We are a discord community of cyber security enthusiasts. We host various "Ask Me Anythings" and put them here for people to enjoy any time they like. Discord: https://discord.gg/r4JxpJS
…
continue reading
Cybersec Podcasts
Kaspersky Lab's security experts discuss recent news and give their advice on the topics of computer and smartphone protection.
…
continue reading
Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat
…
continue reading
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
…
continue reading
Crucial history everyone should know.
…
continue reading
The Real Cybersecurity Podcast decrypts the issues and business of technology security. But instead of just scaring you, these industry veterans provide real advice and analysis for organizations trying to make security real today. Hosted by Greg Young and Bill Malik.
…
continue reading
Oketsa seeks to encourage easy, laid back office listening. The show mostly targets office executives, addressing their day to day challenges, equipping those entering the job market with “surviving the workplace” skills and helping those at home find work (addressing unemployment). The show has a monstrous task to educate and inform local audiences of the “gaan-an’s” in their backyard (reflecting South Africa to South Africans) and providing them with a glimpse of what is taking place in th ...
…
continue reading
1
HN59 - Microsoft AI Discovers 20 Zero-Day Vulnerabilities in Bootloaders!
19:22
19:22
Play later
Play later
Lists
Like
Liked
19:22# Title * HN59 - Microsoft AI Discovers 20 Zero-Day Vulnerabilities in Bootloaders! ## Description 🔍 Microsoft's AI Uncovers 20 Zero-Day Threats | CoffeeLoader Malware Gets Smarter In this episode of Exploit Brokers, Cipherceval dives into how Microsoft Security Copilot, powered by AI, discovered over 20 previously unknown vulnerabilities in popula…
…
continue reading
1
HN58 - Havoc in the Cloud: The Shocking Click Fix Exploit Revealed
24:22
24:22
Play later
Play later
Lists
Like
Liked
24:22Welcome to Exploit Brokers with your host Cipherceval! In this deep dive, we uncover a sophisticated cyber assault where hackers exploited Microsoft SharePoint to launch the Havoc C2 via a stealthy click fix attack. Learn how a single click can trigger malicious PowerShell commands, turning everyday corporate tools into gateways for cybercrime. In …
…
continue reading
1
HN57 - Unmasking SpyLoan: The Android Malware Preying on Loan Seekers
20:32
20:32
Play later
Play later
Lists
Like
Liked
20:32In this episode of Exploit Brokers, we dive into the dark world of cybercrime, exploring two alarming topics: a malicious Android loan app masquerading as a financial tool and Xerox printer vulnerabilities that could be leaking your credentials. Learn how loan sharks have moved from traditional methods to sophisticated digital predation, exploiting…
…
continue reading
1
HN56 - Massive Bug Puts Outlook Users at Risk | Kimsuky gets RDPWrapper
27:03
27:03
Play later
Play later
Lists
Like
Liked
27:03In today's episode of Exploit Brokers, we dive deep into two major security threats making waves across the digital world. A critical Remote Code Execution (RCE) vulnerability in Microsoft Outlook is putting millions of users at risk, with hackers exploiting it through spear phishing emails and malicious links. Not only that, but we're also uncover…
…
continue reading
1
HN55 - Double Zipping Danger: The 7-Zip Exploit That Could Hack Your PC
27:18
27:18
Play later
Play later
Lists
Like
Liked
27:18Welcome back to Exploit Brokers! In today's video, we dive deep into a critical 7‑Zip vulnerability that's being exploited by Russian cybercriminals to bypass Windows' security protections. If you've used 7‑Zip at all, you need to know how this flaw can let hackers sneak past the Mark-of-the-Web (MOTW) and deploy dangerous malware like Smoke Loader…
…
continue reading
1
HN54 - Cybersecurity Experts Reveal LAZARUS GROUP's Hidden Secrets
29:54
29:54
Play later
Play later
Lists
Like
Liked
29:54Lazarus Group's Secret Admin Layer EXPOSED – Major Cybersecurity Discovery! 🔥💻 Security researchers have uncovered a hidden admin layer used by North Korea's Lazarus Group to manage their Command and Control (C2) servers. This sophisticated network of VPNs and proxies allows them to execute cyberattacks worldwide—mainly targeting cryptocurrency dev…
…
continue reading
1
HN53 - AI's Dirty Little Secret: Employees Leaking Data by Accident
24:46
24:46
Play later
Play later
Lists
Like
Liked
24:46In this episode, we're uncovering the darker side of Generative AI and the emerging threats lurking behind everyday tools like ChatGPT and Copilot. Learn how sensitive information—ranging from customer data to employee benefits—can be leaked simply by typing it into a Gen AI prompt. We'll also expose how cybercriminals are escalating their tactics,…
…
continue reading
1
HN52 - 800K Volkswagen EVs Hacked! Massive Data Breach & Mirai Botnet Attack Explained
