Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat
…
continue reading
Join your hosts Mike and Bobby as they delve into the world of grindhouse and exploitation films from the 1970's, 1980's and beyond. The movies they discuss range from the funny to the downright bizarre but they are always fascinating and often forgotten gems.
…
continue reading
El mejor podcast de videojuegos. Una plática entre amigos sobre la cultura geek, videojuegos animes, peliculas y caricaturas.
…
continue reading
À chaque vendredi de la semaine, Les Exploités regardent un film d'exploitation poche et vous en font la critique pour que vous n'ayez pas besoin de le faire. Au menu: du SEXE, de l'ACTION, du SUSPENCE et du marketing choc un peu trop évident.
…
continue reading
A show about hacking the system, hosted by Patrick Tomasso and Gabi Pirraglia. Patrick is a content creator and Gabi is digital strategist, together they pull apart the internet and social media to reveal the hidden creative formulas for success.
…
continue reading
Shir Khan is the owner of in-vogue and on-point deep house label at the moment, the leviathan that is Exploited Records. Exploited Rec blazes its way through since 2007 with releases that simply cannot be brushed aside. 2012 has been the breakthrough year for Exploited, bringing them massive celebration and support from artists, the scene and a large audience. Still stated as one of the leading influences in Deep House & Indie Dance, Exploited is not set up to stop releasing tracks that blow ...
…
continue reading
Brandon Friesen brings you (XNOS) Exploiting Nostalgia.. the Saturday morning variety show dedicated to rediscovering all the things we feel sentimental about. Enjoy multiple segments per episode covering childhood memories, classic videogames, music of yesteryear, movies, shows, toys and anything else that comes with that warm familiar feeling. New guests featured every week. Powered by FreezenFactor.
…
continue reading
We will investigate America’s identity based off human exploitation for labor.
…
continue reading
Exploit Wars es un podcast de cyberseguridad, pentesting y hacking ético, donde aprenderemos cultura hacker, como realizar hacks y cómo defendernos de ellos, y todo lo que necesitamos para poder disfrutar de una de las profesiones de mayor futuro que existen. Además, cada episodio recomendamos un otro podcast para que sigas aprendiendo. Recomendado tanto si empiezas como si ya eres experto. Este Podcast es la rama auditiva de la academia Rubotic.net
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
Welcome to ”Future of Roblox Exploits,” the podcast where we dive deep into the evolving world of Roblox, exploring the latest trends, hacks, and exploits that shape this dynamic gaming platform. Each episode, we bring you insights from industry experts, developers, and seasoned players to uncover the future of game modifications, security measures, and the ethical implications of exploiting within Roblox. Whether you’re a developer looking to safeguard your creations, a player curious about ...
…
continue reading

1
Exploitation Of Of A MOTHER, VETERAN, SECURITY OFFICER AND PARALEGAL WRONGFULLY CONVICTED &MURDER
Woman veteran*TORTURED SINCE TDCJ* TORTURE TECHNOLOGY IN SAN ANTONIO
Corruption, Lies, Technology, Slander, Exploitation, and ERASED POST ON GOOGLE AND THIS GOVERNMENT FACILITY HAS TRIED TO SET UP THE WRONG VETERAN......WANT TO ASK WHY? This is what is done to take advantage of a wrongfully convicted victim Without an advocate In Texas San Antonio took it upon their self to set up murder with TDCJ of a veteran mother who never got a trial to claim homicide.....per family court attorney A Targeted Individual Since TDCJ My daughter has been exploited
…
continue reading
Ce podcast inédit est une enquête menée dans les Bouches-du-Rhône sur les conditions de vie des travailleurs détachés sous contrat avec des sociétés d'intérim espagnoles. Mauvais traitements, chantage sexuel, menaces, violence: nous découvrons un système rôdé et une omerta qui rend tout témoignage précieux. Ceux qui s’y frottent, les journalistes, les agriculteurs, l'inspection du travail, deviennent eux-mêmes des cibles.
…
continue reading
This podcast brings the voices of labour leaders, activists, organizers, and social movements to a North American audience. We share the perspectives of people on the frontlines of social struggle and change in Latin America and the Caribbean. We are powered by Common Frontiers and allies in the Canadian Labour Movement. Logo by: sagestudio.ca
…
continue reading

1
"Should Inuit and the FNMI cooperate with modern industrialized society to exploit the natural resources of their land such as oil and gas".Based on the book "The Right To Be Cold" By: Sheila Watt Cloutier ...
COLIN WILLIAMS
Welcome to the Colin Williams podcast, where amazing things happen. Cover art photo provided by Chris Marquardt on Unsplash: https://unsplash.com/@chrismarquardt
…
continue reading

1
HN58 - Havoc in the Cloud: The Shocking Click Fix Exploit Revealed
24:22
24:22
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
24:22Welcome to Exploit Brokers with your host Cipherceval! In this deep dive, we uncover a sophisticated cyber assault where hackers exploited Microsoft SharePoint to launch the Havoc C2 via a stealthy click fix attack. Learn how a single click can trigger malicious PowerShell commands, turning everyday corporate tools into gateways for cybercrime. In …
…
continue reading

1
406 - Mardi Gras Massacre (1978)
3:02:11
3:02:11
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
3:02:11Yobo, Chris in Miami, Bobby, and Mike discuss a movie that covers the ONLY ritual murder ever committed in New Orleans since the 1800s. With restaurants that serve breakfast, lunch, or dinner for the same meal, cops who go deep under the covers, and theatrical musical murder productions; this movie has it all!…
…
continue reading

