Exploit Brokers By Forgebound Research - Tech and Hacking News Commentary

Cipherceval

Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat

  1. 5D AGO

    Cisco & Dell CVSS 10.0 Exploited for YEARS, Claude AI Jailbroken, ScarCruft Jumps Air Gaps | HN64

    Two perfect CVSS 10.0 scores in one news cycle. A state-sponsored actor living inside Cisco's SD-WAN platform since 2023. A brand-new lateral movement technique called "Ghost NICs" that leaves no forensic trace. An AI chatbot jailbroken to steal 195 million government records. A North Korean hacking group bridging air-gapped networks with USB drives and an embedded Ruby runtime. And a phishing platform so sophisticated it makes your multi-factor authentication functionally useless. This is Hacking News Episode 64 from Exploit Brokers by Forgebound Research. Five stories, multiple nation-state actors, and some genuinely novel attack techniques. Let's get into it. 🕐 TIMESTAMPS 0:00 — Cold Open 1:12 — Welcome & CTA 1:55 — Story 1: Cisco SD-WAN Zero-Day (CVE-2026-20127, CVSS 10.0) — Five Eyes Response 6:55 — Story 2: Dell RecoverPoint Zero-Day (CVE-2026-22769, CVSS 10.0) — Ghost NICs 11:35 — Story 3: Claude AI Jailbreak — 195 Million Mexican Government Records 15:27 — Story 4: ScarCruft Air-Gap Bridging — "Ruby Jumper" Campaign 19:55 — Story 5: Starkiller Phishing-as-a-Service — MFA Bypass 25:02 — Recap & 5 Key Takeaways 27:28 — Outro 📚 SOURCES Story 1 — Cisco SD-WAN: Cisco Advisory cisco-sa-sdwan-rpa-EHchtZk — https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk CISA Emergency Directive 26-03 — https://www.cisa.gov/emergency-directive-26-03 ASD-ACSC Hunt Guide — https://www.cyber.gov.au/ BleepingComputer — https://www.bleepingcomputer.com/ The Hacker News — https://thehackernews.com/ Dark Reading — https://www.darkreading.com/ SecurityWeek — https://www.securityweek.com/ Story 2 — Dell RecoverPoint: Google Cloud / Mandiant GTIG Report — https://cloud.google.com/blog/topics/threat-intelligence/ Dell Security Advisory DSA-2026-079 — https://www.dell.com/support/kbdoc/en-us/000426742/ CISA Known Exploited Vulnerabilities Catalog — https://www.cisa.gov/known-exploited-vulnerabilities-catalog The Hacker News — https://thehackernews.com/ SecurityWeek — https://www.securityweek.com/ CyberScoop — https://cyberscoop.com/ Story 3 — Claude AI Jailbreak: Bloomberg (Feb 25, 2026) — https://www.bloomberg.com/ VentureBeat — https://venturebeat.com/ Gambit Security Research — https://gambitsecurity.com/ Story 4 — ScarCruft Ruby Jumper: Zscaler ThreatLabz Report (Feb 27) — https://www.zscaler.com/blogs/security-research/ The Hacker News — https://thehackernews.com/ BleepingComputer — https://www.bleepingcomputer.com/ Story 5 — Starkiller PhaaS: Krebs on Security — https://krebsonsecurity.com/ Abnormal AI Technical Analysis — https://abnormalsecurity.com/blog/ Dark Reading — https://www.darkreading.com/ Infosecurity Magazine — https://www.infosecurity-magazine.com/ ⚠️ DISCLAIMER The content presented by Exploit Brokers by Forgebound Research is for educational and informational purposes only. Cipherceval is a cybersecurity educator and commentator — not your personal security consultant, legal counsel, or professional advisor. The information shared here reflects publicly available research, industry reporting, and the host's personal perspective. It does not constitute professional security consulting or individualized guidance for your specific environment. Always consult with qualified professionals for decisions affecting your systems and security posture. 🔔 Subscribe for weekly cybersecurity news and analysis. 👍 Like if this episode was helpful. 🔗 Share with your team — awareness is the first line of defense. #cybersecurity #hackernews #exploitbrokers #cipherceval #infosec #cisco #sdwan #cve #zerodday #ghostnics #dell #recoverpoint #claudeai #jailbreak #scarcruft #northkorea #airgap #starkiller #phishing #mfa #fido2 #passkeys #fiveeyes #cisa #threatintelligence #apisecurity #cyberthreat #nationstatehacking #databreach