21:55
21:55
Play later
Play later
Lists
Like
Liked
21:55🔒🚗 Volkswagen's Massive 800K EV Data Breach & Mirai Botnet Threats Explained | Exploit Brokers Welcome back to Exploit Brokers! In today's episode, we dive deep into two major cybersecurity threats shaking the automotive and industrial sectors: Volkswagen's 800,000 EV Data Breach Discover how a misconfigured Amazon cloud storage led to the exposure…
…
continue reading
1
HN51 - Chinese Hackers Breach U.S. Treasury AND 3M Fake GitHub Stars Exposed
23:16
23:16
Play later
Play later
Lists
Like
Liked
23:16In this episode, we dive deep into two explosive cybersecurity stories making headlines right now: a major breach at the U.S. Treasury Department allegedly carried out by Chinese state-sponsored hackers, and the discovery of over 3.1 million fake stars on GitHub used to boost malicious repositories. We'll explore how third-party vendor BeyondTrust …
…
continue reading
1
HN50 - IoT Webcams Hacked & 900k+ Health Records Exposed
25:36
25:36
Play later
Play later
Lists
Like
Liked
25:36In this eye-opening episode, we uncover the disturbing reality of IoT webcam vulnerabilities and explore how hackers are leveraging outdated firmware and previously discovered but unpatched exploits to infiltrate personal devices. From prying eyes in your own home to the colossal health data breach exposing over 900,000 patient records, the digital…
…
continue reading
1
HN49 - Fortnite Refund Update: Millions Refunded + Lazarus Group's Crypto Hacks Revealed
23:15
23:15
Play later
Play later
Lists
Like
Liked
23:15We're diving into two major stories shaking up the gaming and cybersecurity worlds! First, we discuss the Fortnite Refund Update, where the FTC has forced Epic Games to refund millions due to their use of dark patterns. Find out if you're eligible for a refund and how to claim it. Then, we shift gears to the Lazarus Group, North Korea's infamous ha…
…
continue reading
Uncover the fascinating yet chilling story of Hydra Market, the dark web's largest illicit empire. Learn how this $1.35 billion platform operated, from smuggling narcotics and laundering money to offering hacking services. We'll explore how its leader was sentenced to life in prison, the innovative (and illegal) technologies they used, and the glob…
…
continue reading
1
HN47 - Andrew Tate's Platform Hacked by Activists + Russian Hackers Exploit Zero-Days
18:03
18:03
Play later
Play later
Lists
Like
Liked
18:03Andrew Tate's platform, formerly known as Hustler's University, has been hacked, exposing the data of over 800,000 users. Meanwhile, Russian hackers have exploited critical zero-day vulnerabilities in Firefox and Windows, demonstrating the growing sophistication of cyberattacks. In this video, we'll break down the Andrew Tate hack, the implications…
…
continue reading
1
HN46 - Phobos' $16M Haul & Helldown's Secret Exploits – 2024's Ransomware Crisis
27:53
27:53
Play later
Play later
Lists
Like
Liked
27:53In this episode, we dive deep into the world of ransomware with two of 2024's most talked-about threats: Phobos and Helldown. Learn how the Phobos ransomware operation managed to dominate 11% of the market, generating $16 million in ransom payments, and the shocking details of its admin's extradition to the U.S. We also explore the rise of Helldown…
…
continue reading
1
HN45 - Malware Madness: How Remcos RAT and Human Error Fuel Cyber Threats
33:15
33:15
Play later
Play later
Lists
Like
Liked
33:15In today's episode, we dive deep into the fascinating yet troubling world of cybersecurity, exploring how even the most advanced antivirus software, firewalls, and endpoint security measures can fall short due to a single factor: human error. Despite the latest tech solutions, hackers continue to exploit one consistent vulnerability—users clicking …
…
continue reading
1
HN44 - Malicious Crack Tools & Malvertising Attack: How Hackers Steal Your Data
22:42
22:42
Play later
Play later
Lists
Like
Liked
22:42In today's episode, we're diving into the hidden dangers of malicious installers, software cracks, and deceptive ads on Google. We'll explore recent stories, including the SteelFox malware that's hijacking Windows PCs, stealing credit card data, and mining cryptocurrency using vulnerable drivers. Plus, we'll uncover a new wave of malvertising attac…
…
continue reading
1
HN43 - Dutch Police Take Down Major Information Stealers: Redline & Meta Stealer
10:45
10:45
Play later
Play later
Lists
Like
Liked
10:45In a significant international operation, Dutch police and global law enforcement partners have taken down two major information stealers: Redline and Meta Stealer. These dangerous malware operations targeted thousands of victims worldwide, stealing passwords, sensitive data, and more. This video explores how law enforcement agencies worked togethe…
…
continue reading
1
HN42 - Hackers Breach Internet Archive TWICE – How Safe is Your Data?
