Exploit عمومی
[search 0]
بیشتر
برنامه را دانلود کنید!
show episodes
 
Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat
  continue reading
 
Artwork

1
Les Exploités

Les Exploités

icon
Unsubscribe
icon
Unsubscribe
ماهیانه
 
À chaque vendredi de la semaine, Les Exploités regardent un film d'exploitation poche et vous en font la critique pour que vous n'ayez pas besoin de le faire. Au menu: du SEXE, de l'ACTION, du SUSPENCE et du marketing choc un peu trop évident.
  continue reading
 
Artwork

1
Exploit

Exploit Podcast

icon
Unsubscribe
icon
Unsubscribe
روزانه+
 
A show about hacking the system, hosted by Patrick Tomasso and Gabi Pirraglia. Patrick is a content creator and Gabi is digital strategist, together they pull apart the internet and social media to reveal the hidden creative formulas for success.
  continue reading
 
Artwork

1
Exploited Podcast

Exploited

icon
Unsubscribe
icon
Unsubscribe
ماهیانه
 
Shir Khan is the owner of in-vogue and on-point deep house label at the moment, the leviathan that is Exploited Records. Exploited Rec blazes its way through since 2007 with releases that simply cannot be brushed aside. 2012 has been the breakthrough year for Exploited, bringing them massive celebration and support from artists, the scene and a large audience. Still stated as one of the leading influences in Deep House & Indie Dance, Exploited is not set up to stop releasing tracks that blow ...
  continue reading
 
Artwork

1
Exploiting Nostalgia

FreezenFactor

icon
Unsubscribe
icon
Unsubscribe
ماهیانه
 
Brandon Friesen brings you (XNOS) Exploiting Nostalgia.. the Saturday morning variety show dedicated to rediscovering all the things we feel sentimental about. Enjoy multiple segments per episode covering childhood memories, classic videogames, music of yesteryear, movies, shows, toys and anything else that comes with that warm familiar feeling. New guests featured every week. Powered by FreezenFactor.
  continue reading
 
Artwork

1
Exploit Wars

Rubotic

icon
Unsubscribe
icon
Unsubscribe
ماهیانه
 
Exploit Wars es un podcast de cyberseguridad, pentesting y hacking ético, donde aprenderemos cultura hacker, como realizar hacks y cómo defendernos de ellos, y todo lo que necesitamos para poder disfrutar de una de las profesiones de mayor futuro que existen. Además, cada episodio recomendamos un otro podcast para que sigas aprendiendo. Recomendado tanto si empiezas como si ya eres experto. Este Podcast es la rama auditiva de la academia Rubotic.net
  continue reading
 
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
  continue reading
 
Artwork

1
Future of Roblox Exploits

Redzem Technologies

icon
Unsubscribe
icon
Unsubscribe
روزانه+
 
Welcome to ”Future of Roblox Exploits,” the podcast where we dive deep into the evolving world of Roblox, exploring the latest trends, hacks, and exploits that shape this dynamic gaming platform. Each episode, we bring you insights from industry experts, developers, and seasoned players to uncover the future of game modifications, security measures, and the ethical implications of exploiting within Roblox. Whether you’re a developer looking to safeguard your creations, a player curious about ...
  continue reading
 
Artwork

1
Exploitation Of Of A MOTHER, VETERAN, SECURITY OFFICER AND PARALEGAL WRONGFULLY CONVICTED &MURDER

Woman veteran*TORTURED SINCE TDCJ* TORTURE TECHNOLOGY IN SAN ANTONIO

icon
Unsubscribe
icon
Unsubscribe
ماهیانه
 
Corruption, Lies, Technology, Slander, Exploitation, and ERASED POST ON GOOGLE AND THIS GOVERNMENT FACILITY HAS TRIED TO SET UP THE WRONG VETERAN......WANT TO ASK WHY? This is what is done to take advantage of a wrongfully convicted victim Without an advocate In Texas San Antonio took it upon their self to set up murder with TDCJ of a veteran mother who never got a trial to claim homicide.....per family court attorney A Targeted Individual Since TDCJ My daughter has been exploited
  continue reading
 
