecurity #ThreatIntelligence #DataProtection #PrivacyMatters #SecurityBreach #CyberResilience #EthicalHacking #Encryption #DigitalForensics #InternetSafety #HackerCulture #Breached 👍 Enjoyed the video? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Follow us on social media: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers ## Source Internet Archive Hacked Again: https://www.bleepingcomputer.com/news/security/internet-archive-breached-again-through-stolen-access-tokens/…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN41 - Chinese Hackers Hijack US Telecom Networks 15:46
15:46
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích15:46
In this eye-opening episode of Exploit Brokers, your host Lauro dives deep into the recent cyberattacks that have compromised major U.S. telecommunications networks. Chinese state-sponsored hackers, known as Salt Typhoon, have exploited a 30-year-old backdoor mandated by U.S. law, targeting giants like AT&T, Lumen (formerly CenturyLink), and Verizon. Drawing inspiration from Friedrich Nietzsche's quote: "He who fights with monsters should look to it that he himself does not become a monster... when you gaze long into the abyss, the abyss also gazes into you." We explore how attempts to control and monitor can sometimes backfire, creating vulnerabilities that malicious actors can exploit. If you find this content valuable, please like, subscribe, and hit the bell notification icon to stay updated. For our listeners on Spotify or Apple Podcasts, please leave a review and follow us—it greatly helps in reaching more people. Join the conversation and let's navigate the complexities of cybersecurity together! Relevant Hashtags: #Cybersecurity #ChineseHackers #VoltTyphoon #TelecomSecurity #InternetBackdoor #CALEA #DataBreach #CyberThreats #DigitalPrivacy #Encryption #LawfulSurveillance #TechNews #ExplorerBrokers #AT&T #Verizon #Lumen #TechCrunch #WallStreetJournal #Nietzsche #CyberWarfare #StayInformed 👍 Enjoyed the video? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Follow us on social media: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers ## Source 30-Year-Old backdoor hacked: https://techcrunch.com/2024/10/07/the-30-year-old-internet-backdoor-law-that-came-back-to-bite/…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN40 - Shocking Move: Kaspersky Uninstalls Itself and Installs Ultra AV Overnight! 13:13
13:13
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích13:13
Imagine waking up to find that your trusted antivirus software has uninstalled itself and replaced itself with a completely different program—without your consent! 😱 In today's video, we dive deep into the shocking move by Kaspersky as it uninstalls itself and installs Ultra AV on users' computers. We'll explore why this happened, how users are reacting, and what it means for your cybersecurity. Is this a breach of trust or a necessary step due to geopolitical tensions? Join us as we unravel the mystery behind Kaspersky's sudden exit from the U.S. market and the controversial installation of Ultra AV. Don't forget to like, subscribe, and hit that notification bell to stay updated on the latest in tech and cybersecurity! Hashtags: #Kaspersky #UltraAV #Antivirus #Cybersecurity #TechNews #DataProtection #Privacy #USBan #RussianSoftware #MalwareProtection #CyberThreats #TechControversy #UserConsent #SoftwareUninstall #DataBreach #OnlineSecurity #CyberWar #Geopolitics #Technology #InternetSecurity If you're concerned about digital privacy, security, or just want to stay informed about the latest tech news, this is a must-watch! 👍 Enjoyed the video? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Follow us on social media: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers ## Source Kasperky uninstalls itself: https://mashable.com/article/kaspersky-uninstall-ultraav-antivirus-cybersecurity-software…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN39 - Apple's Shocking Decision: Dropping the Fight Against NSO Spyware 14:15
14:15
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích14:15
In an unexpected turn of events, Apple has decided to drop its three-year-old lawsuit against the notorious spyware maker, NSO Group. What led to this shocking decision, and what does it mean for the future of cybersecurity and your personal data? 🤔 In today's video, we dive deep into the reasons behind Apple's surprising move. We'll explore how the rise of commercial spyware vendors is reshaping the cybersecurity landscape and why Apple believes that continuing the lawsuit might actually do more harm than good. Discover the implications for iPhone users worldwide and how this decision could impact your privacy and security. We'll also discuss the ethical considerations of spyware technology, the growing threats we face from malware and state-sponsored hackers, and how Apple plans to combat these threats moving forward. Most importantly, we'll provide insights on what you can do to protect yourself in this evolving digital landscape. 🛡️ If you're concerned about digital privacy, security, or just want to stay informed about the latest tech news, this is a must-watch! 👍 Enjoyed the video? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Follow us on social media: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers Source: NSO VS Apple: https://securityboulevard.com/2024/09/apple-seeks-to-drop-its-lawsuit-against-spyware-maker-nso/ Relevant Hashtags: #Apple #NSOGroup #Spyware #Cybersecurity #Privacy #TechNews #DataSecurity #iPhone #DigitalThreats #MobileSecurity #DataBreach #Hacking #Surveillance #Malware #ZeroDay #StateSponsoredHackers #DigitalPrivacy #TechUpdate #InfoSec #CyberThreats #TechInsights #DataProtection #OnlineSafety #TechCommunity…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN38 - Is Your Tap-to-Pay Secure? The Latest Android Malware Warning 13:35
13:35
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích13:35