    28 min
  2. MAR 5

    600 Firewalls Breached by AI in 5 Weeks — Plus Chrome Zero-Day, CVSS 9.9 RCE & AI-Powered Malware | HN63

    AI is reshaping both sides of the cybersecurity battlefield — and fast. In this episode, we break down five stories that prove it: the first Chrome zero-day of 2026 (CVE-2026-2441), a near-perfect CVSS 9.9 in Microsoft's Semantic Kernel SDK (CVE-2026-26030), a supply chain attack on AI coding assistant Cline that silently installed autonomous agents on thousands of developer machines, the first-ever Android malware using Google's Gemini AI at runtime (PromptSpy), and a Russian-speaking threat actor who used commercial AI tools to breach over 600 FortiGate firewalls across 55 countries in just five weeks. Whether you're a developer, security professional, or just someone who uses a browser — this one's worth your time. 🔔 Subscribe and hit the bell so you don't miss an episode! 🎧 Also available on Spotify, Apple Podcasts, and wherever you get your pods. --- ### ⏱️ Timestamps 0:00 — Hook: AI Is Reshaping Cybersecurity 1:08 — Welcome & CTA 1:49 — Story 1: Chrome Zero-Day CVE-2026-2441 (CVSS 8.8) 5:15 — Story 2: Microsoft Semantic Kernel RCE CVE-2026-26030 (CVSS 9.9) 7:58 — Story 3: Cline CLI Supply Chain Attack — OpenClaw Installed on 4,000 Machines 14:35 — Story 4: PromptSpy — First Android Malware Using Gemini AI 20:15 — Story 5: 600 FortiGate Firewalls Breached via AI-Assisted Campaign 25:57 — Recap & Key Takeaways 28:46 — Outro --- ### 📰 Story Summaries **Story 1 — Chrome Zero-Day: CVE-2026-2441 (CVSS 8.8)** Google patched the first actively exploited Chrome zero-day of 2026 on February 13th. It's a use-after-free vulnerability in Chrome's CSS engine — specifically in the CSSFontFeatureValuesMap implementation — caused by an iterator invalidation bug. An attacker can craft a malicious HTML page to achieve arbitrary code execution inside Chrome's sandbox. Reported by researcher Shaheen Fazim on Feb 11, patched two days later. Affects ALL Chromium-based browsers: Chrome, Edge, Brave, Opera, Vivaldi. Patched in Chrome 145.0.7632.75/76 (Win/Mac) and 144.0.7559.75 (Linux). **Story 2 — Semantic Kernel RCE: CVE-2026-26030 (CVSS 9.9)** A critical remote code execution vulnerability in Microsoft's Semantic Kernel Python SDK — specifically in the InMemoryVectorStore filter functionality. CWE-94: Improper Control of Code Generation. Network-accessible with low attack complexity, low privilege required, and zero user interaction needed. If you're building AI applications with RAG, AI agents, or semantic search using Semantic Kernel, this one hits close to home. Patched in python-1.39.4. Microsoft's workaround: avoid using InMemoryVectorStore in production until patched. **Story 3 — Cline Supply Chain Attack** On February 17, 2026, someone compromised Cline's npm publish token and pushed a malicious update (Cline CLI v2.3.0) that silently installed OpenClaw — a self-hosted autonomous AI agent — on every developer machine that pulled the update. The attack chain started when researcher Adnan Khan discovered a prompt injection vulnerability in Cline's AI-powered GitHub issue triage bot. The attacker used GitHub Actions cache poisoning to pivot from the triage workflow to the release pipeline, leaking npm publication credentials. Cline