Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat
…
continue reading
The Don Harkins Real Estate Show is your go-to source for navigating the real estate market with clarity and confidence. Join Don as he uncovers industry myths, shares expert strategies, and empowers consumers, agents, and investors with actionable insights to succeed in today’s ever-changing real estate landscape.
…
continue reading

1
HN59 - Microsoft AI Discovers 20 Zero-Day Vulnerabilities in Bootloaders!
19:22
19:22
Play later
Play later
Lists
Like
Liked
19:22# Title * HN59 - Microsoft AI Discovers 20 Zero-Day Vulnerabilities in Bootloaders! ## Description 🔍 Microsoft’s AI Uncovers 20 Zero-Day Threats | CoffeeLoader Malware Gets Smarter In this episode of Exploit Brokers, Cipherceval dives into how Microsoft Security Copilot, powered by AI, discovered over 20 previously unknown vulnerabilities in popula…
…
continue reading

1
Real Estate Shakeup, The Best Time to Sell, Rate Rollercoasters, and 2025’s Top Remodels
46:22
46:22
Play later
Play later
Lists
Like
Liked
46:22Send us a text This week on The Don Harkins Real Estate Show, we dive into some of the hottest — and most important — real estate topics you need to know right now. First, I break down Florida’s controversial push to abolish the Florida Real Estate Commission (FREC) — and why this move could spell trouble for homeowners, buyers, and the entire real…
…
continue reading

1
Broker Battles, Rate Spikes, and Landlord Traps
35:12
35:12
Play later
Play later
Lists
Like
Liked
35:12Send us a text This week on The Don Harkins Real Estate Show, we’re breaking down the wild ride in the mortgage market, where rates just saw their biggest weekly jump in years. But that’s not all—behind the scenes, the battle between big-name brokerages like Compass, eXp, and Zillow is heating up, and it’s starting to affect the way homes are bough…
…
continue reading

1
Tariffs, Treasuries & Turmoil: How a Market Crash Could Boost Housing
15:01
15:01
Play later
Play later
Lists
Like
Liked
15:01Send us a text In this episode, we dig into the surprising mechanics behind the recent tariff announcements and how they’re strategically pressuring Treasury yields lower—creating a path for the federal government to refinance ballooning debt at more manageable rates. While the stock market reels, bond demand is surging, yields are falling, and mor…
…
continue reading

1
Built on Bad Land? How Homebuilders Are Exploiting the Housing Crisis
22:42
22:42
Play later
Play later
Lists
Like
Liked
22:42Send us a text In this eye-opening episode, Don Harkins exposes a growing trend among national homebuilders: developing new communities on the cheapest—and often most dangerous—land available. With affordability at an all-time low and inventory scarce, desperate buyers are being lured into homes built next to highways, landfills, flood zones, and e…
…
continue reading

1
What's Going To Happen To Housing in 2025?
18:04
18:04
Play later
Play later
Lists
Like
Liked
18:04Send us a text Will home prices keep rising? Are mortgage rates finally coming down? And is 2025 the year buyers regain control of the market? In this episode, we break down the key economic trends, interest rate forecasts, and inventory shifts shaping the housing market in the year ahead. Whether you’re a homebuyer, seller, or investor, we’ll help…
…
continue reading

1
HN58 - Havoc in the Cloud: The Shocking Click Fix Exploit Revealed
24:22
24:22
Play later
Play later
Lists
Like
Liked
24:22Welcome to Exploit Brokers with your host Cipherceval! In this deep dive, we uncover a sophisticated cyber assault where hackers exploited Microsoft SharePoint to launch the Havoc C2 via a stealthy click fix attack. Learn how a single click can trigger malicious PowerShell commands, turning everyday corporate tools into gateways for cybercrime. In …
…
continue reading

1
HN57 - Unmasking SpyLoan: The Android Malware Preying on Loan Seekers
20:32
20:32
Play later
Play later
Lists
Like
Liked
20:32In this episode of Exploit Brokers, we dive into the dark world of cybercrime, exploring two alarming topics: a malicious Android loan app masquerading as a financial tool and Xerox printer vulnerabilities that could be leaking your credentials. Learn how loan sharks have moved from traditional methods to sophisticated digital predation, exploiting…
…
continue reading

