Exploit Brokers - Tech and Hacking News Commentary

Exploit Brokers - Tech and Hacking News Commentary

Podcast af Exploit Brokers

Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat

Prøv gratis i 7 dage

99,00 kr. / måned efter prøveperiode.Ingen binding.

Prøv gratis

Alle episoder

59 episoder
episode HN59 - Microsoft AI Discovers 20 Zero-Day Vulnerabilities in Bootloaders! artwork
HN59 - Microsoft AI Discovers 20 Zero-Day Vulnerabilities in Bootloaders!

# Title * HN59 - Microsoft AI Discovers 20 Zero-Day Vulnerabilities in Bootloaders! ## Description 🔍 Microsoft’s AI Uncovers 20 Zero-Day Threats | CoffeeLoader Malware Gets Smarter In this episode of Exploit Brokers, Cipherceval dives into how Microsoft Security Copilot, powered by AI, discovered over 20 previously unknown vulnerabilities in popular bootloaders like GRUB2, U-Boot, and Barebox. These flaws could allow attackers to bypass Secure Boot and install stealthy bootkits. We also explore the terrifying evolution of CoffeeLoader malware — now equipped with GPU-based cloaking, Windows fibers, and sleep obfuscation — making it one of the most advanced malware loaders in circulation today. Whether you're into cybersecurity, AI advancements, or just curious about the future of hacking and defense, this episode breaks it all down. 📌 Like, Subscribe & Hit the Bell to stay ahead of the threats! #CyberSecurity #AI #MicrosoftCopilot #CoffeeLoader #Malware #Rootkit #ZeroDay #ExploitBrokers #InfoSec #Hacking #EDREvasion 💬 What’s your take on AI in security? Tool or threat? Drop your thoughts below! 🎙️ Hosted by Cipherceval | Exploit Brokers Podcast 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Show Notes: https://exploitbrokers.com/podcasts/hn59 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers ⏱️ Timeline: 00:00 – Intro 00:44 – Microsoft AI Finds 20+ Critical Bootloader Vulnerabilities 10:02 – CoffeeLoader Malware’s Advanced Evasion Techniques 17:50  – Final Thoughts: AI in Cybersecurity & What Comes Next 🔗 References & Sources * Microsoft Uses AI for Security: https://www.bleepingcomputer.com/news/security/microsoft-uses-ai-to-find-flaws-in-grub2-u-boot-barebox-bootloaders/ * CoffeeLoader: https://www.darkreading.com/threat-intelligence/coffeeloader-malware-evasion-tricks

03. apr. 2025 - 19 min
episode HN58 - Havoc in the Cloud: The Shocking Click Fix Exploit Revealed artwork
HN58 - Havoc in the Cloud: The Shocking Click Fix Exploit Revealed

Welcome to Exploit Brokers with your host Cipherceval! In this deep dive, we uncover a sophisticated cyber assault where hackers exploited Microsoft SharePoint to launch the Havoc C2 via a stealthy click fix attack. Learn how a single click can trigger malicious PowerShell commands, turning everyday corporate tools into gateways for cybercrime. In this episode, we explore: • How click fix attacks trick users into executing harmful commands • The role of social engineering in modern cyber warfare • The rising threat of ransomware targeting Middle Eastern banks and financial institutions • The importance of patching, penetration testing, and proactive cybersecurity measures Whether you're a cybersecurity expert or just curious about digital threats, this breakdown provides essential insights into how cybercriminals are reshaping the rules of digital warfare. Stay informed and protect yourself from these evolving dangers. Don't forget to like, subscribe, and hit the bell icon for more updates on cybersecurity trends! #CyberSecurity #HavocC2 #ClickFix #SharePointHack #Ransomware #DigitalWarfare #CyberAttack #Malware #SocialEngineering #ExploitBrokers 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Show Notes: https://exploitbrokers.com/podcasts/hn58 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers Timeline: 0:00 Intro 0:19 Opener 0:45 Subscribe 1:06 Sharepoint Malware 12:03 Ransomware Targets Middle East banks 23:36 Conclusion and Outro 🔗 References & Sources * ClickFix Attack: https://www.bleepingcomputer.com/news/security/new-clickfix-attack-deploys-havoc-c2-via-microsoft-sharepoint/ * UAE : https://www.darkreading.com/cyber-risk/targeted-ransomware-middle-east-banks-security

06. mar. 2025 - 24 min
episode HN57 - Unmasking SpyLoan: The Android Malware Preying on Loan Seekers artwork
HN57 - Unmasking SpyLoan: The Android Malware Preying on Loan Seekers