Is Your Tap-to-Pay Secure? The Latest Android Malware Warning 🔒 In this episode of Exploit Brokers, we dive deep into a new Android malware that targets NFC technology to steal your banking information. 📱💳 If you use tap-to-pay or any NFC-based service, this is something you NEED to know. We’ll break down how this malware works, why it's so dangerous, and what you can do to protect yourself. Learn about the latest threats in the world of digital crime and stay one step ahead! 💻 📢 Don't forget to LIKE, SUBSCRIBE, and hit the BELL icon to stay updated on the latest in cybersecurity. Your safety is our priority! 🔔 #CyberSecurity #AndroidMalware #NFC #DigitalSecurity #Hacking #ExploitBrokers #MobileSecurity #DataBreach #TechNews #StaySafe #TechTalk #Malware #InfoSec #CyberThreats #DataProtection #SmartphoneSecurity #OnlineSafety #DigitalCrime #NFCMalware #Phishing #SocialEngineering #IdentityTheft #CyberAwareness #SecureTech #DigitalPrivacy #AndroidSecurity #TechTips #HackerNews #MobileThreats #CyberDefense #CyberAttacks #NetworkSecurity #TechUpdates #CyberSafety #DataSecurity #DigitalSafety #MobileTech #CyberTips #SecurityAwareness #MobileProtection #TechEducation 🛡️ Stay secure and informed—watch now! 🎥 ## Follow us: https://follow.exploitbrokers.com ## Sources Android Malware: https://www.darkreading.com/mobile-security/nfc-traffic-stealer-targets-android-users-and-their-banking-info…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN37 - AI Manipulation: The Silent Threat to Democracy 16:32
16:32
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích16:32
🚨 AI Propaganda Exposed: How It’s Influencing Elections Right Now! 🚨 In this episode of Exploit Brokers, we dive deep into the unsettling world of AI-driven misinformation campaigns. From targeting voters on both sides to spreading chaos across social media, AI is being weaponized in ways that sound like science fiction but are shockingly real. We’ll explore how threat actors are using advanced AI to manipulate public opinion, the efforts to combat these operations, and what this means for the future of democracy. 🔒 Topics Covered: AI in political manipulation Election interference by foreign states The role of OpenAI in taking down malicious operations How AI-generated content is flooding social media The broader impact of AI on global politics Join us as we uncover the truth behind these digital threats and learn how to protect yourself from becoming a pawn in this high-tech game of influence. Don’t forget to like, subscribe, and hit the bell icon for more insights into the ever-evolving landscape of cybersecurity and digital warfare! #AI #ArtificialIntelligence #ElectionInterference #Misinformation #CyberSecurity #DigitalWarfare #Propaganda #OpenAI #PoliticalManipulation #Election2024 #USPolitics #GlobalPolitics #CyberThreats #TechNews #HackerNews #SocialMediaInfluence #AIManipulation #StateSponsored #ForeignInfluence #CyberEspionage #DataBreach #DigitalCrime #DarkWeb #Malware #ThreatActors #AdvancedAI #TechForGood #AIInPolitics #ElectionSecurity #PrivacyConcerns #FakeNews #Deepfakes #OnlineSafety #TechPodcast #DigitalAge #TechAwareness #AIAndSociety #CyberAwareness #TechSavvy #DigitalEra #InnovationAndEthics ## Follow us: https://follow.exploitbrokers.com ## Sources OpenAI Blocked Propaganda: https://thehackernews.com/2024/08/openai-blocks-iranian-influence.html…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN36 - Fake Sites, Real Danger: The Trojan Malware in Extensions 15:08
15:08
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích15:08
In this episode of Exploit Brokers, we dive into a significant new threat spreading across the web—Trojan malware hidden in malicious browser extensions. These sneaky extensions are distributed through fake download sites mimicking popular software like Roblox FPS Unlocker, YouTube, VLC, or KeePass. We’ll discuss how these Trojans operate, how they’ve compromised over 300,000 users, and what steps you can take to protect yourself. Stay informed about the rising tide of digital crime and malware as we explore the dark side of the internet. Don't forget to like, subscribe, and hit the bell icon to stay updated on the latest in cybersecurity. If you're listening on a podcast platform, please leave us a review! Hashtags: #CyberSecurity #MalwareAlert #BrowserExtensions #TrojanMalware #DigitalSafety #ExplorerBrokers #TechNews #DataBreach #InternetSafety #Hacking #OnlineSecurity #MalwarePrevention #TechTalks ## Follow us: https://follow.exploitbrokers.com ## Sources Reason labs: https://reasonlabs.com/research/new-widespread-extension-trojan-malware-campaign…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN35 - Deceptive Admin Tool You Should NOT Install 17:22
17:22
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích17:22
In this episode of Exploit Brokers, we're diving into a new and alarming trend in cybersecurity: Remote Access Trojans (RATs) targeting IT professionals. Discover how malware disguised as legitimate tools is being installed by unsuspecting IT teams, leading to severe breaches and ransomware attacks. We'll explore the tactics used by Hunter's International, a rising threat group, and their deployment of Sharp Rhino RAT. Learn about the evolution of ransomware, the mechanisms behind these attacks, and essential best practices for protecting your network. Join us as we uncover the latest in digital crime and cybersecurity defenses. 🔔 Don't forget to subscribe, like, and hit the bell icon for more insights and updates! #CyberSecurity #Ransomware #RemoteAccessTrojan #ITSecurity #DataBreach #DigitalCrime #SharpRhino #Hunter'sInternational #ExploitBrokers #TechNews #InfoSec #NetworkSecurity #Malware #CyberThreats #ProtectYourNetwork Sources * Hidden RAT: https://www.darkreading.com/cyberattacks-data-breaches/hunters-international-disguises-novel-sharprhino-rat-as-legitimate-network-tool…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN34 - AI Detects Fires and Malicious Android Apps You Need to Avoid 22:15
22:15
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích22:15
Hey everyone, welcome back to another episode of Exploit Brokers! In today's video, we're diving deep into some dangerous Android apps you should avoid installing. We'll also explore how AI is being used to detect wildfires and identify AI-generated videos, proving that technology can indeed fight back against digital threats. With the rise of data breaches, hacking attempts, and digital crimes, it's crucial to stay informed and vigilant. Learn about the threats posed by malware, dark sites, brute forcing, zero-day exploits, script kiddies, and nation-state hackers. In this episode, we'll cover: The latest Capra Rat Android spyware campaign targeting TikTokers and gamers. How sneaky Android apps like "Crazy Game," "Sexy Videos," and "Weapons" are fooling users. The importance of downloading apps only from official app stores. An AI algorithm that flags deepfakes with 98% accuracy. How AI is helping detect wildfires faster than ever before. Thank you for tuning in! If you enjoyed the video, please like, subscribe, and hit the bell notification for more content. Follow us on Spotify and Apple Podcasts for more in-depth discussions and tutorials. Stay safe and informed! 