patched the prompt injection within 30 minutes but rotated the wrong token. Eight days later, the still-valid token was used to publish the compromised package. It was live for ~8 hours and downloaded roughly 4,000 times. Fixed in v2.4.0; publishing moved to OIDC via GitHub Actions. **Story 4 — PromptSpy: First Android Malware Using Generative AI at Runtime** ESET researchers discovered PromptSpy — the first known Android malware to use Google's Gemini AI model during its execution flow. Traditional Android malware relies on hardcoded tap coordinates and UI selectors that break across different devices. PromptSpy solves this by taking an XML dump of the current screen and sending it to Gemini, which returns JSON instructions telling the malware exactly where to tap. It uses this loop to pin itself in the recent apps list, persisting across reboots. Primary payload: a built-in VNC module for full remote device access. Also captures lockscreen PINs, records unlock patterns as video, and blocks uninstallation with invisible overlays. Distributed via a site impersonating JPMorgan Chase targeting Argentina. Chinese language strings found in codebase. Not on Google Play; Google Play Protect detects known variants. **Story 5 — 600 FortiGate Firewalls Breached via AI-Assisted Campaign** Amazon Threat Intelligence revealed a Russian-speaking, financially motivated threat actor used multiple commercial AI tools to compromise 600+ FortiGate firewall devices across 55 countries in just 5 weeks (Jan 11–Feb 18, 2026). No zero-days — just exposed management interfaces and weak credentials with single-factor auth. The attacker extracted full device configs (SSL-VPN creds, network topology, IPsec settings), then fed that data into a custom system called ARXON that queried LLMs including DeepSeek and Claude to generate attack plans. Post-exploitation included DCSync attacks against Active Directory, lateral movement via pass-the-hash and pass-the-ticket, NTLM relay attacks, and targeting of Veeam Backup servers — consistent with ransomware preparation. No ransomware was actually deployed. The attacker's staging server (212[.]11[.]64[.]250) was publicly accessible, exposing AI-generated attack plans and victim configs. As Amazon CISO CJ Moses put it: organizations need to anticipate that AI-augmented threat activity will continue to grow from both skilled and unskilled adversaries. --- ### 📋 Key Takeaways 1. **Update your browsers.** Chrome's first zero-day of 2026 is patched (CVE-2026-2441). A crafted web page is all it takes. This applies to Chrome, Edge, Brave, and every Chromium-based browser. 2. **AI development tooling is now a high-value target.** A CVSS 9.9 in Microsoft's Semantic Kernel and a supply chain attack on Cline — if you're building with AI tools, their security is now part of your threat model. 3. **Supply chain security isn't just about dependencies — it's about your CI/CD pipeline.** The Cline attack started with a GitHub issue title that manipulated an AI triage bot. If you're using AI automation in build pipelines, treat those AI agents as privileged actors that need governance. 4. **AI is being weaponized on both sides.** PromptSpy uses Gemini for malware persistence; the FortiGate campaign used AI to generate attack plans and execute tools autonomously. This is operational, not theoretical. 