In this episode of Exploit Brokers, we dive into the dark world of cybercrime, exploring two alarming topics: a malicious Android loan app masquerading as a financial tool and Xerox printer vulnerabilities that could be leaking your credentials. Learn how loan sharks have moved from traditional methods to sophisticated digital predation, exploiting unsuspecting users via apps like SpyLoan. We break down how these apps bypass Google Play's protections, steal sensitive data, and push predatory lending practices, especially targeting vulnerable users. Additionally, we uncover how attackers are using patched vulnerabilities in Xerox Versalink C7025 printers to manipulate configurations, capture user credentials, and potentially gain lateral access to entire Windows environments. Whether you're a tech enthusiast or a cybersecurity professional, this episode offers valuable insights into how digital crime is evolving and what you can do to protect yourself. Don't forget to like, subscribe, and hit the notification bell for more in-depth analyses on cybersecurity threats and exploits. #CyberSecurity #AndroidMalware #LoanSharks #XeroxPrinterHack #DataBreach #DigitalCrime #SpyLoan #CyberThreats #ExploitBrokers #TechNews 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Show Notes: https://exploitbrokers.com/podcasts/hn57 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources * Xerox: https://www.darkreading.com/iot/xerox-printer-vulnerabilities-credential-capture * Malicious App: https://www.bleepingcomputer.com/news/security/spylend-android-malware-downloaded-100-000-times-from-google-play/

27. feb. 2025 - 20 min
episode HN56 - Massive Bug Puts Outlook Users at Risk | Kimsuky gets RDPWrapper artwork
HN56 - Massive Bug Puts Outlook Users at Risk | Kimsuky gets RDPWrapper

In today’s episode of Exploit Brokers, we dive deep into two major security threats making waves across the digital world. A critical Remote Code Execution (RCE) vulnerability in Microsoft Outlook is putting millions of users at risk, with hackers exploiting it through spear phishing emails and malicious links. Not only that, but we’re also uncovering the stealthy tactics of the notorious North Korean hacking group, Kimsuky. They’re evolving their methods with custom RDP wrappers and proxy tools to evade detection while gaining unauthorized access to systems. Stay informed about the latest threats, learn how to keep your systems secure, and protect yourself from the growing wave of cyberattacks that are more dangerous than ever.  #OutlookRCE #Cybersecurity #Hacking #ExploitBrokers #CyberThreats #Phishing #RDPWrapper #Kimsuky #RemoteCodeExecution #MicrosoftSecurity #TechNews #Malware #DataBreach #EmailSecurity #Hackers #InfoSec #SecurityUpdates #cyberdefense 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Show Notes: https://exploitbrokers.com/podcasts/hn56 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources * Kimsuky hackers: https://www.bleepingcomputer.com/news/security/kimsuky-hackers-use-new-custom-rdp-wrapper-for-remote-access/ * RCE in Outlook: https://www.bleepingcomputer.com/news/security/critical-rce-bug-in-microsoft-outlook-now-exploited-in-attacks/

13. feb. 2025 - 27 min
episode HN55 - Double Zipping Danger: The 7-Zip Exploit That Could Hack Your PC artwork
HN55 - Double Zipping Danger: The 7-Zip Exploit That Could Hack Your PC

Welcome back to Exploit Brokers! In today’s video, we dive deep into a critical 7‑Zip vulnerability that’s being exploited by Russian cybercriminals to bypass Windows’ security protections. If you’ve used 7‑Zip at all, you need to know how this flaw can let hackers sneak past the Mark-of-the-Web (MOTW) and deploy dangerous malware like Smoke Loader. We'll also explore a parallel threat in the Go ecosystem—malicious packages exploiting caching mechanisms to gain persistent remote access to your system. From double-zipped archives to supply chain attacks, we break down the tactics, the risks, and most importantly, what you can do to protect yourself and your organization. In this video you’ll learn: How the 7‑Zip vulnerability works and why updating to the latest version is crucial. The role of Windows’ MOTW and how hackers are bypassing this key security feature. Details on the deployment of Smoke Loader malware and its implications. How malicious Go packages and supply chain attacks can compromise your systems. Practical tips to safeguard your data and networks against these emerging threats. Stay informed, stay secure—hit that like button, subscribe, and ring the bell for more cybersecurity insights! Drop your questions or thoughts in the comments below—we love hearing from you! #Cybersecurity #7Zip #WindowsSecurity #Malware #SmokeLoader #GoLang #SupplyChainAttack #Cybercrime #InfoSec #Hacking #RussianHackers #APT #NationStateHackers #exploits #ZeroDays 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Show Notes: https://exploitbrokers.com/podcasts/hn55 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources * Malicious Cached Go Modules: https://thehackernews.com/2025/02/malicious-go-package-exploits-module.html * Russian hackers Exploit 7-zip: https://thehackernews.com/2025/02/russian-cybercrime-groups-exploiting-7.html

06. feb. 2025 - 27 min
En fantastisk app med et enormt stort udvalg af spændende podcasts. Podimo formår virkelig at lave godt indhold, der takler de lidt mere svære emner. At der så også er lydbøger oveni til en billig pris, gør at det er blevet min favorit app.
Rigtig god tjeneste med gode eksklusive podcasts og derudover et kæmpe udvalg af podcasts og lydbøger. Kan varmt anbefales, om ikke andet så udelukkende pga Dårligdommerne, Klovn podcast, Hakkedrengene og Han duo 😁 👍
Podimo er blevet uundværlig! Til lange bilture, hverdagen, rengøringen og i det hele taget, når man trænger til lidt adspredelse.

Prøv gratis i 7 dage

99,00 kr. / måned efter prøveperiode.Ingen binding.

Eksklusive podcasts

Uden reklamer

Gratis podcasts

Lydbøger

20 timer / måned

Prøv gratis

Kun på Podimo

Populære lydbøger