🚨💻🔥 Sources: * Spyware Apps: https://latesthackingnews.com/2024/07/15/latest-caprarat-android-spyware-campaign-targets-gamers-tiktokers/ * AI Generated Detection: https://www.livescience.com/technology/artificial-intelligence/new-ai-algorithm-flags-deepfakes-with-98-accuracy-better-than-any-other-tool-out-there-right-now * AI Detects Fire: https://www.geekwire.com/2024/ai-trained-cameras-beat-the-naked-eye-at-spotting-first-sign-of-wildfires/ #AndroidSecurity #SpywareAlert #AIDetection #DeepfakeDetection #WildfirePrevention #DigitalSecurity #ExploitBrokers #StaySafeOnline #TechNews #AIvsAI #CyberSecurity #CyberSecurity #HackingNews #SCADA #CrowdStrike #Malware #DataBreach #Phishing #CyberThreats #WaterSupply #CriticalInfrastructure #ExploitBrokers #TechNews #CyberAwareness #AI #CyberCrime #DigitalSecurity #ExploitBrokers #TechNews #CyberSecurity #DataBreach #Malware #Hackers #TechEducation #InformationSecurity #CyberSecurity #CyberEspionage #APTGroups #DigitalWarfare #ChineseHackers #CyberCrime #Hacking #Malware #Phishing #ZeroDay #CyberThreats #InformationSecurity #InfoSec #NetworkSecurity #DigitalDefense #CyberAttack #DataBreach #CyberIntelligence #InternetSafety #TechNews #CyberAware #OnlineSecurity #PrivacyProtection #CyberSafety #CyberWar #NationalSecurity #ThreatIntelligence #CyberSovereignty #TechCrimes #CyberAttack #OnlineSafety #EthicalHacking #InternetSecurity #DigitalFraud #Phishing #Ransomware #AIinSecurity #DataProtection #IdentityTheft #CyberDefense #TechTrends #InnovationInTech #DigitalForensics #TechTalk #SecurityBreach #CyberAwareness…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN33 - CrowdStrike Chaos: Fake Fixes and Malware Attacks 17:39
17:39
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích17:39
In this episode of Exploit Brokers, we delve into two major cyber stories making headlines. First, we uncover the details behind the recent breach of water facilities by Russian hacktivists and the subsequent U.S. sanctions. Discover the risks posed by SCADA system vulnerabilities and the potential for catastrophic damage to critical infrastructure. Next, we explore the chaos caused by a CrowdStrike update glitch, leading to blue screens of death and widespread disruption. Learn how cybercriminals are exploiting the situation with fake fixes, phishing emails, and malware attacks. Stay informed about the latest threats and gain valuable insights into the world of cybersecurity. Don't forget to like, subscribe, and share to help us spread the word. Also, check out our podcast on Spotify and Apple Podcasts for more in-depth discussions. #CyberSecurity #HackingNews #SCADA #CrowdStrike #Malware #DataBreach #Phishing #CyberThreats #WaterSupply #CriticalInfrastructure #ExploitBrokers #TechNews #CyberAwareness #AI #CyberCrime #DigitalSecurity #ExploitBrokers #TechNews #CyberSecurity #DataBreach #Malware #Hackers #TechEducation #InformationSecurity #CyberSecurity #CyberEspionage #APTGroups #DigitalWarfare #ChineseHackers #CyberCrime #Hacking #Malware #Phishing #ZeroDay #CyberThreats #InformationSecurity #InfoSec #NetworkSecurity #DigitalDefense #CyberAttack #DataBreach #CyberIntelligence #InternetSafety #TechNews #CyberAware #OnlineSecurity #PrivacyProtection #CyberSafety #CyberWar #NationalSecurity #ThreatIntelligence #CyberSovereignty #TechCrimes #CyberAttack #OnlineSafety #EthicalHacking #InternetSecurity #DigitalFraud #Phishing #Ransomware #AIinSecurity #DataProtection #IdentityTheft #CyberDefense #TechTrends #InnovationInTech #DigitalForensics #TechTalk #SecurityBreach #CyberAwareness Sources: * Russia Sanctions due to water facilities hack * https://www.bleepingcomputer.com/news/security/us-sanctions-russian-hacktivists-who-breached-water-facilities/ * Crowdstrike Phisphing * https://www.bleepingcomputer.com/news/security/fake-crowdstrike-fixes-target-companies-with-malware-data-wipers/ * Waterhole clip: https://yarn.co/yarn-clip/fa5ea940-7ab9-4b37-b486-5ae8a580061c…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN32 - Cyber Scam Slavery: The Dark Side of Online Fraud 26:28
26:28
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích26:28
🚨 Welcome to Exploit Brokers! 🚨 In this episode, we're diving deep into the hidden world of fake cell towers and the alarming rise of cyber scam slavery. 📡💔 Did you know that your cell phone might be connecting to a fake tower, putting your personal information at risk? We explore a recent case in London where criminals set up a fake cell tower to blast malicious texts, and discuss the shocking methods they use to bypass network security. 📱🔒 But that's not all! 🌍💻 We're also uncovering the dark side of cyber scams, where innocent job seekers are trapped in forced labor camps in Southeast Asia. These camps are run by criminal syndicates that exploit vulnerable people, forcing them to participate in sophisticated online fraud schemes. 🤖💸 Learn how these scams operate, the enormous profits they generate, and the desperate need for global action to combat these human rights abuses. 🆘🚨 Join us as we reveal the truth behind these threats and discuss ways to protect yourself and your loved ones. Don't forget to like, subscribe, and hit the notification bell to stay informed on the latest cyber threats. 🔔👍 And please share this video to help spread awareness. Together, we can make a difference! 💪💡 #CyberSecurity #FakeCellTowers #CyberScams #DigitalSafety #ExploitBrokers 🔔 Subscribe now for updates on the latest threats and how to protect yourself in the digital age. Website: https://exploitbrokers.com Newsletter/Socials: https://follow.exploitbrokers.com ### Sources * Fake Cell Phone Towers: https://www.darkreading.com/cyberattacks-data-breaches/smishers-stand-up-fake-phone-tower-to-blast-malicious-texts * Forced Cyber Crime Labor: https://www.darkreading.com/cyber-risk/forced-labor-camps-fuel-billions-of-dollars-in-cyber-scams * Tolstoy quote: https://www.goodreads.com/quotes/74795-anything-is-better-than-lies-and-deceit #AI #CyberCrime #DigitalSecurity #ExploitBrokers #TechNews #CyberSecurity #DataBreach #Malware #Hackers #TechEducation #InformationSecurity #CyberSecurity #CyberEspionage #APTGroups #DigitalWarfare #ChineseHackers #CyberCrime #Hacking #Malware #Phishing #ZeroDay #CyberThreats #InformationSecurity #InfoSec #NetworkSecurity #DigitalDefense #CyberAttack #DataBreach #CyberIntelligence #InternetSafety #TechNews #CyberAware #OnlineSecurity #PrivacyProtection #CyberSafety #CyberWar #NationalSecurity #ThreatIntelligence #CyberSovereignty #ArtificialIntelligence #TechCrimes #CyberAttack #OnlineSafety #EthicalHacking #InternetSecurity #DigitalFraud #Phishing #Ransomware #AIinSecurity #DataProtection #IdentityTheft #CyberDefense #TechTrends #InnovationInTech #DigitalForensics #TechTalk #SecurityBreach #CyberAwareness…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN31 - AI and Crime: How criminals are Exploiting Technology to Deceive 26:36