16:12
16:12
Play later
Play later
Lists
Like
Liked
16:12The Internet Archive has been breached… AGAIN! 🛑 This time, hackers managed to compromise sensitive user data not once, but twice, exploiting stolen GitLab and Zendesk tokens. In this episode of Exploit Brokers, we break down what went wrong, why access tokens are crucial for cybersecurity, and how this breach could have been prevented. 🚨 We'll div…
…
continue reading
1
HN41 - Chinese Hackers Hijack US Telecom Networks
15:46
15:46
Play later
Play later
Lists
Like
Liked
15:46In this eye-opening episode of Exploit Brokers, your host Lauro dives deep into the recent cyberattacks that have compromised major U.S. telecommunications networks. Chinese state-sponsored hackers, known as Salt Typhoon, have exploited a 30-year-old backdoor mandated by U.S. law, targeting giants like AT&T, Lumen (formerly CenturyLink), and Verizo…
…
continue reading
Episode 365 kicks off with discussion around Donald Trump's recent courting of the crypto world. From there talk moves to Mozilla's recent decision to enable Privacy Preserving Attribution (PPA) by default – and that's got some in the EU worried. To wrap up the team discuss two stories related to A.I – first around Microsoft suggesting that omnipre…
…
continue reading
1
HN40 - Shocking Move: Kaspersky Uninstalls Itself and Installs Ultra AV Overnight!
13:13
13:13
Play later
Play later
Lists
Like
Liked
13:13Imagine waking up to find that your trusted antivirus software has uninstalled itself and replaced itself with a completely different program—without your consent! 😱 In today's video, we dive deep into the shocking move by Kaspersky as it uninstalls itself and installs Ultra AV on users' computers. We'll explore why this happened, how users are rea…
…
continue reading
Episode 364 kicks off with a chat around the recent furore around Telegram's problem with unsavoury content. Following that, the conversation moves to a story that might concern people who rely on TOR (The Onion Router), as it's been disclosed that German police managed to de-anonymise data coming out of an exit node, in order to track and arrest o…
…
continue reading
1
HN39 - Apple's Shocking Decision: Dropping the Fight Against NSO Spyware
14:15
14:15
Play later
Play later
Lists
Like
Liked
14:15In an unexpected turn of events, Apple has decided to drop its three-year-old lawsuit against the notorious spyware maker, NSO Group. What led to this shocking decision, and what does it mean for the future of cybersecurity and your personal data? 🤔 In today's video, we dive deep into the reasons behind Apple's surprising move. We'll explore how th…
…
continue reading
Episode 363 kicks off with a discussion around moderation on the popular messaging service, Telegram. From there the team move to discuss how one person managed to siphon off over $10 million from the likes of Spotify and Apple using bots to stream music. To wrap up the team discuss two stories, the first looking at how the Democrats in America are…
…
continue reading
Episode 362 of the Kaspersky podcast kicks off with discussion around Brazil's controversial decision to ban Elon Musk's X platform. From there the team discuss a story from the BBC around the theft of a voice actors voice, which was used on an A.I platform. To wrap up the team discuss how scammers are looking to use sextortion tactics in order for…
…
continue reading
Episode 361 of the Transatlantic Cable podcast kicks off with news around the right to switch off in Australia. From there the team talk about privacy – specifically if you should have to pay to have online privacy. To wrap up, the team discuss how and why a popular game has attracted so much online attention. If you liked what you heard, please co…
…
continue reading
1
HN38 - Is Your Tap-to-Pay Secure? The Latest Android Malware Warning
13:35
13:35
Play later
Play later
Lists
Like
Liked
13:35Is Your Tap-to-Pay Secure? The Latest Android Malware Warning 🔒 In this episode of Exploit Brokers, we dive deep into a new Android malware that targets NFC technology to steal your banking information. 📱💳 If you use tap-to-pay or any NFC-based service, this is something you NEED to know. We'll break down how this malware works, why it's so dangero…
…
continue reading
1
HN37 - AI Manipulation: The Silent Threat to Democracy
16:32
16:32
Play later
Play later
Lists
Like
Liked