5. **Fundamentals still win.** Six hundred firewalls breached — not with zero-days, but with weak passwords and exposed management interfaces. MFA, credential hygiene, network segmentation, and patching remain the most effective defenses. --- ### 📚 Sources **Story 1 — Chrome Zero-Day (CVE-2026-2441)** - The Hacker News: https://thehackernews.com/2026/02/new-chrome-zero-day-cve-2026-2441-under.html - BleepingComputer / Malwarebytes: https://www.malwarebytes.com/blog/news/2026/02/update-chrome-now-zero-day-bug-allows-code-execution-via-malicious-webpages - Help Net Security: https://www.helpnetsecurity.com/2026/02/16/google-patches-chrome-vulnerability-with-in-the-wild-exploit-cve-2026-2441/ - The Register: https://www.theregister.com/2026/02/16/chromes_zeroday/ - SOCRadar: https://socradar.io/blog/cve-2026-2441-chrome-0-day-sandbox-code-execution/ - Google Chrome Release Blog: https://chromereleases.googleblog.com **Story 2 — Semantic Kernel RCE (CVE-2026-26030)** - GitHub Security Advisory: https://github.com/microsoft/semantic-kernel/security/advisories/GHSA-xjw9-4gw8-4rqx - NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-26030 - The Hacker Wire: https://www.thehackerwire.com/vulnerability/CVE-2026-26030/ **Story 3 — Cline Supply Chain Attack** - The Hacker News: https://thehackernews.com/2026/02/cline-cli-230-supply-chain-attack.html - The Register: https://www.theregister.com/2026/02/20/openclaw_snuck_into_cline_package - Dark Reading: https://www.darkreading.com/application-security/supply-chain-attack-openclaw-cline-users - Snyk (Clinejection Analysis): https://snyk.io/blog/cline-supply-chain-attack-prompt-injection-github-actions/ - Endor Labs: https://www.endorlabs.com/learn/supply-chain-attack-targeting-cline-installs-openclaw - Adnan Khan's Research: https://adnanthekhan.com/2026/02/09/clinejection/ **Story 4 — PromptSpy Android Malware** - ESET / WeLiveSecurity: https://www.welivesecurity.com/en/eset-research/promptspy-ushers-in-era-android-threats-using-genai/ - The Hacker News: https://thehackernews.com/2026/02/promptspy-android-malware-abuses-google.html - BleepingComputer: https://www.bleepingcomputer.com/news/security/promptspy-is-the-first-known-android-malware-to-use-generative-ai-at-runtime/ - SecurityWeek: https://www.securityweek.com/promptspy-android-malware-abuses-gemini-ai-at-runtime-for-persistence/ - ESET Press Release: https://www.eset.com/us/about/newsroom/research/eset-research-discovers-promptspy-first-android-threat-using-genai/ **Story 5 — FortiGate AI-Assisted Campaign** - Amazon / AWS Security Blog: https://aws.amazon.com/blogs/security/ai-augmented-threat-actor-accesses-fortigate-devices-at-scale/ - The Hacker News: https://thehackernews.com/2026/02/ai-assisted-threat-actor-compromises.html - BleepingComputer: https://www.bleepingcomputer.com/news/security/amazon-ai-assisted-hacker-breached-600-fortigate-firewalls-in-5-weeks/ - The Record: https://therecord.media/gen-ai-fortigate-hackers-russia - SecurityWeek: https://www.securityweek.com/hundreds-of-fortigate-firewalls-hacked-in-ai-powered-attacks-aws/ - Security Affairs: https://securityaffairs.com/188351/hacking/ai-powered-campaign-compromises-600-fortigate-systems-worldwide.html --- ### ⚖️ Discla