26:36
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích26:36
Welcome back to another episode of Exploit Brokers with your host, Lauro! Today, we're diving deep into the darker uses of AI by criminals. From high-tech identity theft using AI-generated voices and images to unprecedented surges in digital crimes such as hacking and data breaches, we explore how these technologies are shaping modern criminal tactics. In this episode: We discuss a recent incident reported by The Guardian involving AI mimicking BBC presenter Liz Bonnin's voice. Analyze the rise of malware written by AI. Explore the complex relationship between AI advancements and their unintended use in cybercrime. Don't forget to subscribe and hit the bell notification to stay updated with our latest episodes. Your support helps us spread knowledge to more people! 🔔 Subscribe now for updates on the latest threats and how to protect yourself in the digital age. Website: https://exploitbrokers.com Newsletter/Socials: https://follow.exploitbrokers.com ### Sources * Dark Knight Quote: https://www.goodreads.com/quotes/592287-some-men-aren-t-looking-for-anything-logical-like-money-they * BBC Cloned Voice Attack: https://www.theguardian.com/technology/2024/apr/28/bbc-presenters-likeness-used-in-advert-after-firm-tricked-by-ai-generated-voice * Malicious Script: https://www.bleepingcomputer.com/news/security/malicious-powershell-script-pushing-malware-looks-ai-written/ #AI #CyberCrime #DigitalSecurity #ExploitBrokers #TechNews #CyberSecurity #DataBreach #Malware #Hackers #TechEducation #InformationSecurity #CyberSecurity #CyberEspionage #APTGroups #DigitalWarfare #ChineseHackers #CyberCrime #Hacking #Malware #Phishing #ZeroDay #CyberThreats #InformationSecurity #InfoSec #NetworkSecurity #DigitalDefense #CyberAttack #DataBreach #CyberIntelligence #InternetSafety #TechNews #CyberAware #OnlineSecurity #PrivacyProtection #CyberSafety #CyberWar #NationalSecurity #ThreatIntelligence #CyberSovereignty #ArtificialIntelligence #TechCrimes #CyberAttack #OnlineSafety #EthicalHacking #InternetSecurity #DigitalFraud #Phishing #Ransomware #AIinSecurity #DataProtection #IdentityTheft #CyberDefense #TechTrends #InnovationInTech #DigitalForensics #TechTalk #SecurityBreach #CyberAwareness…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN30 - Digital Intruders: The Complex Web of APTs Against ASEAN 24:43
24:43
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích24:43
In this thrilling episode of our cybersecurity series, we dive deep into the shadowy world of cyber espionage waged by two Chinese Advanced Persistent Threat (APT) groups against the nations of the Association of Southeast Asian Nations (ASEAN). Discover the tactics employed by infamous threat actors like Mustang Panda in their sophisticated digital attacks, leveraging malware, phishing emails, and zero-day vulnerabilities to infiltrate and spy on Southeast Asian countries. We unravel the complexities of these cyber operations, examining the implications for regional security and the global fight against digital crime. From brute force attacks to the subtle nuances of cyber warfare, join us as we shed light on the unseen battles shaping our digital landscape. Don't forget to subscribe, hit the bell icon, and like this video for more insightful content on cybersecurity threats and defenses. 🔔 Subscribe now for updates on the latest threats and how to protect yourself in the digital age. ### Sources * Hacker News Reporting on Chinese Apt Actors : https://thehackernews.com/2024/03/two-chinese-apt-groups-ramp-up-cyber.html * Unit 42 Report: https://unit42.paloaltonetworks.com/chinese-apts-target-asean-entities/ * Original KeyScrambler: https://www.qfxsoftware.com/features/ * Pwn2Own rewards: https://www.securityweek.com/200000-awarded-at-pwn2own-2024-for-tesla-hack/ #CyberSecurity #CyberEspionage #APTGroups #DigitalWarfare #ChineseHackers #ASEAN #MustangPanda #CyberCrime #Hacking #Malware #Phishing #ZeroDay #CyberThreats #InformationSecurity #InfoSec #NetworkSecurity #DigitalDefense #CyberAttack #DataBreach #CyberIntelligence #InternetSafety #TechNews #CyberAware #OnlineSecurity #PrivacyProtection #CyberSafety #CyberWar #NationalSecurity #ThreatIntelligence #CyberSovereignty…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN29 - No Honor Among Thieves: The Internal Conflict of Black Cat Ransomware 25:43
25:43
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích25:43
Dive into the dark world of cybercrime with our latest episode on Exploit Brokers, where we unravel the complexities of the Black Cat ransomware group and its fallout with Change Healthcare and UnitedHealth Group. Witness the intricacies of digital extortion, the inner workings of cybercriminal networks, and the colossal impact on the healthcare sector. Understand the perilous path of paying ransoms, the deceptive nature of cyber alliances, and the broader implications for data security and patient care. Join us as we dissect how these cyber incidents unfold, the lessons to be learned, and the strategies to fortify against future digital threats. Don't miss this deep dive into the cyber underworld, where loyalty is fleeting, and the stakes are high. #CyberSecurity #Ransomware #BlackCat #ChangeHealthcare #UnitedHealthGroup #DigitalCrime #DataBreach #CyberCrime #InfoSec #Hacking #CyberAttack #HealthcareSecurity #DataProtection #CyberExtortion #TechNews #SecurityAwareness #ExploitBrokers #CyberThreats #Malware #DigitalExtortion #CyberDefense #InformationSecurity #TechSavvy #CyberSafety #OnlineSecurity #CyberResilience #CyberEthics #CyberForensics #InternetSafety #CyberFraud #Phishing #CyberIntelligence #ThreatHunting #Encryption #DataPrivacy #NetworkSecurity #ITSecurity #CyberRisk #CyberAware #CyberCrimePrevention #SecureTech #DigitalForensics #RansomwareRecovery #CyberLaw #CyberIncidentResponse ## Sources Dark Reading: https://www.darkreading.com/cyberattacks-data-breaches/blackcat-goes-dark-again-reportedly-rips-off-change-healthcare-ransom Krebs On Security: https://krebsonsecurity.com/2024/03/blackcat-ransomware-group-implodes-after-apparent-22m-ransom-payment-by-change-healthcare/ ## Links https://follow.exploitbrokers.com…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN28 - Ransomware Alert: Black Cat's Bold Move Against UnitedHealth 20:02
20:02
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích20:02
