Exploit Brokers - Tech and Hacking News Commentary

Exploit Brokers
Exploit Brokers - Tech and Hacking News Commentary

Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat

  1. 27 FÉVR.

    HN57 - Unmasking SpyLoan: The Android Malware Preying on Loan Seekers

    In this episode of Exploit Brokers, we dive into the dark world of cybercrime, exploring two alarming topics: a malicious Android loan app masquerading as a financial tool and Xerox printer vulnerabilities that could be leaking your credentials. Learn how loan sharks have moved from traditional methods to sophisticated digital predation, exploiting unsuspecting users via apps like SpyLoan. We break down how these apps bypass Google Play's protections, steal sensitive data, and push predatory lending practices, especially targeting vulnerable users. Additionally, we uncover how attackers are using patched vulnerabilities in Xerox Versalink C7025 printers to manipulate configurations, capture user credentials, and potentially gain lateral access to entire Windows environments. Whether you're a tech enthusiast or a cybersecurity professional, this episode offers valuable insights into how digital crime is evolving and what you can do to protect yourself. Don't forget to like, subscribe, and hit the notification bell for more in-depth analyses on cybersecurity threats and exploits. #CyberSecurity #AndroidMalware #LoanSharks #XeroxPrinterHack #DataBreach #DigitalCrime #SpyLoan #CyberThreats #ExploitBrokers #TechNews 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Show Notes: https://exploitbrokers.com/podcasts/hn57 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources * Xerox: https://www.darkreading.com/iot/xerox-printer-vulnerabilities-credential-capture * Malicious App: https://www.bleepingcomputer.com/news/security/spylend-android-malware-downloaded-100-000-times-from-google-play/

    21 min
  2. 13 FÉVR.

    Massive Bug Puts Outlook Users at Risk | Kimsuky gets RDPWrapper

    In today’s episode of Exploit Brokers, we dive deep into two major security threats making waves across the digital world. A critical Remote Code Execution (RCE) vulnerability in Microsoft Outlook is putting millions of users at risk, with hackers exploiting it through spear phishing emails and malicious links. Not only that, but we’re also uncovering the stealthy tactics of the notorious North Korean hacking group, Kimsuky. They’re evolving their methods with custom RDP wrappers and proxy tools to evade detection while gaining unauthorized access to systems. Stay informed about the latest threats, learn how to keep your systems secure, and protect yourself from the growing wave of cyberattacks that are more dangerous than ever.  #OutlookRCE #Cybersecurity #Hacking #ExploitBrokers #CyberThreats #Phishing #RDPWrapper #Kimsuky #RemoteCodeExecution #MicrosoftSecurity #TechNews #Malware #DataBreach #EmailSecurity #Hackers #InfoSec #SecurityUpdates #cyberdefense 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Show Notes: https://exploitbrokers.com/podcasts/hn56 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources * Kimsuky hackers: https://www.bleepingcomputer.com/news/security/kimsuky-hackers-use-new-custom-rdp-wrapper-for-remote-access/ * RCE in Outlook: https://www.bleepingcomputer.com/news/security/critical-rce-bug-in-microsoft-outlook-now-exploited-in-attacks/

    27 min
  3. 6 FÉVR.

    Double Zipping Danger: The 7-Zip Exploit That Could Hack Your PC

    Welcome back to Exploit Brokers! In today’s video, we dive deep into a critical 7‑Zip vulnerability that’s being exploited by Russian cybercriminals to bypass Windows’ security protections. If you’ve used 7‑Zip at all, you need to know how this flaw can let hackers sneak past the Mark-of-the-Web (MOTW) and deploy dangerous malware like Smoke Loader. We'll also explore a parallel threat in the Go ecosystem—malicious packages exploiting caching mechanisms to gain persistent remote access to your system. From double-zipped archives to supply chain attacks, we break down the tactics, the risks, and most importantly, what you can do to protect yourself and your organization. In this video you’ll learn: How the 7‑Zip vulnerability works and why updating to the latest version is crucial. The role of Windows’ MOTW and how hackers are bypassing this key security feature. Details on the deployment of Smoke Loader malware and its implications. How malicious Go packages and supply chain attacks can compromise your systems. Practical tips to safeguard your data and networks against these emerging threats. Stay informed, stay secure—hit that like button, subscribe, and ring the bell for more cybersecurity insights! Drop your questions or thoughts in the comments below—we love hearing from you! #Cybersecurity #7Zip #WindowsSecurity #Malware #SmokeLoader #GoLang #SupplyChainAttack #Cybercrime #InfoSec #Hacking #RussianHackers #APT #NationStateHackers #exploits #ZeroDays 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Show Notes: https://exploitbrokers.com/podcasts/hn55 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources * Malicious Cached Go Modules: https://thehackernews.com/2025/02/malicious-go-package-exploits-module.html * Russian hackers Exploit 7-zip: https://thehackernews.com/2025/02/russian-cybercrime-groups-exploiting-7.html

    27 min
  4. 30 JANV.