1
Should I Pay Mortgage Discount Points? A look behind the Mortgage Curtain and Secondary Market
26:00
26:00
Play later
Play later
Lists
Like
Liked
26:00Send us a text Ever wondered why mortgage rates fluctuate or why different lenders offer different rates for the same loan? In this episode, we’re pulling back the curtain on the secondary mortgage market—the hidden engine behind how mortgages are bought, sold, and priced. We’ll break down: 🎙 How the secondary mortgage market works and why it impac…
…
continue reading

1
HN56 - Massive Bug Puts Outlook Users at Risk | Kimsuky gets RDPWrapper
27:03
27:03
Play later
Play later
Lists
Like
Liked
27:03In today’s episode of Exploit Brokers, we dive deep into two major security threats making waves across the digital world. A critical Remote Code Execution (RCE) vulnerability in Microsoft Outlook is putting millions of users at risk, with hackers exploiting it through spear phishing emails and malicious links. Not only that, but we’re also uncover…
…
continue reading

1
HN55 - Double Zipping Danger: The 7-Zip Exploit That Could Hack Your PC
27:18
27:18
Play later
Play later
Lists
Like
Liked
27:18Welcome back to Exploit Brokers! In today’s video, we dive deep into a critical 7‑Zip vulnerability that’s being exploited by Russian cybercriminals to bypass Windows’ security protections. If you’ve used 7‑Zip at all, you need to know how this flaw can let hackers sneak past the Mark-of-the-Web (MOTW) and deploy dangerous malware like Smoke Loader…
…
continue reading

1
How to Save Thousands on Property Taxes w/ Homestead Exemption
16:57
16:57
Play later
Play later
Lists
Like
Liked
16:57Send us a text Homeowners, are you leaving money on the table? If you’re not taking advantage of the Homestead Exemption, you could be paying way more in property taxes than you need to! In this episode, we break down everything you need to know about this powerful tax-saving tool, including: ✅ The history & evolution of the Homestead Exemption 📜 ✅…
…
continue reading

1
Beat The Housing Affordability Crisis: How to Lower Your Rate & Make Homeownership Affordable
19:39
19:39
Play later
Play later
Lists
Like
Liked
19:39Send us a text Buying a home feels more expensive than ever, but what if there was a way to lower your mortgage payment and make homeownership more affordable? In this episode of The Don Harkins Real Estate Show, we’re diving into temporary and permanent mortgage buydowns—one of the smartest tools available to help buyers reduce costs in today’s hi…
…
continue reading

1
HN54 - Cybersecurity Experts Reveal LAZARUS GROUP's Hidden Secrets
29:54
29:54
Play later
Play later
Lists
Like
Liked
29:54Lazarus Group’s Secret Admin Layer EXPOSED – Major Cybersecurity Discovery! 🔥💻 Security researchers have uncovered a hidden admin layer used by North Korea’s Lazarus Group to manage their Command and Control (C2) servers. This sophisticated network of VPNs and proxies allows them to execute cyberattacks worldwide—mainly targeting cryptocurrency dev…
…
continue reading

1
HN53 - AI’s Dirty Little Secret: Employees Leaking Data by Accident
24:46
24:46
Play later
Play later
Lists
Like
Liked
24:46In this episode, we’re uncovering the darker side of Generative AI and the emerging threats lurking behind everyday tools like ChatGPT and Copilot. Learn how sensitive information—ranging from customer data to employee benefits—can be leaked simply by typing it into a Gen AI prompt. We’ll also expose how cybercriminals are escalating their tactics,…
…
continue reading

1
HN52 - 800K Volkswagen EVs Hacked! Massive Data Breach & Mirai Botnet Attack Explained
21:55
21:55
Play later
Play later
Lists
Like
Liked
21:55🔒🚗 Volkswagen’s Massive 800K EV Data Breach & Mirai Botnet Threats Explained | Exploit Brokers Welcome back to Exploit Brokers! In today’s episode, we dive deep into two major cybersecurity threats shaking the automotive and industrial sectors: Volkswagen’s 800,000 EV Data Breach Discover how a misconfigured Amazon cloud storage led to the exposure…
…
continue reading