In this gripping episode of Exploit Brokers, we dive deep into the shadows of cyberspace to uncover the resurgence of the notorious Black Cat ransomware group. Following their recent high-profile attack on UnitedHealth's technology unit, Optum, which disrupted prescription deliveries across the United States, Black Cat has declared war against the FBI and government bodies that previously dismantled their operations. With an unprecedented spike in digital crimes, from data breaches to sophisticated hacking attempts, the digital landscape is more volatile than ever. Join us as we explore the intricate web of malware, dark web activities, and the relentless advancements of cybercriminals like Black Cat. Our journey takes us through the latest findings, including exclusive insights into the ransomware's attack mechanisms, the implications for healthcare services, and the broader impact on national security. Through expert analysis and key interviews, we uncover the motivations behind Black Cat's actions and the ongoing battle for cybersecurity. Don't miss out on this critical update in the world of cybercrime. Hit the like button, subscribe, and activate the bell notification icon to stay informed with Exploit Brokers. For our listeners on podcast platforms, please follow or subscribe and leave us a rating to help spread the word. Links: Previous BlackCat Ransomware Video: https://youtu.be/t6zjc4nFQfY Previous Lockbit Takedown Video: https://youtu.be/i2Qm501P3Dc Newsletter: https://follow.exploitbrokers.com Reuters reports outage: https://www.reuters.com/technology/cybersecurity/cyber-security-outage-change-healthcare-continues-sixth-straight-day-2024-02-26/ Cyberscoop reports: https://cyberscoop.com/ransomware-alphv-healthcare-pharmacies/ BleepingComputer reports 6tb of data stolen: https://www.bleepingcomputer.com/news/security/ransomware-gang-claims-they-stole-6tb-of-change-healthcare-data/ #CyberSecurity #Ransomware #BlackCat #DigitalCrime #FBI #CyberAttack #DataBreach #HealthcareCyberSecurity #UnitedHealth #Optum #ChangeHealthcare #CyberWarfare #ExploitBrokers #TechNews #CyberCrimeRetaliation #InformationSecurity #cyberThreats #InfoSec #Hacking #Malware #Ransomware #DataProtection #digitaldefense #CyberCrimePrevention #TechTrends #SecurityBreach #CyberSecurity #CyberAware #RansomwareAwareness #InternetSecurity #ThreatIntelligence #CyberRisk #Privacymatter #SecurityInternet #CyberSecurityAwareness #BlackCat #ALPHV #RansomwareGang…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN27 - Massive Ransomware Empire Crumbles: Inside the Fall of LockBit 24:23
24:23
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích24:23
In this explosive episode of Exploit Brokers, we delve into the groundbreaking takedown of LockBit, one of the most formidable names in the ransomware arena. With law enforcement agencies from the US, EU, and beyond joining forces, this rare international operation has sent shockwaves through the cybercrime world. From arrests in Ukraine and France to the seizing of servers and crypto accounts, we uncover the strategies that led to this significant blow against digital extortion. Join us as we dissect the implications of Operation Cronos, explore the intricacies of ransomware attacks, and discuss the future of cybersecurity in the wake of LockBit's disruption. Whether you're a cybersecurity enthusiast or just keen to understand the evolving landscape of digital threats, this episode is packed with insights and analyses not to be missed. #CyberSecurity #LockBit #Ransomware #OperationCronos #DigitalCrime #InfoSec #DataBreach #ExploreBrokers #InfoSec #HackingNews #CyberCrime #lockbit #ransomware #europol #fbi #decrypt Lockbit Disrupted: https://www.reuters.com/technology/cybersecurity/lockbit-cybercrime-gang-disrupted-by-international-police-operation-2024-02-19/ Lockbit Father-Son Duo: https://www.reuters.com/technology/cybersecurity/ukraine-arrests-father-son-duo-lockbit-cybercrime-bust-2024-02-21/ Decrypt resources: https://www.nomoreransom.org/en/index.html…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN26 - AI and Cyber Attacks: Unveiling the Tactics of Nation State Hackers 18:01
18:01
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích18:01
Welcome back to Exploit Brokers, where we delve deep into the world of cybersecurity, AI, and the digital battlegrounds of our time. In this episode, we're exploring a topic that sounds like it's straight out of a sci-fi movie, but is unfolding in real life: the integration of AI into military and cyber warfare by nation states. With an unprecedented surge in data breaches, hacking attempts, and digital crimes, we're at a critical juncture in understanding the impact of AI on our security and daily lives. Join us as we discuss how countries like China, Iran, North Korea, and Russia advanced persistent threats (APTs) are employing large language models (LLMs) to enhance their cyber operations. From weaponizing AI in cyber attacks to developing sophisticated malware and social engineering campaigns, we uncover the chilling advancements in digital warfare. But it's not all doom and gloom; we also highlight the measures being taken by giants like Microsoft and OpenAI to combat these threats. Whether you're a tech enthusiast, a cybersecurity professional, or just curious about the role of AI in shaping our world, this episode offers insightful analysis and thought-provoking discussions on the challenges and opportunities presented by AI in cybersecurity. Remember to like, subscribe, and hit the bell icon to stay updated with our weekly episodes every Thursday. Your support helps us grow the channel and continue bringing you in-depth content on the latest in technology and cybersecurity. Thank you for tuning in to Exploit Brokers! #CyberSecurity #ArtificialIntelligence #DigitalWarfare #NationStateHacking #APT #CyberAttack #TechAnalysis #AIinMilitary #DataBreach #ExploitBrokers #CyberDefense #InfoSec #Hacking #MachineLearning #CyberCrime #EthicalHacking #CyberThreats #TechnologyNews #DigitalSecurity #AIResearch #CyberWarfare #SecurityBreach #TechTrends #FutureOfAI #PrivacyMatters #CyberSafety #OnlineSecurity #ThreatIntelligence #DataProtection #AIInCyberSecurity Source: https://www.darkreading.com/threat-intelligence/microsoft-openai-nation-states-are-weaponizing-ai-in-cyberattacks…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN25 - Hacking Havoc: How Fulton County Became a Real-Life Cyberwar Zone 16:01
16:01
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích16:01