    Cybersecurity Experts Reveal LAZARUS GROUP's Hidden Secrets

    Lazarus Group’s Secret Admin Layer EXPOSED – Major Cybersecurity Discovery! 🔥💻 Security researchers have uncovered a hidden admin layer used by North Korea’s Lazarus Group to manage their Command and Control (C2) servers. This sophisticated network of VPNs and proxies allows them to execute cyberattacks worldwide—mainly targeting cryptocurrency developers and software supply chains. In today’s episode, we break down: ✅ How Lazarus Group operates and funds North Korea’s cybercrime efforts ✅ The Operation 99 attack targeting Web3 developers ✅ The supply chain risks that could impact thousands ✅ How Android 16’s new security features are stepping up protection ✅ Why 2G connectivity and sideloading bans are crucial for mobile security With nation-state hackers, malware campaigns, and evolving cyber threats, it’s more important than ever to stay informed. Don’t forget to like, subscribe, and hit the bell to keep up with the latest in cybersecurity! 💬 What do you think? Are these security updates enough, or do we need even stricter measures? Let me know in the comments! #Cybersecurity #LazarusGroup #Hacking #NorthKorea #Android16 #CyberThreats #Infosec #Malware #TechNews #CryptoSecurity #SupplyChainAttack #EthicalHacking #PrivacyMatters #TechExplained 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Show Notes: https://exploitbrokers.com/podcasts/hn54 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources * Lazarus C2 Infrastructure: https://www.darkreading.com/cyberattacks-data-breaches/researchers-uncover-lazarus-admin-layer-c2-servers * Operation 99: https://securityscorecard.com/blog/operation-99-north-koreas-cyber-assault-on-software-developers/ * Advanced Protection Mode: https://www.androidauthority.com/android-16-advanced-protection-mode-3518368/

    30 min
  5. 23 JANV.

    AI’s Dirty Little Secret: Employees Leaking Data by Accident

    In this episode, we’re uncovering the darker side of Generative AI and the emerging threats lurking behind everyday tools like ChatGPT and Copilot. Learn how sensitive information—ranging from customer data to employee benefits—can be leaked simply by typing it into a Gen AI prompt. We’ll also expose how cybercriminals are escalating their tactics, hiding malware in places you’d never expect—like Google Ads, YouTube comments, and misleading download links for supposedly “free” or pirated software. 📢 Don’t Forget to: 👍 Like this epsidoe if you found it informative 🔔 Subscribe to Exploit Brokers and hit the bell icon to stay updated with the latest in cybersecurity 💬 Share your thoughts in the comments below – Have you been affected by a data breach? #AI #ChatGPT #GenerativeAI #Cybersecurity #DataLeak #DarkReading #InfoStealer #Malware #GoogleAds #YouTubeComments #TechNews #Hacking #CyberThreats #DataBreach #ExploitBrokers #SecurityTips #TechPodcast 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Show Notes: https://exploitbrokers.com/podcasts/hn53 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources * Google Ads: https://www.darkreading.com/threat-intelligence/cyberattackers-infostealers-youtube-comments-google-search * Employees and Gen AI: https://www.darkreading.com/threat-intelligence/employees-sensitive-data-genai-prompts

    25 min
  6. 9 JANV.

    800K Volkswagen EVs Hacked! Massive Data Breach & Mirai Botnet Attack Explained

    🔒🚗 Volkswagen’s Massive 800K EV Data Breach & Mirai Botnet Threats Explained | Exploit Brokers Welcome back to Exploit Brokers! In today’s episode, we dive deep into two major cybersecurity threats shaking the automotive and industrial sectors: Volkswagen’s 800,000 EV Data Breach Discover how a misconfigured Amazon cloud storage led to the exposure of sensitive personal information for Volkswagen, Audi, Seat, and Skoda electric vehicle owners. Learn what data was compromised, the potential risks for affected individuals, and what this means for the future of connected vehicles. Mirai Botnets Targeting Industrial Routers Uncover the latest developments with the Mirai Botnet variant exploiting vulnerabilities in Forfaith industrial routers. Understand how these botnets operate, the scale of their DDoS attacks, and the broader implications for global cybersecurity. 🔍 What You’ll Learn: The specifics of the Volkswagen data breach and its impact on EV owners. How Mirai Botnets are evolving to target industrial infrastructure. The importance of proper cloud configuration and security measures. Tips to protect yourself and your devices from similar cyber threats. 📢 Don’t Forget to: 👍 Like this video if you found it informative 🔔 Subscribe to Exploit Brokers and hit the bell icon to stay updated with the latest in cybersecurity 💬 Share your thoughts in the comments below – Have you been affected by a data breach? #CyberSecurity #DataBreach #VolkswagenHack #MiraiBotnet #EVSecurity #CyberCrime #CloudSecurity #DDoS #IndustrialCyberSecurity #ExploitBrokers #TechNews #CyberThreats #ConnectedCars #IoTSecurity #Malware #ZeroDay #EthicalHacking #TechPodcast 👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Show Notes: https://exploitbrokers.com/podcasts/hn52 📢 Connect with us: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources * Volkswagen: https://www.darkreading.com/cyberattacks-data-breaches/volkswagen-breach-exposes-data-of-800k-customers * Mirai: https://thehackernews.com/2025/01/mirai-botnet-variant-exploits-four.html

    22 min
  7. 2 JANV.

