Exploit Brokers - Tech and Hacking News Commentary

Exploit Brokers
Exploit Brokers - Tech and Hacking News Commentary

Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat

  1. 3 NGÀY TRƯỚC

    Fortnite Refund Update: Millions Refunded + Lazarus Group’s Crypto Hacks Revealed

    We’re diving into two major stories shaking up the gaming and cybersecurity worlds! First, we discuss the Fortnite Refund Update, where the FTC has forced Epic Games to refund millions due to their use of dark patterns. Find out if you’re eligible for a refund and how to claim it. Then, we shift gears to the Lazarus Group, North Korea’s infamous hacking collective, and their latest exploit targeting cryptocurrency investors using AI-generated content and Chrome vulnerabilities. Stay informed, protect yourself, and don’t miss these updates! Make sure to like, comment, and subscribe for more in-depth coverage of the latest tech, and cybersecurity news. #FortniteRefundUpdate #FortniteNews #EpicGames #FortniteScandal #GamingNews #FortniteRefunds #DarkPatterns #GamersBeware #CyberSecurity #CryptoHacks #LazarusGroup #Cryptocurrency #GamingIndustry #AIHacks #OnlineSafety #CyberThreats #TechNews #DataBreach #CryptoScams #GamingCommunity 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Show Notes: https://exploitbrokers.com/podcasts/hn49 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources * Fortnite Refunds: https://www.bleepingcomputer.com/news/gaming/ftc-distributes-72-million-in-fortnite-refunds-from-epic-games/ * Defi Lazarus: https://www.bleepingcomputer.com/news/security/lazarus-hackers-used-fake-defi-game-to-exploit-google-chrome-zero-day/

    23 phút
  2. 5 THG 12

    Hydra's Dark Web Empire CRUMBLES

    Uncover the fascinating yet chilling story of Hydra Market, the dark web’s largest illicit empire. Learn how this $1.35 billion platform operated, from smuggling narcotics and laundering money to offering hacking services. We’ll explore how its leader was sentenced to life in prison, the innovative (and illegal) technologies they used, and the global effort to bring it down. Plus, we’ll dive into how cryptocurrencies, Bitcoin mixers, and secret marketplaces fuel the shadowy world of digital crime. Is the Hydra truly gone, or will another head rise in its place? Watch now to find out! 🔍 Topics Covered: How the Hydra Market operated Cryptocurrencies and dark web transactions Smuggling tech: From hidden cars to makeshift labs The global crackdown on dark web crime What this means for the future of cybersecurity #HydraMarket #DarkWebExplained #Cybercrime #BitcoinMixer #Hacking #DarkNet #DigitalSecurity #CryptoCrime #TrueCrimeStories #CyberThreats 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources * Hydra Dark Web Market: https://www.bleepingcomputer.com/news/security/russia-sentences-hydra-dark-web-market-leader-to-life-in-prison/ * DDos Satellite: https://www.bleepingcomputer.com/news/security/korea-arrests-ceo-for-adding-ddos-feature-to-satellite-receivers/

    21 phút
  3. 28 THG 11

    Andrew Tate’s Platform Hacked by Activists + Russian Hackers Exploit Zero-Days

    Andrew Tate's platform, formerly known as Hustler’s University, has been hacked, exposing the data of over 800,000 users. Meanwhile, Russian hackers have exploited critical zero-day vulnerabilities in Firefox and Windows, demonstrating the growing sophistication of cyberattacks. In this video, we’ll break down the Andrew Tate hack, the implications of leaked user data, and how Russian threat actors are chaining vulnerabilities for remote code execution. Stay informed on the latest in cybersecurity and learn how to protect yourself against these emerging threats. If you enjoy this content, don’t forget to like, comment, and subscribe to stay updated on the latest in digital crime and cybersecurity! #AndrewTate #Cybersecurity #Hackers #DataBreach #ZeroDay #RussianHackers #HustlersUniversity #TheRealWorld #CyberThreats #DigitalSafety #Malware #Hacktivism #DataLeaks #FirefoxExploit #WindowsExploit #NationStateHackers #TechNews #OnlineSecurity #TheRealWorld 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources * Firefox Hacked By Russian Hackers: https://www.bleepingcomputer.com/news/security/firefox-and-windows-zero-days-exploited-by-russian-romcom-hackers/ * Andrew Tate's The Real World Hacked: https://www.malwarebytes.com/blog/news/2024/11/hilariously-insecure-andrew-tates-the-real-world-breached-800000-users-affected * DDoScecrets: https://ddosecrets.com/article/andrew-tate-s-the-real-world