16:32🚨 AI Propaganda Exposed: How It's Influencing Elections Right Now! 🚨 In this episode of Exploit Brokers, we dive deep into the unsettling world of AI-driven misinformation campaigns. From targeting voters on both sides to spreading chaos across social media, AI is being weaponized in ways that sound like science fiction but are shockingly real. We'…
…
continue reading
Episode 360 of the transatlantic cable podcast kicks off with news that Nvidia are on the receiving end of a class-action law-suit, alleging that they scraped YouTube videos without creators' consent. From there, the team discuss news around Taylor Swift AI images being shared by Donald Trump and an additional story around how photography is quickl…
…
continue reading
1
HN36 - Fake Sites, Real Danger: The Trojan Malware in Extensions
15:08
15:08
Play later
Play later
Lists
Like
Liked
15:08In this episode of Exploit Brokers, we dive into a significant new threat spreading across the web—Trojan malware hidden in malicious browser extensions. These sneaky extensions are distributed through fake download sites mimicking popular software like Roblox FPS Unlocker, YouTube, VLC, or KeePass. We'll discuss how these Trojans operate, how they…
…
continue reading
Episode 359 kicks off with discussion around the recent riots in the U.K. and how the UK government is looking to leverage facial recognition to combat trouble makers. From there, the team discuss a strange story concerning how police forces in the U.S were able to locate a criminal via a lock-screen picture left at the scene of a crime. To wrap up…
…
continue reading
1
HN35 - Deceptive Admin Tool You Should NOT Install
17:22
17:22
Play later
Play later
Lists
Like
Liked
17:22In this episode of Exploit Brokers, we're diving into a new and alarming trend in cybersecurity: Remote Access Trojans (RATs) targeting IT professionals. Discover how malware disguised as legitimate tools is being installed by unsuspecting IT teams, leading to severe breaches and ransomware attacks. We'll explore the tactics used by Hunter's Intern…
…
continue reading
1
HN34 - AI Detects Fires and Malicious Android Apps You Need to Avoid
22:15
22:15
Play later
Play later
Lists
Like
Liked
22:15Hey everyone, welcome back to another episode of Exploit Brokers! In today's video, we're diving deep into some dangerous Android apps you should avoid installing. We'll also explore how AI is being used to detect wildfires and identify AI-generated videos, proving that technology can indeed fight back against digital threats. With the rise of data…
…
continue reading
Episode 358 of the Transatlantic Cable Podcast kicks off with news of American Cybersecurity firm KnowBe4 getting duped by a North Korean hacker who successfully when through their HR checks and secured employment! Deepfake bullying being used by children on Snapchat. X/Twitter's AI bot Grok is now reading your tweets, however there is a fix and we…
…
continue reading
1
HN33 - CrowdStrike Chaos: Fake Fixes and Malware Attacks
17:39
17:39
Play later
Play later
Lists
Like
Liked
17:39In this episode of Exploit Brokers, we delve into two major cyber stories making headlines. First, we uncover the details behind the recent breach of water facilities by Russian hacktivists and the subsequent U.S. sanctions. Discover the risks posed by SCADA system vulnerabilities and the potential for catastrophic damage to critical infrastructure…
…
continue reading
Episode 357 of the Transatlantic Cable Podcast kicks off with news of the Telegram zero-day vulnerability that went unnoticed for 5 weeks, as well as further CrowdStrike woes with threat actors targeting companies with fake fixes. From there Ahmed & Jag go on to discuss a potential hacktivism hit on Disney in response to Disney's embrace of AI, and…
…
continue reading
Episode 356 of the Transatlantic Cable Podcast kicks off with news around the AT&T 'mega-breach'. From there the team discuss two stories related to AI – the first looks at how AI is being used to help doctors detect early-onset Alzheimer's; the team then talk about how K-Pop are looking to use artificial intelligence to write songs and create artw…
…
continue reading
Episode 355 of the Transatlantic Cable podcast begins with news that Ticketmaster's recent data breach is creating more trouble for them than previously thought. Moving from Ticketmaster to TikTok, the next story covers a disturbing new trend on the social media platform, where a "mob attack led by middle schoolers" tormented teachers. To wrap up t…
…
continue reading