    Chinese Hackers Breach U.S. Treasury AND 3M Fake GitHub Stars Exposed

    In this episode, we dive deep into two explosive cybersecurity stories making headlines right now: a major breach at the U.S. Treasury Department allegedly carried out by Chinese state-sponsored hackers, and the discovery of over 3.1 million fake stars on GitHub used to boost malicious repositories. We’ll explore how third-party vendor BeyondTrust and telecom hacks tie into this growing wave of advanced persistent threats (APTs) and discuss how manipulative tactics on GitHub can sneak malware into widespread use. Whether you’re a seasoned developer or just curious about the rising tide of global cyber threats, this episode will give you an in-depth look at how these hacks happen and why they matter.   Stay informed, stay alert, and learn about the latest vulnerabilities, breaches, and protective measures you can take. Don’t forget to like, subscribe, and hit the notification bell for more cybersecurity breakdowns! #Cybersecurity #DataBreach #USTreasuryHack #ChineseHackers #SaltTyphoon #APTGroups #BeyondTrust #GitHub #FakeStars #Malware #CyberThreats #NetworkSecurity #NationStateHackers #APISecurity #SupplyChainAttack #DarkReading #BleepingComputer #Encryption #SoftwareDevelopment #TechNews #HackingUpdate #ZeroDay #Phishing #InformedSecurity #ExploitBrokers   👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below!   🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech.   Listen to our podcast on:   Apple Podcasts Spotify And wherever you get your podcasts!   Show Notes: https://exploitbrokers.com/podcasts/hn51   📢 Connect with us:   Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers 🔗 References & Sources * US Treasury Hacked: https://www.darkreading.com/cyberattacks-data-breaches/chinese-state-hackers-breach-us-treasury-department * Github Fake Stars: https://www.bleepingcomputer.com/news/security/over-31-million-fake-stars-on-github-projects-used-to-boost-rankings/

    23 min
  8. 19/12/2024

    IoT Webcams Hacked & 900k+ Health Records Exposed

    In this eye-opening episode, we uncover the disturbing reality of IoT webcam vulnerabilities and explore how hackers are leveraging outdated firmware and previously discovered but unpatched exploits to infiltrate personal devices. From prying eyes in your own home to the colossal health data breach exposing over 900,000 patient records, the digital security landscape has never looked more dire. Learn what you can do to protect your data, secure your devices, and safeguard your personal information. We’ll break down the incidents, share insights on the tactics used by cybercriminals, and provide actionable steps to bolster your online defenses.   #DataBreach #CyberSecurity #IoTHacks #WebcamSecurity #HealthcareCybersecurity #MedicalData #PrivacyMatters #InformationSecurity #HackerNews #PersonalData #DigitalThreats #Infosec #ProtectYourData #TelehealthSecurity #PatientPrivacy #OnlineSecurity #Malware #DataProtection #NetworkSecurity #FirmwareUpdates   👍 Enjoyed the episode? Give it a like and share your thoughts in the comments below!   🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech.   Listen to our podcast on:   Apple Podcasts Spotify And wherever you get your podcasts!   Show Notes: https://exploitbrokers.com/podcasts/hn50   📢 Connect with us:   Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers https://exploitbrokers.com/podcasts/hn50/ 🔗 References & Sources * Webcams Hacked: https://www.bleepingcomputer.com/news/security/fbi-spots-hiatusrat-malware-attacks-targeting-web-cameras-dvrs/ * Health Data breach: https://www.bleepingcomputer.com/news/security/connectoncall-breach-exposes-health-data-of-over-910-000-patients/

    26 min

Notes et avis

5
sur 5
5 notes

À propos

Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat

Vous aimeriez peut‑être aussi

Pour écouter des épisodes au contenu explicite, connectez‑vous.

Recevez les dernières actualités sur cette émission

Connectez‑vous ou inscrivez‑vous pour suivre des émissions, enregistrer des épisodes et recevoir les dernières actualités.

Choisissez un pays ou une région

Afrique, Moyen‑Orient et Inde

Asie‑Pacifique

Europe

Amérique latine et Caraïbes

États‑Unis et Canada