Ce podcast inédit est une enquête menée dans les Bouches-du-Rhône sur les conditions de vie des travailleurs détachés sous contrat avec des sociétés d'intérim espagnoles. Mauvais traitements, chantage sexuel, menaces, violence: nous découvrons un système rôdé et une omerta qui rend tout témoignage précieux. Ceux qui s’y frottent, les journalistes, les agriculteurs, l'inspection du travail, deviennent eux-mêmes des cibles.
  continue reading
 
Artwork

1
Super-Exploitation and Resistance

José Luis Granados Ceja

icon
Unsubscribe
icon
Unsubscribe
ماهیانه
 
This podcast brings the voices of labour leaders, activists, organizers, and social movements to a North American audience. We share the perspectives of people on the frontlines of social struggle and change in Latin America and the Caribbean. We are powered by Common Frontiers and allies in the Canadian Labour Movement. Logo by: sagestudio.ca
  continue reading
 
Loading …
show series
 
Welcome to Exploit Brokers with your host Cipherceval! In this deep dive, we uncover a sophisticated cyber assault where hackers exploited Microsoft SharePoint to launch the Havoc C2 via a stealthy click fix attack. Learn how a single click can trigger malicious PowerShell commands, turning everyday corporate tools into gateways for cybercrime. In …
  continue reading
 
Yobo, Chris in Miami, Bobby, and Mike discuss a movie that covers the ONLY ritual murder ever committed in New Orleans since the 1800s. With restaurants that serve breakfast, lunch, or dinner for the same meal, cops who go deep under the covers, and theatrical musical murder productions; this movie has it all!…
  continue reading
 
Exposed secrets, overlooked permissions, and credentials hiding in plain sight—each one leading to a critical breach. In this episode, we break down three real-world pentest findings where a forgotten file, a misconfigured setting, and a leaked credential gave attackers full control. How did they happen? How can you find similar issues? And what ca…
  continue reading
 
In this episode of Exploit Brokers, we dive into the dark world of cybercrime, exploring two alarming topics: a malicious Android loan app masquerading as a financial tool and Xerox printer vulnerabilities that could be leaking your credentials. Learn how loan sharks have moved from traditional methods to sophisticated digital predation, exploiting…
  continue reading
 
Yobo, other Tim and Brady join Bobby and Mike as the month of Yobo continues with the 1980's TV movie "classic" about a young Scott Baio with a drinking problem and his friend who wets the bed but might make it to the Olympics one day. Or is this the movie about Scott Baio getting drunk and hitting his brother off a row boat with an oar? Either way…
  continue reading
 
How can attackers take over accounts, networks, and devices—without credentials? In this episode, we break down three real-world security flaws that prove authentication alone isn’t enough: Account Takeover – A single request bypassed email verification, locking out store owners. Internal Network Compromise – A hidden admin URL and hardcoded access…
  continue reading
 
In today’s episode of Exploit Brokers, we dive deep into two major security threats making waves across the digital world. A critical Remote Code Execution (RCE) vulnerability in Microsoft Outlook is putting millions of users at risk, with hackers exploiting it through spear phishing emails and malicious links. Not only that, but we’re also uncover…
  continue reading
 
Welcome back to Exploit Brokers! In today’s video, we dive deep into a critical 7‑Zip vulnerability that’s being exploited by Russian cybercriminals to bypass Windows’ security protections. If you’ve used 7‑Zip at all, you need to know how this flaw can let hackers sneak past the Mark-of-the-Web (MOTW) and deploy dangerous malware like Smoke Loader…
  continue reading
 
What if you could take over an account—not by cracking a password, but by chaining two overlooked vulnerabilities? What if a single CSRF exploit let attackers reset security questions and hijack accounts? And what if manipulating an authorization token could escalate privileges? In this episode of Hacked & Secured: Pentest Exploits & Mitigations, w…
  continue reading
 