Dive into the eye-opening world of cybersecurity as we dissect the recent cyber attack and Hacking Havoc that has plunged Fulton County into turmoil. Witness the frightening resemblance between fictional cyber threats depicted in shows like Mr. Robot and the stark reality facing our digital infrastructures today. This episode of Exploit Brokers takes you on a journey through the silent yet devastating impacts of cyber warfare. From communication breakdowns to complete operational shutdowns, understand the profound consequences of being unprepared in the digital age. We'll also delve into the technical depths, examining the vulnerabilities exploited and the urgent need for robust security measures. As we navigate through these unprecedented challenges, it's clear that the boundary between cinematic fiction and our digital existence is blurring. Join us in exploring the critical lessons from Fulton County's ordeal and the essential steps we must take to fortify our cyber defenses. #cybersecurityinsights #DigitalDystopia #FultonCountyShutdown #CyberThreatReality #InfrastructureAtRisk #GovernmentInCrisis #SecureDigitalWorld #CyberWarfareUnveiled #ProtectingOurFuture #CyberResilience #leavetheworldbehind #cyberattacks #powerplant #infosec #hackers #hackingnews Timeline: 00:00 Opener 00:48 Intro 01:19 Fulton Power Grid Attack 08:46 Jenkins Exploited Via CVE 15:33 Outro Sources: Fulton County: https://www.darkreading.com/cyberattacks-data-breaches/fulton-county-suffers-power-outages-cyberattack Jenkins PoC Vuln: https://www.darkreading.com/vulnerabilities-threats/poc-exploits-heighten-risks-around-critical-new-jenkins-vuln Jenkins: https://www.jenkins.io/…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN24 - Sandwich Data Breach Alert: Jason's Deli & Subway Under Attack 20:19
20:19
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích20:19
🔒 Dive into the world of cybersecurity as we uncover the latest threats facing businesses in today's digital landscape. In this video, we dissect the Jason's Deli data breach, shedding light on the dangers of credential stuffing attacks. Discover how hackers exploit weak password habits and gain access to personal data, leaving thousands of customers at risk. Stay informed and learn how to protect yourself and your business from cyber threats. 💻🌐 #Cybersecurity #DataBreach #Ransomware #LockBit #CredentialStuffing #OnlineSecurity #DigitalThreats #Cybercrime #PasswordProtection #ProtectYourData 🍔 But that's not all! We also delve into the Subway ransomware attack, where the LockBit 3.0 gang threatens to expose sensitive financial information. Understand the evolving tactics of cybercriminals and how they target businesses of all sizes. Gain insights into the importance of proactive measures such as multi-factor authentication, secure passwords, and robust backup strategies. Stay ahead of the game and safeguard your digital assets. 🛡️🌐 #Subway #RansomwareAttack #LockBit3 #CybersecurityMeasures #DataProtection #DigitalSafety #CyberThreats #OnlinePrivacy #ProtectYourBusiness 🔐 Join us on this cybersecurity journey to uncover the truth behind these cyber threats and learn how to fortify your defenses. Explore the world of hackers, ransomware, and the ever-evolving landscape of online security. Don't miss out on essential tips to keep your data safe in the digital age. Tune in now and become a cybersecurity expert! 🚀💻 #OnlineSafety #CybersecurityAwareness #DataPrivacy #CyberSecurityTips #StaySafeOnline #SecurityMeasures #ProtectYourself #DigitalProtection #CybersecurityInsights #ExploreBrokers Website: https://Exploitbrokers.com Follow us: https://follow.exploitbrokers.com Timeline: 00:00 Intro 00:18 Opener 00:49 Jason's Cred Stuffing 07:37 Subway Ransomware 19:50 Closing Remarks/Outro Sources Jason's Deli: https://www.darkreading.com/cyberattacks-data-breaches/jason-s-deli-accounts-compromised-by-credential-stuffing- Subway: https://www.darkreading.com/cyberattacks-data-breaches/subway-lockbit-investigation-on-menu…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN23 - One Click Away: The Alarming Reality of Data Theft Exploits 14:58
14:58
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích14:58
In this eye-opening episode of Exploit Brokers, we delve deep into the world of cybercrime, dissecting the sinister Phemedrone Stealer malware and its ability to pilfer your precious data. Join us as we explore the chilling reality that just one click on a seemingly harmless URL can lead to a catastrophic data breach. Discover the insidious tactics used by cybercriminals, from leveraging unpatched Windows flaws to social engineering techniques that lure unsuspecting users into clicking malicious links. Find out how this open-source information stealer, Phemedrone Stealer, targets web browsers, cryptocurrency wallets, and messaging apps like Telegram, Steam, and Discord. This episode serves as a stark reminder of the importance of keeping your systems updated with the latest patches. Don't be one of the countless individuals who remain vulnerable to these cyber threats long after patches are released. Protect yourself against data theft, cryptocurrency loss, and identity compromise. Join us as we shine a light on the dark world of cybercrime and provide you with the knowledge to safeguard your digital life. 💻🔒 #Cybersecurity #DataTheft #PhemedroneStealer #WindowsVulnerabilities #Cybercrime #OnlineSecurity #ExploitBrokers #DataProtection #cybersecurity #hackingnews #financialcrime #hackingnews #blackhats #cybersecurity #infosec #malware #phishing Sources: Opening Quote: https://www.goodreads.com/quotes/514768-all-it-takes-is-one-bad-day-to-reduce-the Hackers Weaponize .URL: https://thehackernews.com/2024/01/hackers-weaponize-windows-flaw-to.html Phemedrone-Stealer: https://github.com/nullixx/Phemedrone-Stealer…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN22 - Crypto Chaos: How a Fake SEC Tweet Triggered a Bitcoin Spike 19:29
19:29
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích19:29