    29 min
  3. FEB 26

    6 Zero-Days Exploited NOW, Lazarus Poisons npm, AI-Generated Malware & More | HN62

    Microsoft just dropped patches for SIX actively exploited zero-day vulnerabilities — and that's just the beginning. In this week's Hacking News, we break down the February 2026 Patch Tuesday emergency, North Korea's Lazarus Group poisoning npm and PyPI through fake job recruiters, nation-state hackers weaponizing Google's Gemini AI (including malware that writes its own payloads), a massive Dutch telecom breach affecting 6.2 million people, and a U.S. government contractor breach that ballooned from 4 million to potentially tens of millions affected. This is Exploit Brokers by Forgebound Research — cybersecurity news, threat intelligence, and insights. Whether you're a security analyst, developer, or just someone who wants to stay informed, this episode has something for you. 🔔 Subscribe and hit the bell so you never miss an episode. ⭐ Listening on Spotify or Apple Podcasts? A follow and 5-star rating helps others find the show. --- ⏱️ TIMESTAMPS 0:00 — Cold Open: Did You Run Windows Update? 0:51 — Forge OS Intro 0:55 — Welcome & CTA 1:20 — Microsoft Patch Tuesday: 6 Actively Exploited Zero-Days 6:08 — Lazarus Group "GraphAlgo": Fake Recruiters Poison npm & PyPI 10:02 — Nation-States Weaponize Google Gemini AI (HONESTCUE Malware) 15:05 — Odido Breach: 6.2 Million Dutch Records Stolen 18:38 — Conduent Breach Expands from 4M to Tens of Millions 21:55 — Recap & 5 Key Takeaways 23:54 — Outro --- 📰 STORIES COVERED Story 1 — Microsoft February 2026 Patch Tuesday • 58 vulnerabilities patched, 6 actively exploited zero-days • CVE-2026-21510: Windows SmartScreen bypass (CVSS 8.8) — "widespread active exploitation" • CVE-2026-21513: MSHTML security bypass • CVE-2026-21514: Microsoft Word OLE bypass • CVE-2026-21533: Remote Desktop Services privilege escalation to SYSTEM • CVE-2026-21519: Desktop Window Manager type confusion → SYSTEM • CVE-2026-21525: RasMan denial of service (VPN crash) • Google, CrowdStrike, Acros Security & Microsoft collaborated on discovery Story 2 — Lazarus Group "GraphAlgo" Campaign • 192 malicious npm/PyPI packages targeting JavaScript & Python developers • Fake crypto companies (e.g., "Veltrix Capital") used for recruitment lures • Package "bigmathutils" had 10,000+ downloads before payload injection at v1.1.0 • Full-featured RAT with token-based C2 authentication • Attribution: Medium-to-high confidence (Lazarus/DPRK) — GMT+9 commit timestamps Story 3 — Nation-State Actors Weaponize Google Gemini • Google GTIG report (Feb 12, 2026) confirms NK, Iran, China, Russia using Gemini • UNC2970 (Lazarus overlap) using AI for OSINT and target profiling • Iran's APT42 crafting native-sounding phishing with AI • HONESTCUE malware: Uses Gemini API to generate & execute C# payloads in memory (fileless + polymorphic) • COINBAIT phishing kit built using Lovable AI coding platform Story 4 — Odido (Netherlands) Data Breach • 6.2 million customers affected (~1/3 of the Netherlands' population) • Stolen: Names, addresses, emails, phone numbers, DOBs, IBANs, passport/license numbers • Formerly T-Mobile Netherlands; subsidiary Ben also affected • Part of broader telecom targeting pattern (Salt Typhoon, SK Telecom, Free SAS) Story 5 — Conduent Breach Expansion • Jan 2025 ransomware attack originally reported as 4M affected • Now: 15.4M in Texas alone, 10.5M in Oregon, plus DE, MA, NH and more • Total potentially tens of millions across the U.S. • Safeway ransomware gang claimed 8TB stolen • SSNs, medical data, health insurance information compromised --- 📋 KEY TAKEAWAYS 1. Patch like it's urgent — 6 actively exploited zero-days can't wait 2. Your package manager is an attack surface — sandbox job assessment code 3. AI is a force multiplier for attackers — bad grammar is no longer a reliable phishing indicator 4. Telecom data is a goldmine — verify everything through official channels 5. Breach disclosures can be icebergs — monitor your identity proactively --- 🔗 SOURCES Microsoft Patch Tuesday: • BleepingComputer — https://www.bleepingcomputer.com • Krebs on Security — https://krebsonsecurity.com • SecurityWeek — https://www.securityweek.com • Malwarebytes — https://www.malwarebytes.com • Rapid7 — https://www.rapid7.com • Help Net Security — https://www.helpnetsecurity.com • TechCrunch — https://techcrunch.com Lazarus GraphAlgo: • ReversingLabs — https://www.reversinglabs.com • The Hacker News — https://thehackernews.com • BleepingComputer — https://www.bleepingcomputer.com • SC Media — https://www.scworld.com • Security Affairs — https://securityaffairs.com Gemini AI Weaponization: • Google GTIG Blog — https://blog.google/technology/safety-security/ • The Hacker News — https://thehackernews.com • Infosecurity Magazine — https://www.infosecurity-magazine.com • AI News — https://www.artificialintelligence-news.com Odido Breach: • BleepingComputer — https://www.bleepingcomputer.com • The Register — https://www.theregister.com • TechCrunch — https://techcrunch.com • SecurityWeek — https://www.securityweek.com • The Record — https://therecord.media • NL Times — https://nltimes.nl Conduent Breach: • TechCrunch — https://techcrunch.com --- 🏷️ HASHTAGS #cybersecurity #hackingnews #zeroday #microsoft #patching #lazarusgroup #npm #supplychainattack #gemini #AI #malware #databreach #ransomware #infosec #threathunting #exploitbrokers #forgeboundresearch #northkorea #nationstate #cyberthreat #patchtuesday #developers #phishing #telecom #OSINT ---