What if your OTP security wasn’t secure at all? What if a static domain—something most people ignore—could lead to full account takeover? And what if flawed role management allowed admins to escalate privileges? In this episode of Hacked & Secured: Pentest Exploits & Mitigations, we break down three real-world security failures that turned minor ov…
  continue reading
 
Lazarus Group’s Secret Admin Layer EXPOSED – Major Cybersecurity Discovery! 🔥💻 Security researchers have uncovered a hidden admin layer used by North Korea’s Lazarus Group to manage their Command and Control (C2) servers. This sophisticated network of VPNs and proxies allows them to execute cyberattacks worldwide—mainly targeting cryptocurrency dev…
  continue reading
 
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Welcome to Hacked & Secured: Pentest Exploits & Mitigations—the podcast that breaks down real-world pentest findings and exposes critical security flaws before attackers do. 🔹 Red team tactics – How vulnerab…
  continue reading
 
In this episode, we’re uncovering the darker side of Generative AI and the emerging threats lurking behind everyday tools like ChatGPT and Copilot. Learn how sensitive information—ranging from customer data to employee benefits—can be leaked simply by typing it into a Gen AI prompt. We’ll also expose how cybercriminals are escalating their tactics,…
  continue reading
 
🔒🚗 Volkswagen’s Massive 800K EV Data Breach & Mirai Botnet Threats Explained | Exploit Brokers Welcome back to Exploit Brokers! In today’s episode, we dive deep into two major cybersecurity threats shaking the automotive and industrial sectors: Volkswagen’s 800,000 EV Data Breach Discover how a misconfigured Amazon cloud storage led to the exposure…
  continue reading
 
In this episode, we dive deep into two explosive cybersecurity stories making headlines right now: a major breach at the U.S. Treasury Department allegedly carried out by Chinese state-sponsored hackers, and the discovery of over 3.1 million fake stars on GitHub used to boost malicious repositories. We’ll explore how third-party vendor BeyondTrust …
  continue reading
 
Bobby, Yobo, Wick, and Mike celebrate the 400th episode of the bin with a classic "Roger Please" movie that in no way holds up to modern standards. This episode has it all everyone: over 3 hours, soy sauce scholorships, rolling chair and dip bars, and a morning zoo radio show. Thanks for sticking with us everyone!…
  continue reading
 
In this eye-opening episode, we uncover the disturbing reality of IoT webcam vulnerabilities and explore how hackers are leveraging outdated firmware and previously discovered but unpatched exploits to infiltrate personal devices. From prying eyes in your own home to the colossal health data breach exposing over 900,000 patient records, the digital…
  continue reading
 
In true Grindbin fashion, Camvember 2024 finally comes to a close over half way through December... but with a real banger! Yobo, Matt, Bobby, and Mike pitch the tent, self-Nell, and drink some crotch warmed high lifes for an ill-fated camping trip. Memorial Valley Massacre is one of the most incohorent, logic defying, and intelligence insulting mo…
  continue reading
 
We’re diving into two major stories shaking up the gaming and cybersecurity worlds! First, we discuss the Fortnite Refund Update, where the FTC has forced Epic Games to refund millions due to their use of dark patterns. Find out if you’re eligible for a refund and how to claim it. Then, we shift gears to the Lazarus Group, North Korea’s infamous ha…
  continue reading
 
Uncover the fascinating yet chilling story of Hydra Market, the dark web’s largest illicit empire. Learn how this $1.35 billion platform operated, from smuggling narcotics and laundering money to offering hacking services. We’ll explore how its leader was sentenced to life in prison, the innovative (and illegal) technologies they used, and the glob…
  continue reading
 
Andrew Tate's platform, formerly known as Hustler’s University, has been hacked, exposing the data of over 800,000 users. Meanwhile, Russian hackers have exploited critical zero-day vulnerabilities in Firefox and Windows, demonstrating the growing sophistication of cyberattacks. In this video, we’ll break down the Andrew Tate hack, the implications…
  continue reading
 