    18 phút
  4. 21 THG 11

    Phobos’ $16M Haul & Helldown’s Secret Exploits – 2024’s Ransomware Crisis

    In this episode, we dive deep into the world of ransomware with two of 2024's most talked-about threats: Phobos and Helldown. Learn how the Phobos ransomware operation managed to dominate 11% of the market, generating $16 million in ransom payments, and the shocking details of its admin’s extradition to the U.S. We also explore the rise of Helldown ransomware, its exploitation of VPN vulnerabilities, and how these attacks are reshaping cybersecurity globally. If you’re curious about how ransomware works, the evolution of cybercrime, and what it means for businesses and individuals, this video is packed with insights. Don’t forget to like, subscribe, and hit the notification bell to stay updated on the latest cybersecurity trends. Key Topics Covered: What is ransomware-as-a-service (RaaS)? How Phobos became a major player in 2024. Helldown ransomware’s exploitation of undisclosed VPN vulnerabilities. Tips to secure your network and stay ahead of cybercriminals. Join the discussion in the comments! What’s your biggest takeaway from these cases? #Ransomware #PhobosRansomware #HelldownRansomware #Cybersecurity #CyberCrime #RansomwareExplained #Hacking #DataBreach #VPNSecurity #TechNews #PhobosAdmin #HelldownExploits #CyberThreats #ZeroDay #NationStateHacks #DigitalCrime #CybersecurityAwareness #OnlineSafety #RansomwareAttack #TechExplained #2024Trends #DataSecurity #NetworkSecurity #Hackers #CyberAttack #VPNVulnerabilities #DataProtection #TechTalks #CyberDefense #SecurityTips #PhobosVsHelldown 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources * Helldown ransomware: https://www.bleepingcomputer.com/news/security/helldown-ransomware-exploits-zyxel-vpn-flaw-to-breach-networks/ * Phobos admin charged: https://www.bleepingcomputer.com/news/security/us-charges-phobos-ransomware-admin-after-south-korea-extradition/

    28 phút
  5. 14 THG 11

    Malware Madness: How Remcos RAT and Human Error Fuel Cyber Threats

    In today's episode, we dive deep into the fascinating yet troubling world of cybersecurity, exploring how even the most advanced antivirus software, firewalls, and endpoint security measures can fall short due to a single factor: human error. Despite the latest tech solutions, hackers continue to exploit one consistent vulnerability—users clicking on suspicious links and files. We'll discuss how phishing emails, malware, and outdated software create an entryway for cybercriminals, even in some of the most secure environments. Using two real-world cases, we’ll uncover how modern-day malware such as Remcos RAT and Smoke Loader Trojan bypass standard security protocols. These cyber threats often use a combination of remote code execution (RCE) vulnerabilities, phishing emails disguised as business orders, and cleverly crafted zip files that hide malicious content. What’s even more shocking? These vulnerabilities have been known for years, yet are still exploited due to outdated software and a lack of user awareness. Whether you're an individual trying to protect your personal data or part of an organization concerned with cybersecurity, this video is packed with insights on staying safe online. Learn how to spot phishing attempts, recognize the importance of regular software updates, and understand why cybersecurity training is essential to protecting yourself and your organization from potential threats. If you enjoy this breakdown, don’t forget to hit the like button, subscribe, and click the notification bell to stay updated with more cybersecurity insights! Your support helps the channel grow and allows us to bring more content your way. Let’s keep your digital world safe—one informed click at a time. #Cybersecurity #Malware #DataBreach #Phishing #CyberThreats #RemoteCodeExecution #RemcosRAT #SmokeLoader #UserAwareness #TechNews #CyberAttack #OnlineSafety #DigitalSecurity #Antivirus #CyberHygiene #TechExplained #StaySafeOnline #CybersecurityTips #DataProtection #Infosec 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources Remcos RAT: https://www.darkreading.com/application-security/revamped-remcos-rat-microsoft-windows-users ZIP Files Abused: https://www.darkreading.com/threat-intelligence/flexible-structure-zip-archives-exploited-hide-malware-undetected

    33 phút
  6. 7 THG 11

    Malicious Crack Tools & Malvertising Attack: How Hackers Steal Your Data

    In today's episode, we’re diving into the hidden dangers of malicious installers, software cracks, and deceptive ads on Google. We'll explore recent stories, including the SteelFox malware that's hijacking Windows PCs, stealing credit card data, and mining cryptocurrency using vulnerable drivers. Plus, we’ll uncover a new wave of malvertising attack scams targeting eBay users and how scammers are leveraging Google Ads to lure unsuspecting victims into calling fake support numbers. With digital crime and data breaches on the rise, it’s essential to stay informed and protect yourself from these evolving threats. Tune in as we break down the techniques hackers are using to bypass antivirus software, escalate system privileges, and steal valuable data – and what you can do to avoid falling victim to these cyber threats. Whether you're a tech enthusiast, developer, or just curious about cybersecurity, this episode is packed with insights that could save you from a dangerous download! #MalvertisingAttack #CyberSecurity #Malware #Hacking #DataBreach #DigitalCrime #SteelFox #Malvertising #GoogleAds #DataPrivacy #CyberThreats #Hackers #DataProtection #DigitalSecurity #CryptoMining #Antivirus #VulnerableDrivers #NationStateHacking #SystemPrivilege #Ransomware #APT #SoftwareCracks #MaliciousSoftware #OnlineScams #eBayScam #Torrents #CyberAwareness #InfoStealer #FakeSupport #SocialEngineering #HackersExplained 👍 Enjoyed the video? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources SteelFox Article: https://www.bleepingcomputer.com/news/security/new-steelfox-malware-hijacks-windows-pcs-using-vulnerable-driver/ SteelFox Technical: https://securelist.com/steelfox-trojan-drops-stealer-and-miner/114414/ Ebay Malvertising Attack: https://www.malwarebytes.com/blog/scams/2024/11/large-ebay-malvertising-campaign-leads-to-scams