    24 min
  4. FEB 19

    State Hackers Hit 37 Countries, BeyondTrust CVSS 9.9 RCE, Signal Hijacked & More | HN Ep. 61

    A newly uncovered state-backed espionage group has compromised 70 organizations across 37 countries in a single year — and they were scanning infrastructure in 155 more. In this episode of Hacking News, we break down Palo Alto Unit 42's Shadow Campaigns investigation, a CVSS 9.9 pre-authentication RCE in BeyondTrust's remote access tools, a state-sponsored Signal phishing campaign targeting European politicians and military officials without using a single line of malware, CISA's aggressive new directive ordering federal agencies to rip out end-of-life edge devices, and an Everest ransomware claim against Iron Mountain that turned out to be far less than advertised. Whether you're a cybersecurity professional, IT admin, or just someone who wants to stay informed about the threats facing our digital world — this episode has critical takeaways you can act on today. 🔒 Key Topics Covered: • TGR-STA-1030 "Shadow Campaigns" — state-backed espionage across 37 countries • BeyondTrust CVE-2026-1731 — CVSS 9.9 pre-auth RCE in remote access tools • Signal Phishing Campaign — German BfV/BSI advisory on account hijacking • CISA BOD 26-02 — Binding directive to eliminate end-of-support edge devices • Iron Mountain / Everest Ransomware — 1.4TB breach claims vs. reality ⏱️ Timestamps: 0:00 — Cold Open: One group, 37 countries breached 1:10 — Forge OS Intro 1:14 — Welcome & CTA 1:38 — Shadow Campaigns: State-Backed Espionage at Unprecedented Scale 7:04 — BeyondTrust CVE-2026-1731: CVSS 9.9 Pre-Auth RCE 11:07 — Signal Phishing: Hijacking Accounts Without Malware 14:10 — CISA BOD 26-02: Rip Out Your End-of-Life Edge Devices 16:55 — Iron Mountain vs. Everest Ransomware: Claims vs. Reality 19:38 — Recap & Key Takeaways 21:40 — Outro 📌 Resources & Sources: • Unit 42 Shadow Campaigns Report: https://unit42.paloaltonetworks.com/shadow-campaigns-uncovering-global-espionage/ • BeyondTrust Security Advisory BT26-02: https://www.beyondtrust.com/trust-center/security-advisories/bt26-02 • German BfV/BSI Signal Phishing Advisory: https://thehackernews.com/2026/02/german-agencies-warn-of-signal-phishing.html • CISA BOD 26-02 Directive: https://www.cisa.gov/news-events/directives/bod-26-02-mitigating-risk-end-support-edge-devices • Iron Mountain / Everest Coverage: https://cybernews.com/security/iron-mountain-data-breach-claims/ 🎧 Listen on Spotify & Apple Podcasts — search "Exploit Brokers by Forgebound Research" and hit follow! 💬 Found this valuable? Share it with a coworker or friend who touches a computer. — Exploit Brokers by Forgebound Research Host: Cipherceval "Learn more about the threats we face and gain a bit more knowledge than yesterday."