1
The 2025 Housing Market Shift: What Every Buyer, Seller, and Practitioner Needs to Know
39:54
39:54
Play later
Play later
Lists
Like
Liked
39:54Send us a text The U.S. housing market is shifting in ways we’ve never seen before! In this episode, we dive into the latest Profile of Home Buyers and Sellers Report from the National Association of REALTORS® to uncover the surprising trends shaping real estate today. We’re talking about: ➡️ The historic drop in first-time homebuyers ➡️ Rising mor…
…
continue reading

1
Real Estate vs. Bitcoin: 11 Reasons Tangible Assets Win the Wealth Game
23:38
23:38
Play later
Play later
Lists
Like
Liked
23:38Send us a text In this episode of The Don Harkins Real Estate Show, we dive headfirst into one of the most talked-about debates in modern investing: real estate versus Bitcoin. Both asset classes have their advocates, but which one truly stands the test of time when it comes to building sustainable wealth? Join us as we break down 11 key reasons wh…
…
continue reading

1
HN51 - Chinese Hackers Breach U.S. Treasury AND 3M Fake GitHub Stars Exposed
23:16
23:16
Play later
Play later
Lists
Like
Liked
23:16In this episode, we dive deep into two explosive cybersecurity stories making headlines right now: a major breach at the U.S. Treasury Department allegedly carried out by Chinese state-sponsored hackers, and the discovery of over 3.1 million fake stars on GitHub used to boost malicious repositories. We’ll explore how third-party vendor BeyondTrust …
…
continue reading

1
HN50 - IoT Webcams Hacked & 900k+ Health Records Exposed
25:36
25:36
Play later
Play later
Lists
Like
Liked
25:36In this eye-opening episode, we uncover the disturbing reality of IoT webcam vulnerabilities and explore how hackers are leveraging outdated firmware and previously discovered but unpatched exploits to infiltrate personal devices. From prying eyes in your own home to the colossal health data breach exposing over 900,000 patient records, the digital…
…
continue reading

1
How Institutional Investors Are Destroying Homeownership Opportunity For Everyday Americans
40:25
40:25
Play later
Play later
Lists
Like
Liked
40:25Send us a text Are corporations stealing the American Dream of homeownership? In this episode of The Don Harkins Real Estate Show, we uncover how institutional investors like BlackRock, State Street, and others are reshaping the U.S. housing market. Learn how companies like Invitation Homes and Progress Residential are buying up single-family homes…
…
continue reading

1
HN49 - Fortnite Refund Update: Millions Refunded + Lazarus Group’s Crypto Hacks Revealed
23:15
23:15
Play later
Play later
Lists
Like
Liked
23:15We’re diving into two major stories shaking up the gaming and cybersecurity worlds! First, we discuss the Fortnite Refund Update, where the FTC has forced Epic Games to refund millions due to their use of dark patterns. Find out if you’re eligible for a refund and how to claim it. Then, we shift gears to the Lazarus Group, North Korea’s infamous ha…
…
continue reading

1
Real Estate and the Holidays: Myths, Market Trends, and Strategic Insights
26:32
26:32
Play later
Play later
Lists
Like
Liked
26:32Send us a text In this episode of The Don Harkins Real Estate Show, we dive into the realities of selling your home during the holiday season. Are the holidays really a bad time to sell, or can they offer hidden opportunities for motivated sellers? Join Don as he breaks down the latest market trends, analyzes data from recent years, and uncovers th…
…
continue reading
Uncover the fascinating yet chilling story of Hydra Market, the dark web’s largest illicit empire. Learn how this $1.35 billion platform operated, from smuggling narcotics and laundering money to offering hacking services. We’ll explore how its leader was sentenced to life in prison, the innovative (and illegal) technologies they used, and the glob…
…
continue reading

1
HN47 - Andrew Tate’s Platform Hacked by Activists + Russian Hackers Exploit Zero-Days
18:03
18:03
Play later
Play later
Lists
Like
Liked
18:03Andrew Tate's platform, formerly known as Hustler’s University, has been hacked, exposing the data of over 800,000 users. Meanwhile, Russian hackers have exploited critical zero-day vulnerabilities in Firefox and Windows, demonstrating the growing sophistication of cyberattacks. In this video, we’ll break down the Andrew Tate hack, the implications…
…
continue reading