In this episode, we dive deep into the world of ransomware with two of 2024's most talked-about threats: Phobos and Helldown. Learn how the Phobos ransomware operation managed to dominate 11% of the market, generating $16 million in ransom payments, and the shocking details of its admin’s extradition to the U.S. We also explore the rise of Helldown…
  continue reading
 
In today's episode, we dive deep into the fascinating yet troubling world of cybersecurity, exploring how even the most advanced antivirus software, firewalls, and endpoint security measures can fall short due to a single factor: human error. Despite the latest tech solutions, hackers continue to exploit one consistent vulnerability—users clicking …
  continue reading
 
Wick, Lee, Vaughn, and Mike discuss an extremely unhinged Cameron Mitchell performance in a movie starring Grindbin legend, Robert Ginty. Directed by David Winters (Rage to Kill, Thrashin') Codename Vengeance is undoubtedly some sort of tax dodge scheme that nobody was actually intended to watch... yet here we are nearly 40 years later discussing i…
  continue reading
 
In today's episode, we’re diving into the hidden dangers of malicious installers, software cracks, and deceptive ads on Google. We'll explore recent stories, including the SteelFox malware that's hijacking Windows PCs, stealing credit card data, and mining cryptocurrency using vulnerable drivers. Plus, we’ll uncover a new wave of malvertising attac…
  continue reading
 
Camvember 2024 has arrived and the boys find themselves stranded on an island full of fishmen in some weird sex game. Tanner, Bobby, and Mike are joined by new guest Greg (Absolute Zeros: Camp Launchpad, Junior Braves of the Apocalypse) to talk about a very drunk Cameron Mitchell appearance that really isn't supposed to be in the movie.…
  continue reading
 
In a significant international operation, Dutch police and global law enforcement partners have taken down two major information stealers: Redline and Meta Stealer. These dangerous malware operations targeted thousands of victims worldwide, stealing passwords, sensitive data, and more. This video explores how law enforcement agencies worked togethe…
  continue reading
 
Bobby, Yobo, and Mike find themselves trapped in an abandoned house for the annual Grindbin Halloween episode! Night of the Demons is your classic "people stuck in a house" movie where we wander around for 90 minutes and hope something fun might happen. Does it? Will Yobo be spread over an open fire?? Did anyone bring the Double D batteries?!…
  continue reading
 
The Internet Archive has been breached… AGAIN! 🛑 This time, hackers managed to compromise sensitive user data not once, but twice, exploiting stolen GitLab and Zendesk tokens. In this episode of Exploit Brokers, we break down what went wrong, why access tokens are crucial for cybersecurity, and how this breach could have been prevented. 🚨 We’ll div…
  continue reading
 
Greg, Chris in Miami, Bobby, and Mike discuss the lesser-known Walter Hill film, lovingly referred to on the show as "Swamp Warriors". When a group of National Guardsmen get stuck in the swamps of Louisiana, they find themselves hunted by locals who really don't like outsiders. Featuring a cast of great charactor actors: Keith Carradine, Powers Boo…
  continue reading
 
The Patreon Poll winner for "Silva September" is here... in October! Vaughn, Chuck, Bobby, and Mike discuss the Fernando Di Leo crime drama in which Henry Silva plays our leading man (only not in his own voice). Does the Boss live up to the hype? Will we get a complete org chart of the mob before the movie is over? Did we find yet another Grindbin …
  continue reading
 
In this eye-opening episode of Exploit Brokers, your host Lauro dives deep into the recent cyberattacks that have compromised major U.S. telecommunications networks. Chinese state-sponsored hackers, known as Salt Typhoon, have exploited a 30-year-old backdoor mandated by U.S. law, targeting giants like AT&T, Lumen (formerly CenturyLink), and Verizo…
  continue reading
 