    22 min
  5. 04/03/2025

    Microsoft AI Discovers 20 Zero-Day Vulnerabilities in Bootloaders!

    # Title * HN59 - Microsoft AI Discovers 20 Zero-Day Vulnerabilities in Bootloaders! ## Description 🔍 Microsoft's AI Uncovers 20 Zero-Day Threats | CoffeeLoader Malware Gets Smarter In this episode of Exploit Brokers, Cipherceval dives into how Microsoft Security Copilot, powered by AI, discovered over 20 previously unknown vulnerabilities in popular bootloaders like GRUB2, U-Boot, and Barebox. These flaws could allow attackers to bypass Secure Boot and install stealthy bootkits. We also explore the terrifying evolution of CoffeeLoader malware — now equipped with GPU-based cloaking, Windows fibers, and sleep obfuscation — making it one of the most advanced malware loaders in circulation today. Whether you're into cybersecurity, AI advancements, or just curious about the future of hacking and defense, this episode breaks it all down. 📌 Like, Subscribe & Hit the Bell to stay ahead of the threats! #CyberSecurity #AI #MicrosoftCopilot #CoffeeLoader #Malware #Rootkit #ZeroDay #ExploitBrokers #InfoSec #Hacking #EDREvasion 💬 What's your take on AI in security? Tool or threat? Drop your thoughts below! 🎙️ Hosted by Cipherceval | Exploit Brokers Podcast 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Show Notes: https://exploitbrokers.com/podcasts/hn59 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers ⏱️ Timeline: 00:00 – Intro 00:44 – Microsoft AI Finds 20+ Critical Bootloader Vulnerabilities 10:02 – CoffeeLoader Malware's Advanced Evasion Techniques 17:50  – Final Thoughts: AI in Cybersecurity & What Comes Next 🔗 References & Sources * Microsoft Uses AI for Security: https://www.bleepingcomputer.com/news/security/microsoft-uses-ai-to-find-flaws-in-grub2-u-boot-barebox-bootloaders/ * CoffeeLoader: https://www.darkreading.com/threat-intelligence/coffeeloader-malware-evasion-tricks

    19 min
  6. 03/06/2025

    Havoc in the Cloud: The Shocking Click Fix Exploit Revealed

    Welcome to Exploit Brokers with your host Cipherceval! In this deep dive, we uncover a sophisticated cyber assault where hackers exploited Microsoft SharePoint to launch the Havoc C2 via a stealthy click fix attack. Learn how a single click can trigger malicious PowerShell commands, turning everyday corporate tools into gateways for cybercrime. In this episode, we explore: • How click fix attacks trick users into executing harmful commands • The role of social engineering in modern cyber warfare • The rising threat of ransomware targeting Middle Eastern banks and financial institutions • The importance of patching, penetration testing, and proactive cybersecurity measures Whether you're a cybersecurity expert or just curious about digital threats, this breakdown provides essential insights into how cybercriminals are reshaping the rules of digital warfare. Stay informed and protect yourself from these evolving dangers. Don't forget to like, subscribe, and hit the bell icon for more updates on cybersecurity trends! #CyberSecurity #HavocC2 #ClickFix #SharePointHack #Ransomware #DigitalWarfare #CyberAttack #Malware #SocialEngineering #ExploitBrokers 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Show Notes: https://exploitbrokers.com/podcasts/hn58 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers Timeline: 0:00 Intro 0:19 Opener 0:45 Subscribe 1:06 Sharepoint Malware 12:03 Ransomware Targets Middle East banks 23:36 Conclusion and Outro 🔗 References & Sources * ClickFix Attack: https://www.bleepingcomputer.com/news/security/new-clickfix-attack-deploys-havoc-c2-via-microsoft-sharepoint/ * UAE : https://www.darkreading.com/cyber-risk/targeted-ransomware-middle-east-banks-security

    24 min

Ratings & Reviews

5
out of 5
7 Ratings

About

Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat

You Might Also Like