1
HN46 - Phobos’ $16M Haul & Helldown’s Secret Exploits – 2024’s Ransomware Crisis
27:53
27:53
Play later
Play later
Lists
Like
Liked
27:53In this episode, we dive deep into the world of ransomware with two of 2024's most talked-about threats: Phobos and Helldown. Learn how the Phobos ransomware operation managed to dominate 11% of the market, generating $16 million in ransom payments, and the shocking details of its admin’s extradition to the U.S. We also explore the rise of Helldown…
…
continue reading

1
HN45 - Malware Madness: How Remcos RAT and Human Error Fuel Cyber Threats
33:15
33:15
Play later
Play later
Lists
Like
Liked
33:15In today's episode, we dive deep into the fascinating yet troubling world of cybersecurity, exploring how even the most advanced antivirus software, firewalls, and endpoint security measures can fall short due to a single factor: human error. Despite the latest tech solutions, hackers continue to exploit one consistent vulnerability—users clicking …
…
continue reading

1
HN44 - Malicious Crack Tools & Malvertising Attack: How Hackers Steal Your Data
22:42
22:42
Play later
Play later
Lists
Like
Liked
22:42In today's episode, we’re diving into the hidden dangers of malicious installers, software cracks, and deceptive ads on Google. We'll explore recent stories, including the SteelFox malware that's hijacking Windows PCs, stealing credit card data, and mining cryptocurrency using vulnerable drivers. Plus, we’ll uncover a new wave of malvertising attac…
…
continue reading

1
HN43 - Dutch Police Take Down Major Information Stealers: Redline & Meta Stealer
10:45
10:45
Play later
Play later
Lists
Like
Liked
10:45In a significant international operation, Dutch police and global law enforcement partners have taken down two major information stealers: Redline and Meta Stealer. These dangerous malware operations targeted thousands of victims worldwide, stealing passwords, sensitive data, and more. This video explores how law enforcement agencies worked togethe…
…
continue reading

1
HN42 - Hackers Breach Internet Archive TWICE – How Safe is Your Data?
16:12
16:12
Play later
Play later
Lists
Like
Liked
16:12The Internet Archive has been breached… AGAIN! 🛑 This time, hackers managed to compromise sensitive user data not once, but twice, exploiting stolen GitLab and Zendesk tokens. In this episode of Exploit Brokers, we break down what went wrong, why access tokens are crucial for cybersecurity, and how this breach could have been prevented. 🚨 We’ll div…
…
continue reading

1
HN41 - Chinese Hackers Hijack US Telecom Networks
15:46
15:46
Play later
Play later
Lists
Like
Liked
15:46In this eye-opening episode of Exploit Brokers, your host Lauro dives deep into the recent cyberattacks that have compromised major U.S. telecommunications networks. Chinese state-sponsored hackers, known as Salt Typhoon, have exploited a 30-year-old backdoor mandated by U.S. law, targeting giants like AT&T, Lumen (formerly CenturyLink), and Verizo…
…
continue reading

1
HN40 - Shocking Move: Kaspersky Uninstalls Itself and Installs Ultra AV Overnight!
13:13
13:13
Play later
Play later
Lists
Like
Liked
13:13Imagine waking up to find that your trusted antivirus software has uninstalled itself and replaced itself with a completely different program—without your consent! 😱 In today's video, we dive deep into the shocking move by Kaspersky as it uninstalls itself and installs Ultra AV on users' computers. We'll explore why this happened, how users are rea…
…
continue reading

1
HN39 - Apple's Shocking Decision: Dropping the Fight Against NSO Spyware
14:15
14:15
Play later
Play later
Lists
Like
Liked
14:15In an unexpected turn of events, Apple has decided to drop its three-year-old lawsuit against the notorious spyware maker, NSO Group. What led to this shocking decision, and what does it mean for the future of cybersecurity and your personal data? 🤔 In today's video, we dive deep into the reasons behind Apple's surprising move. We'll explore how th…
…
continue reading