Imagine waking up to find that your trusted antivirus software has uninstalled itself and replaced itself with a completely different program—without your consent! 😱 In today's video, we dive deep into the shocking move by Kaspersky as it uninstalls itself and installs Ultra AV on users' computers. We'll explore why this happened, how users are rea…
  continue reading
 
Yobo, Molly, Bobby, and Mike FINALLY discuss the Gary Coleman "classic" about him living in a train station locker and betting on horses. Who was this made for? Why did they destroy an entire rain forest to build a train station Shakey's? And is Gary just actually a vampire? All these questions will be answered... and more!…
  continue reading
 
In an unexpected turn of events, Apple has decided to drop its three-year-old lawsuit against the notorious spyware maker, NSO Group. What led to this shocking decision, and what does it mean for the future of cybersecurity and your personal data? 🤔 In today's video, we dive deep into the reasons behind Apple's surprising move. We'll explore how th…
  continue reading
 
Faustus joins Bobby and Mike to talk about the Dino De Laurentiis "spoof" of James Bond films. CIA agent Kelly is stationed in Rio de Janeiro, covertly monitoring a wealthy industrialist, David Ardonian, who harbors a secret plan to sterilize the global population and repopulate the world himself, with captured women in clear cubes.…
  continue reading
 
Tanner, Fern, Bobby, and Mike find themselves locked up with Grindbin All Star Tom DeSimone (Hell Night, Chatterbox, Angel III) in his "sendup" of women in prison movies. What promises to be a fun time ends up being one of the most angry, mean-spirited films we've seen in a long time. Tom, you doing ok buddy?…
  continue reading
 
Summer Sequel Month 2024 comes to the a dramatic close with the Patreon Poll winner, Smokey and the Bandit Part 3. Chuck, Bobby, and Mike discuss the movie that wouldn't die by forcing it's way into existence. Can a Bandit movie exist without the Bandit? Has Jerry Reed seen the first two films?? Did Jackie Gleeson put his mom in this movie?! IT'S A…
  continue reading
 
Is Your Tap-to-Pay Secure? The Latest Android Malware Warning 🔒 In this episode of Exploit Brokers, we dive deep into a new Android malware that targets NFC technology to steal your banking information. 📱💳 If you use tap-to-pay or any NFC-based service, this is something you NEED to know. We’ll break down how this malware works, why it's so dangero…
  continue reading
 
Lee, Daniel, Bobby, and Mike are here to discuss the Lorenzo Lamas "classic" Snake Eater 2! Have any of us seen a Snake Eater before? Does this movie have anything to do with the first one? Do we end the episode fighting on a roof with wheelchairs?! All this... and more!
  continue reading
 
🚨 AI Propaganda Exposed: How It’s Influencing Elections Right Now! 🚨 In this episode of Exploit Brokers, we dive deep into the unsettling world of AI-driven misinformation campaigns. From targeting voters on both sides to spreading chaos across social media, AI is being weaponized in ways that sound like science fiction but are shockingly real. We’…
  continue reading
 
In this episode of Exploit Brokers, we dive into a significant new threat spreading across the web—Trojan malware hidden in malicious browser extensions. These sneaky extensions are distributed through fake download sites mimicking popular software like Roblox FPS Unlocker, YouTube, VLC, or KeePass. We’ll discuss how these Trojans operate, how they…
  continue reading
 
Yobo, Terry, Bobby, and Mike find themselves locked back up in the Penitentiary for one more fight (even though we said we would never fight again and it doesn't really make any sense for us to be locked up for a third time). Can Canon elevate the Penitentiary series to new heights? Can you eat an orange with the skin on? Will Yobo mention the comp…
  continue reading
 
In this episode of Exploit Brokers, we're diving into a new and alarming trend in cybersecurity: Remote Access Trojans (RATs) targeting IT professionals. Discover how malware disguised as legitimate tools is being installed by unsuspecting IT teams, leading to severe breaches and ransomware attacks. We'll explore the tactics used by Hunter's Intern…
  continue reading
 
Loading …

راهنمای مرجع سریع

در حین کاوش به این نمایش گوش دهید
پخش