Episode 353 of the Transatlantic Cable podcast kicks off with an 'interesting' story involving Microsoft, real-time software recording and sex-toy retailers. To go into more details would just be a spoiler. From there, the team talk about how Facebook are the next business to face EU's DMA (Digital Market's Act) legislation. To wrap up conversation…
…
continue reading
Episode 353 of the Transatlantic Cable podcast kicks off with news around ransomware attacks, both in the UK and the US. From there, the team discuss updates around the EU's new DMA (Digital Market's Act) and how Apple could be a test case for record fines, if they're found to have abused their market position. To wrap up, the team look at how some…
…
continue reading
Episode 352 of the Transatlantic Cable podcast kicks off with a story concerning generative AI and hackers, with the hackers taking the side of artists (or so it would seem.) From there discussion turns to the US surgeon general calling for 'warning labels' on social media, mainly in part due to the worrying rise in young people's mental health. To…
…
continue reading
1
HN32 - Cyber Scam Slavery: The Dark Side of Online Fraud
26:28
26:28
Play later
Play later
Lists
Like
Liked
26:28🚨 Welcome to Exploit Brokers! 🚨 In this episode, we're diving deep into the hidden world of fake cell towers and the alarming rise of cyber scam slavery. 📡💔 Did you know that your cell phone might be connecting to a fake tower, putting your personal information at risk? We explore a recent case in London where criminals set up a fake cell tower to …
…
continue reading
Episode 351 of the Transatlantic Cable podcast begins with discussion around Microsoft's controversial 'Recall' feature. Following from there, news turns to discussion around Elon Musk's frustration around Apple's decision to include ChatGPT in the upcoming iOS 18. To wrap up, the team discuss two news stories. The first covers the arrest of 2 susp…
…
continue reading
Episode 350 of the Transatlantic Cable podcast kicks off with surprising news that whilst Generative AI tools such as ChatGPT and MidJourney are marketed aggressively, they're not actually that popular with everyday folk – with just 2% of people in the UK saying they use Gen AI in their day. From there talk moves to news regarding two large data br…
…
continue reading
Episode 349 of the Transatlantic Cable podcast kicks off with a discussion on Microsoft's newly announced Copilot+ feature for personal computers. This feature, touted to give PCs a "photographic memory," raises significant privacy concerns as it can log everything a user does by taking screenshots every few seconds. Privacy advocates fear the pote…
…
continue reading
We kick off with news that Google plan to introduce a new AI tool to help detect if you're being scammed in a phone call – a boon for those who fall prey to scams. From there the team discuss news that Scarlett Johansson isn't best pleased about the likeness of ChatGPT's new voice, which sounds eerily familiar to her own. To wrap up the team discus…
…
continue reading
Episode 347 of the Transatlantic Cable podcast begins with news that Dell have been hit by a data breach, however details on the breach are scarce. Following that the team discuss another data breach, this time affecting Europol. To wrap up the team discuss two stories, the first around Spanish police pulling data on suspects from sources such as P…
…
continue reading
For the 346th episode of the Kaspersky Transatlantic Cable Podcast, Jag and I dive into a handful of stories that tie back to disinformation, privacy, people persisting, before ending with the WTF story of the week (and perhaps year). We kick things off discussing WhatsApp and encryption, but more importantly how the app's boss understands that it …
…
continue reading
1
HN31 - AI and Crime: How criminals are Exploiting Technology to Deceive
26:36
26:36
Play later
Play later
Lists
Like
Liked
26:36Welcome back to another episode of Exploit Brokers with your host, Lauro! Today, we're diving deep into the darker uses of AI by criminals. From high-tech identity theft using AI-generated voices and images to unprecedented surges in digital crimes such as hacking and data breaches, we explore how these technologies are shaping modern criminal tact…
…
continue reading
Episode 345 of the Transatlantic Cable podcast kicks off with a story from the U.S, where a Pew survey suggested that most American's feel that social media platforms have too much political power and influence. From there the team discuss news that ChatGPT can hack software vulnerabilities and the U.K becomes the first country in the world to ban …
…
continue reading