1
HN38 - Is Your Tap-to-Pay Secure? The Latest Android Malware Warning
13:35
13:35
Play later
Play later
Lists
Like
Liked
13:35Is Your Tap-to-Pay Secure? The Latest Android Malware Warning 🔒 In this episode of Exploit Brokers, we dive deep into a new Android malware that targets NFC technology to steal your banking information. 📱💳 If you use tap-to-pay or any NFC-based service, this is something you NEED to know. We’ll break down how this malware works, why it's so dangero…
…
continue reading

1
HN37 - AI Manipulation: The Silent Threat to Democracy
16:32
16:32
Play later
Play later
Lists
Like
Liked
16:32🚨 AI Propaganda Exposed: How It’s Influencing Elections Right Now! 🚨 In this episode of Exploit Brokers, we dive deep into the unsettling world of AI-driven misinformation campaigns. From targeting voters on both sides to spreading chaos across social media, AI is being weaponized in ways that sound like science fiction but are shockingly real. We’…
…
continue reading

1
HN36 - Fake Sites, Real Danger: The Trojan Malware in Extensions
15:08
15:08
Play later
Play later
Lists
Like
Liked
15:08In this episode of Exploit Brokers, we dive into a significant new threat spreading across the web—Trojan malware hidden in malicious browser extensions. These sneaky extensions are distributed through fake download sites mimicking popular software like Roblox FPS Unlocker, YouTube, VLC, or KeePass. We’ll discuss how these Trojans operate, how they…
…
continue reading

1
HN35 - Deceptive Admin Tool You Should NOT Install
17:22
17:22
Play later
Play later
Lists
Like
Liked
17:22In this episode of Exploit Brokers, we're diving into a new and alarming trend in cybersecurity: Remote Access Trojans (RATs) targeting IT professionals. Discover how malware disguised as legitimate tools is being installed by unsuspecting IT teams, leading to severe breaches and ransomware attacks. We'll explore the tactics used by Hunter's Intern…
…
continue reading

1
HN34 - AI Detects Fires and Malicious Android Apps You Need to Avoid
22:15
22:15
Play later
Play later
Lists
Like
Liked
22:15Hey everyone, welcome back to another episode of Exploit Brokers! In today's video, we're diving deep into some dangerous Android apps you should avoid installing. We'll also explore how AI is being used to detect wildfires and identify AI-generated videos, proving that technology can indeed fight back against digital threats. With the rise of data…
…
continue reading

1
HN33 - CrowdStrike Chaos: Fake Fixes and Malware Attacks
17:39
17:39
Play later
Play later
Lists
Like
Liked
17:39In this episode of Exploit Brokers, we delve into two major cyber stories making headlines. First, we uncover the details behind the recent breach of water facilities by Russian hacktivists and the subsequent U.S. sanctions. Discover the risks posed by SCADA system vulnerabilities and the potential for catastrophic damage to critical infrastructure…
…
continue reading

1
HN32 - Cyber Scam Slavery: The Dark Side of Online Fraud
26:28
26:28
Play later
Play later
Lists
Like
Liked
26:28🚨 Welcome to Exploit Brokers! 🚨 In this episode, we're diving deep into the hidden world of fake cell towers and the alarming rise of cyber scam slavery. 📡💔 Did you know that your cell phone might be connecting to a fake tower, putting your personal information at risk? We explore a recent case in London where criminals set up a fake cell tower to …
…
continue reading

1
HN31 - AI and Crime: How criminals are Exploiting Technology to Deceive
26:36
26:36
Play later
Play later
Lists
Like
Liked
26:36Welcome back to another episode of Exploit Brokers with your host, Lauro! Today, we're diving deep into the darker uses of AI by criminals. From high-tech identity theft using AI-generated voices and images to unprecedented surges in digital crimes such as hacking and data breaches, we explore how these technologies are shaping modern criminal tact…
…
continue reading

1
HN30 - Digital Intruders: The Complex Web of APTs Against ASEAN
24:43
24:43
Play later
Play later
Lists
Like
Liked
24:43In this thrilling episode of our cybersecurity series, we dive deep into the shadowy world of cyber espionage waged by two Chinese Advanced Persistent Threat (APT) groups against the nations of the Association of Southeast Asian Nations (ASEAN). Discover the tactics employed by infamous threat actors like Mustang Panda in their sophisticated digita…
…
continue reading