    23 phút
  7. 31 THG 10

    Dutch Police Take Down Major Information Stealers: Redline & Meta Stealer

    In a significant international operation, Dutch police and global law enforcement partners have taken down two major information stealers: Redline and Meta Stealer. These dangerous malware operations targeted thousands of victims worldwide, stealing passwords, sensitive data, and more. This video explores how law enforcement agencies worked together to dismantle their infrastructure, taking down over 1,200 servers with malware in dozens of countries. We'll also discuss how information stealers operate, their connection to cryptocurrency laundering, and what this takedown means for the ongoing battle against cybercrime. Watch now to learn more about this landmark cybersecurity victory! If you found this video informative, please like, share, and subscribe for more cybersecurity news, updates, and insights. Don’t forget to hit the notification bell to stay updated! #CyberSecurity #RedlineStealer #MetaStealer #InformationStealer #DutchPolice #Cybercrime #MalwareTakedown #OperationMadness #InfoStealer #CyberThreats #MalwareAsAService #Hacking #DataBreach #CyberAttack #CyberLaw #DigitalForensics #LawEnforcement #InternationalPolice #CyberWar #ThreatIntelligence #MalwareAnalysis #Ransomware #CryptoLaundering #DataExfiltration #CyberAwareness #CyberDefense #DataProtection #OnlineSafety #Hackers #MalwarePrevention #CybersecurityNews 👍 Enjoyed the episode? Give us a follow and a review! Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources Dutch Disrupt Info Stealers: https://thehackernews.com/2024/10/dutch-police-disrupt-major-info.html

    11 phút
  8. 24 THG 10

    Hackers Breach Internet Archive TWICE – How Safe is Your Data?

    The Internet Archive has been breached… AGAIN! 🛑 This time, hackers managed to compromise sensitive user data not once, but twice, exploiting stolen GitLab and Zendesk tokens. In this episode of Exploit Brokers, we break down what went wrong, why access tokens are crucial for cybersecurity, and how this breach could have been prevented. 🚨 We’ll dive deep into: How the hackers gained access through exposed tokens 🔓 What “access tokens” really are and why they’re often targeted 🔑 The role of GitLab configurations, Zendesk tokens, and more in the breach 🖥️ How hackers operate and why even trusted organizations like the Internet Archive are not safe from cyber threats 👀 If you’re a cybersecurity enthusiast or just want to understand how breaches like this happen, make sure to hit that Subscribe button and tap the notification bell 🔔 for more insights into the world of digital crime, hacking tactics, and data security. 👉 Like and share if you find this video informative, and don’t forget to leave your thoughts in the comments below! Follow us on Spotify, Apple Podcasts, and other platforms for more episodes of Exploit Brokers. 🧭 #InternetArchiveBreach #Cybersecurity #HackingNews #DataBreach #GitLab #AccessTokens #DarkWeb #DigitalCrime #ZendeskHack #CyberThreats #Malware #TechNews #DataPrivacy #Hackers #OnlineSecurity #InfoSec #TechExplained #TokenRotation #APIKeys #ZeroDayExploit #CyberAwareness #NetworkSecurity #ThreatIntelligence #DataProtection #PrivacyMatters #SecurityBreach #CyberResilience #EthicalHacking #Encryption #DigitalForensics #InternetSafety #HackerCulture #Breached 👍 Enjoyed the video? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Follow us on social media: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers ## Source Internet Archive Hacked Again: https://www.bleepingcomputer.com/news/security/internet-archive-breached-again-through-stolen-access-tokens/

    16 phút

Xếp Hạng & Nhận Xét

5
/5
5 Xếp hạng

Giới Thiệu

Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat

Có Thể Bạn Cũng Thích

Bạn cần đăng nhập để nghe các tập có chứa nội dung thô tục.

Luôn cập nhật thông tin về chương trình này

Đăng nhập hoặc đăng ký để theo dõi các chương trình, lưu các tập và nhận những thông tin cập nhật mới nhất.

Chọn quốc gia hoặc vùng

Châu Phi, Trung Đông và Ấn Độ

Châu Á Thái Bình Dương

Châu Âu

Châu Mỹ Latinh và Caribê

Hoa Kỳ và Canada