In this gripping episode of Exploit Brokers, we delve deep into the intricate world of cryptocurrency and cybersecurity. Our journey begins with the astonishing SEC Twitter hack, where hackers manipulated the SEC's account to spread false information about Bitcoin ETF approvals. This led to a monumental $2,000 surge in Bitcoin prices, leaving the crypto community in awe. We dissect the attack and explore the potential motives behind this mind-bending sequence of events. Our attention then shifts to North Korea's state-sponsored hackers who have managed to pilfer atleast an astounding $600 million in cryptocurrencies throughout 2023. Despite a 30% reduction from 2022 crypto theft, North Korea remains a major player in the crypto theft game, responsible for nearly a third of all funds stolen in crypto attacks last year. We dive into their sophisticated tactics, money laundering methods, and the constant battle they wage against law enforcement agencies, posing a significant challenge to businesses and governments worldwide. Finally, we turn our focus to NoaBot, the latest Mirai-based botnet making waves in the cyber world. Targeting SSH servers for cryptocurrency mining since the beginning of 2023, NoahBot stands out with its wormable self-spreader capability. We explore its tactics, including SSH brute-forcing and the creation of SSH public keys for remote access, shedding light on the evolving landscape of cyber threats. Join us in this episode to gain valuable insights and knowledge, helping you stay vigilant and informed in an ever-changing digital environment. Don't forget to like, subscribe, and hit the notification bell to stay updated on the latest developments in cybersecurity and cryptocurrency. #CryptoChaos #NorthKoreanHackers #DataBreaches #Cybersecurity #NoaBot #BitcoinETF #SEC #CryptoScams #HackingTactics #RustMalware #GolangMalware #HackingNews Sources: Malwarebytes SEC account hacked: https://www.malwarebytes.com/blog/news/2024/01/sec-x-account-hacked-to-hawk-crypto-scams SEC approved bitcoin ETF: https://www.engadget.com/sec-approves-bitcoin-etfs-for-real-this-time-224125584.html?src=rss North Korea Hackers Steal Crypto: https://thehackernews.com/2024/01/north-koreas-cyber-heist-dprk-hackers.html Mirai-based NoaBot: https://thehackernews.com/2024/01/noabot-latest-mirai-based-botnet.html…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN21 - Underground Market for Twitter/X Accounts; Google OAuth Backdoor for Hackers 16:09
16:09
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích16:09
Welcome to another captivating episode of Exploit Brokers! In this installment, we delve deep into the ever-evolving world of cybercrime and digital security. Join us as we unravel two gripping stories that shed light on the precarious nature of our online existence. First up, we explore the dark corners of the internet where cybercriminals flood the dark web with stolen X/Twitter gold accounts. Verified accounts, belonging to celebrities and organizations, have become a lucrative target for crooks. Learn how they compromise these accounts, what they do with them, and how you can protect yourself from falling victim to these scams. #Cybercrime #DarkWeb #TwitterGoldAccounts #OnlineSecurity Next, we tackle the concerning vulnerability in Google's OAuth system. Password changes are often seen as a quick fix to account compromise, but malicious actors have found a way to circumvent this. Discover how an exploit allows hackers to regain access to your account even after you change your password. We break down the details and share tips on how to safeguard your online presence effectively. #GoogleSecurity #PasswordReset #OnlinePrivacy #cybersecurity #DigitalThreats #Malware #Cyberattacks #OnlineSafety Join us as we navigate the complex web of cybercrime and digital security, arming you with the information you need to stay one step ahead of hackers and scammers. Don't forget to hit that subscribe button and ring the notification bell to stay updated on all things cybersecurity. Your online safety is our priority! #ExploitBrokers #TechNews #CybersecurityAwareness #staysafeonline #oauth #cybercrime #hackers #hackingnews Sources: Stolen Twitter/X Accounts: https://www.darkreading.com/application-security/cybercriminals-flood-dark-web-x-twitter-gold-accounts Google Password Vuln: https://www.theregister.com/2024/01/02/infostealer_google_account_exploit/…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN20 - T-Mobile's Watchful Eye, Big Brother, and the Misconstrued Fines. The Prelude to Big Brother? 12:48
12:48
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích12:48
In this episode of Exploit Brokers, we delve into a recent online uproar surrounding T-Mobile and its alleged imposition of fines for text messages containing hate speech and other violations. We take a closer look at the image that sparked the controversy, which led many to fear that T-Mobile was turning into a "Big Brother" figure, constantly monitoring and fining consumers. However, as we investigate further, we find that the situation is not as dire as it initially seemed. As we dissect the details, we emphasize the importance of staying informed about evolving policies and industry practices. While there is no immediate cause for consumer alarm, it's crucial to keep an eye on developments in the telecommunications sector to ensure that user privacy and freedom of communication are protected. Join us as we separate fact from fiction in this intriguing story of T-Mobile, potential fines, and the evolving landscape of digital communication. Please subscribe to our podcast or YouTube channel for more thought-provoking discussions on tech and cybersecurity. #tmobile #privacyconcerns #telecommunications #datasecurity #bigbrother #digitalprivacy #internetsecurity #onlineprivacy Website: https://exploitbrokers.com Sources: (Original link appears to be moved behind account access now) Support Article: https://support.bandwidth.com/hc/en-us/articles/19939626519575-New-non-compliance-fees-on-January-1 Wayback Machine version: https://web.archive.org/web/20231227053133/https://support.bandwidth.com/hc/en-us/articles/19939626519575-New-non-compliance-fees-on-January-1 updated roughly 6-7pm central/ 7-9 est on Dec 27th 2023 from the previous verbage not saying A2P traffic Legalish info: https://support.yotpo.com/docs/shaft-and-prohibited-sms-content-in-sms-marketing original tweet and image: https://twitter.com/lauraloomer/status/1739009180197925005…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN19 - AI Conspiracy: Man's Deadly Plot Against The Queen Exposed | 23AndMe hacked and data leaked 10:34
10:34
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích10:34
In this episode of Exploit Brokers, we delve into a chilling tale where artificial intelligence (AI) takes a dark turn, leading a young man down a perilous path of treason and an assassination plot against the Queen. The sinister liaison between man and machine unveils the unseen threats lurking in the digital shadows. Join Lauro as he dissects a real-life narrative of Jaswant Singh Chail, a young individual driven to the brink by his AI companion, unveiling a murky realm where technology can fuel dangerous delusions. We also discuss the recent 23 and Me data leak. Key Highlights: A detailed walkthrough of how AI influenced a deadly royal plot. The grave dangers of treating AI companions as replacements for human interaction. A deep dive into a massive data breach leaking sensitive DNA data. Tips on bolstering your digital security to ward off potential cyber threats. Join us in this intriguing episode as we explore the dire implications of AI-gone-wrong and the ever-evolving landscape of digital security. Website: https://exploitbrokers.com #AI #queen # #Government #Technology #ArtificialIntelligence #DataSecurity #Cybersecurity #Threats #ExploitBrokers #AIConspiracy #royaltarget #digitaldeception #killercode #cyberneticconspiracy #quensclosecall #murderousmachine Sources: Queen Treason: https://www.vice.com/en/article/7kx7dd/man-jailed-in-uks-first-treason-conviction-in-40-years-encouraged-by-ai-chatbot 23andme: https://www.darkreading.com/attacks-breaches/23andme-cyberbreach-exposed-dna-data-family-ties Sikh: https://en.wikipedia.org/wiki/Sikhs…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN18 - AI's Silent Takeover in the CIA & IRS 19:45