1
HN29 - No Honor Among Thieves: The Internal Conflict of Black Cat Ransomware
25:43
25:43
Play later
Play later
Lists
Like
Liked
25:43Dive into the dark world of cybercrime with our latest episode on Exploit Brokers, where we unravel the complexities of the Black Cat ransomware group and its fallout with Change Healthcare and UnitedHealth Group. Witness the intricacies of digital extortion, the inner workings of cybercriminal networks, and the colossal impact on the healthcare se…
…
continue reading

1
HN28 - Ransomware Alert: Black Cat's Bold Move Against UnitedHealth
20:02
20:02
Play later
Play later
Lists
Like
Liked
20:02In this gripping episode of Exploit Brokers, we dive deep into the shadows of cyberspace to uncover the resurgence of the notorious Black Cat ransomware group. Following their recent high-profile attack on UnitedHealth's technology unit, Optum, which disrupted prescription deliveries across the United States, Black Cat has declared war against the …
…
continue reading

1
HN27 - Massive Ransomware Empire Crumbles: Inside the Fall of LockBit
24:23
24:23
Play later
Play later
Lists
Like
Liked
24:23In this explosive episode of Exploit Brokers, we delve into the groundbreaking takedown of LockBit, one of the most formidable names in the ransomware arena. With law enforcement agencies from the US, EU, and beyond joining forces, this rare international operation has sent shockwaves through the cybercrime world. From arrests in Ukraine and France…
…
continue reading

1
HN26 - AI and Cyber Attacks: Unveiling the Tactics of Nation State Hackers
18:01
18:01
Play later
Play later
Lists
Like
Liked
18:01Welcome back to Exploit Brokers, where we delve deep into the world of cybersecurity, AI, and the digital battlegrounds of our time. In this episode, we're exploring a topic that sounds like it's straight out of a sci-fi movie, but is unfolding in real life: the integration of AI into military and cyber warfare by nation states. With an unprecedent…
…
continue reading

1
HN25 - Hacking Havoc: How Fulton County Became a Real-Life Cyberwar Zone
16:01
16:01
Play later
Play later
Lists
Like
Liked
16:01Dive into the eye-opening world of cybersecurity as we dissect the recent cyber attack and Hacking Havoc that has plunged Fulton County into turmoil. Witness the frightening resemblance between fictional cyber threats depicted in shows like Mr. Robot and the stark reality facing our digital infrastructures today. This episode of Exploit Brokers tak…
…
continue reading

1
HN24 - Sandwich Data Breach Alert: Jason's Deli & Subway Under Attack
20:19
20:19
Play later
Play later
Lists
Like
Liked
20:19🔒 Dive into the world of cybersecurity as we uncover the latest threats facing businesses in today's digital landscape. In this video, we dissect the Jason's Deli data breach, shedding light on the dangers of credential stuffing attacks. Discover how hackers exploit weak password habits and gain access to personal data, leaving thousands of custome…
…
continue reading

1
HN23 - One Click Away: The Alarming Reality of Data Theft Exploits
14:58
14:58
Play later
Play later
Lists
Like
Liked
14:58In this eye-opening episode of Exploit Brokers, we delve deep into the world of cybercrime, dissecting the sinister Phemedrone Stealer malware and its ability to pilfer your precious data. Join us as we explore the chilling reality that just one click on a seemingly harmless URL can lead to a catastrophic data breach. Discover the insidious tactics…
…
continue reading

1
HN22 - Crypto Chaos: How a Fake SEC Tweet Triggered a Bitcoin Spike
19:29
19:29
Play later
Play later
Lists
Like
Liked
19:29In this gripping episode of Exploit Brokers, we delve deep into the intricate world of cryptocurrency and cybersecurity. Our journey begins with the astonishing SEC Twitter hack, where hackers manipulated the SEC's account to spread false information about Bitcoin ETF approvals. This led to a monumental $2,000 surge in Bitcoin prices, leaving the c…
…
continue reading