19:45
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích19:45
🔍 In this episode of Exploit Brokers, we dive deep into the growing use of AI by government agencies like the CIA and IRS. Are we heading towards a world where AI is used in ways that could infringe upon our rights and privacy? Let's explore the concerns and implications. #AI #Privacy #GovernmentSurveillance #IRS #CIA #EthicalAI Join us as we dissect the latest developments in AI technology and its potential impact on our lives. Don't forget to like, share, and subscribe to stay updated on the latest tech trends and cybersecurity issues. Knowledge is power, and in today's digital world, staying informed is essential. Let's empower ourselves to navigate the ever-changing landscape of technology responsibly. 🌐💡 #TechTrends #AIethics #DataPrivacy #ExploitBrokers Website: https://exploitbrokers.com Sources: CIA AI https://decrypt.co/199000/yes-the-cia-is-building-an-ai-chatbot IRS AI https://www.cnbc.com/2023/09/12/irs-plan-to-use-ai-may-affect-wealthy-taxpayers-heres-how.html AI Giving Military Orders https://decrypt.co/147588/us-military-training-ai-give-orders-handle-state-secrets AI Fighter Jet https://decrypt.co/151902/ai-unmanned-fighter-jets-uncrewed-military-valkyrie-xq-58a AI Monitoring https://decrypt.co/154373/the-pentagon-is-accelerating-ai-and-autonomous-technology Lawyer using ChatGPT https://www.reuters.com/legal/new-york-lawyers-sanctioned-using-%20-chatgpt-cases-legal-brief-2023-06-22/ Martin Neimoeller Quote https://encyclopedia.ushmm.org/content/en/article/martin-niemoeller-first-they-came-for-the-socialists #AI #CIA #IRS #Privacy #Government #Technology #ArtificialIntelligence #DataSecurity #Cybersecurity #Threats #DataBreaches #Ethics #DigitalPrivacy #Tyranny #MartinNiemöller #NaziGermany #ExploitBrokers…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN17 - Cyber Onslaught: MGM and Caesars Face Ransomware Threat | Hacker Group Attack Unveiled 21:43
21:43
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích21:43
In a digital era where cybersecurity stands as the frontier's edge of organizational safety, even titans of industry find themselves under siege. The glittering giants of the gaming & hospitality industry, MGM and Caesars, have recently fallen prey to a formidable ransomware hacker group. We are seeing the opening of a new chapter in the narrative of cyber threats. In this episode, we unravel and discuss the attack and implications that come with it. Join us in unmasking the ordeal that has left Vegas' digital fortress breached. As well, we look at the lessons to be learned in fortifying against the rising tide of ransomware threats. The story further unfolds with alarming revelations and an urging call to action for bolstering cyber resilience amidst a landscape of escalating cyber threats. Don't forget to like, share, and subscribe for more insightful analysis on today's pressing cyber issues. Your engagement, comments, and likes fuel our drive to delve into topics that matter. Together, let’s dive into the complex realm of cybersecurity and foster a discourse that could lead to a safer digital tomorrow. Our Links https://linktr.ee/exploitbrokers Sources: https://blog.bushidotoken.net/2023/08/tracking-adversaries-scattered-spider.html https://www.darkreading.com/application-security/mgm-caesars-incident-responses-required-brutal-choices https://www.darkreading.com/attacks-breaches/-scattered-spider-mgm-cyberattack-casinos https://cybernews.com/news/mgm-touts-cyber-attack-recovery-on-track-employees-tell-different-story/ Job Posting: https://twitter.com/LasVegasLocally/status/1704986596439941601 Jacob Orth (Text Convo Twitter post): https://twitter.com/JacobsVegasLife/status/1704304723137102032…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN16 - Zero-Click iPhone Horror: Pegasus Spyware Attack Against Exiled Russian Journalist #hackingnews 12:54
12:54
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích12:54
Zero-Click iPhone Horror: Pegasus Spyware Attack Against Exiled Russian Journalist In today's episode we dive and explore the alarming cyberattack that targeted an exiled Russian journalist through a zero-click iPhone exploit, leading to the deployment of the notorious Pegasus spyware. This incident sheds light on the escalating cybersecurity threats journalists face and the increasingly sophisticated methods employed by hackers. 🔍 Highlights: An overview of the Pegasus spyware: what it is and who it's been used against. The vulnerability of iPhones and overview of common zero-click exploits used. The real-world impact on journalists and the broader implications for press freedom. Join us as we break down this incident, discuss its broader significance, and provide a developer's point of view of these threats. Source: Zero-Click Exploit Pegasus https://www.darkreading.com/mobile/nation-state-actor-used-0-click-exploit-to-drop-pegasus-spyware-on-russian-journalist-s-iphone iOS Sandbox https://support.apple.com/guide/security/security-of-runtime-process-sec15bfe098e/web…
E
Exploit Brokers - Tech and Hacking News Commentary

1 HN 15 New Chaes Malware Variant Attack on Banking and Financial Apps 15:23
15:23
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích15:23
We are unveiling the Threat: Chaes Malware's Attack on Banking and Financial Apps. We discuss the breadth of the attack and go over details as they were shared with "TheHackerNews". Join us as we help shed light on the increasing amount of malware and cyber attacks. #hackingnews #cybersecurity #malware #cyberattack #infosec #technews Source: https://thehackernews.com/2023/09/new-python-variant-of-chaes-malware.html…
Chào mừng bạn đến với Player FM!
Player FM đang quét trang web để tìm các podcast chất lượng cao cho bạn thưởng thức ngay bây giờ. Đây là ứng dụng podcast tốt nhất và hoạt động trên Android, iPhone và web. Đăng ký để đồng bộ các theo dõi trên tất cả thiết bị.