1
Exposed Secrets & Silent Takeovers – The Hidden Risks of Misconfigurations
21:15
21:15
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
21:15Exposed secrets, overlooked permissions, and credentials hiding in plain sight—each one leading to a critical breach. In this episode, we break down three real-world pentest findings where a forgotten file, a misconfigured setting, and a leaked credential gave attackers full control. How did they happen? How can you find similar issues? And what ca…
…
continue reading

1
HN57 - Unmasking SpyLoan: The Android Malware Preying on Loan Seekers
20:32
20:32
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
20:32In this episode of Exploit Brokers, we dive into the dark world of cybercrime, exploring two alarming topics: a malicious Android loan app masquerading as a financial tool and Xerox printer vulnerabilities that could be leaking your credentials. Learn how loan sharks have moved from traditional methods to sophisticated digital predation, exploiting…
…
continue reading

1
405 - The Boy Who Drank Too Much (1980)
3:08:22
3:08:22
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
3:08:22Yobo, other Tim and Brady join Bobby and Mike as the month of Yobo continues with the 1980's TV movie "classic" about a young Scott Baio with a drinking problem and his friend who wets the bed but might make it to the Olympics one day. Or is this the movie about Scott Baio getting drunk and hitting his brother off a row boat with an oar? Either way…
…
continue reading

1
One Request, One URL & One Bluetooth Hack – Three Shocking Takeovers
21:30
21:30
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
21:30How can attackers take over accounts, networks, and devices—without credentials? In this episode, we break down three real-world security flaws that prove authentication alone isn’t enough: Account Takeover – A single request bypassed email verification, locking out store owners. Internal Network Compromise – A hidden admin URL and hardcoded access…
…
continue reading

1
HN56 - Massive Bug Puts Outlook Users at Risk | Kimsuky gets RDPWrapper
27:03
27:03
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
27:03In today’s episode of Exploit Brokers, we dive deep into two major security threats making waves across the digital world. A critical Remote Code Execution (RCE) vulnerability in Microsoft Outlook is putting millions of users at risk, with hackers exploiting it through spear phishing emails and malicious links. Not only that, but we’re also uncover…
…
continue reading

1
HN55 - Double Zipping Danger: The 7-Zip Exploit That Could Hack Your PC
27:18
27:18
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
27:18Welcome back to Exploit Brokers! In today’s video, we dive deep into a critical 7‑Zip vulnerability that’s being exploited by Russian cybercriminals to bypass Windows’ security protections. If you’ve used 7‑Zip at all, you need to know how this flaw can let hackers sneak past the Mark-of-the-Web (MOTW) and deploy dangerous malware like Smoke Loader…
…
continue reading

1
404 - Seven (1979)
3:31:28
3:31:28
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
3:31:28Yobouary starts strong with the classic Andy Sidaris film, Seven! Starring Grindbin All Star William Smith, this is Sidaris at his best. This movie has literally everything you could want... and, unfortunately, offensive comedy routines...
…
continue reading

1
Chaining IDORs, CSRF Account Takeovers & Token Manipulation for Privilege Escalation
19:16
19:16
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
19:16What if you could take over an account—not by cracking a password, but by chaining two overlooked vulnerabilities? What if a single CSRF exploit let attackers reset security questions and hijack accounts? And what if manipulating an authorization token could escalate privileges? In this episode of Hacked & Secured: Pentest Exploits & Mitigations, w…
…
continue reading

1
Breaking OTP Security, Exploiting Static Domains & Privilege Escalation via Role Misconfigurations
19:12
19:12
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
19:12What if your OTP security wasn’t secure at all? What if a static domain—something most people ignore—could lead to full account takeover? And what if flawed role management allowed admins to escalate privileges? In this episode of Hacked & Secured: Pentest Exploits & Mitigations, we break down three real-world security failures that turned minor ov…
…
continue reading

1
HN54 - Cybersecurity Experts Reveal LAZARUS GROUP's Hidden Secrets
29:54
29:54
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
29:54Lazarus Group’s Secret Admin Layer EXPOSED – Major Cybersecurity Discovery! 🔥💻 Security researchers have uncovered a hidden admin layer used by North Korea’s Lazarus Group to manage their Command and Control (C2) servers. This sophisticated network of VPNs and proxies allows them to execute cyberattacks worldwide—mainly targeting cryptocurrency dev…
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Welcome to Hacked & Secured: Pentest Exploits & Mitigations—the podcast that breaks down real-world pentest findings and exposes critical security flaws before attackers do. 🔹 Red team tactics – How vulnerab…
…
continue reading

1
403 - Don't Go Near the Park (1979)
1:56:27
1:56:27
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
1:56:27Terry, Lee, Bobby, and Mike discuss a Patreon request from the producer of a classic Grindbin movie... Malibu High (1979)! A movie that is baffling, highly probalamtic, inept in every way, and something (most) of us absolutely loved.
…
continue reading

1
HN53 - AI’s Dirty Little Secret: Employees Leaking Data by Accident
24:46
24:46
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
24:46In this episode, we’re uncovering the darker side of Generative AI and the emerging threats lurking behind everyday tools like ChatGPT and Copilot. Learn how sensitive information—ranging from customer data to employee benefits—can be leaked simply by typing it into a Gen AI prompt. We’ll also expose how cybercriminals are escalating their tactics,…
…
continue reading

1
402 - Hammerhead Jones (1986)
2:59:29
2:59:29
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
2:59:29The guys discuss an incredible wrestling vanity project that surfaced online in the past few years. Starring Ted "Wolfman" Vernon, a man of many hats, including exotic car dealer, prizefighter, writer, producer, gun runner?!
…
continue reading

1
401 - The Banker (1989)
3:02:39
3:02:39
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
3:02:39Tanner, Greg, Bobby, and Mike discuss the Robert Forester "banking" film filled with tons of hot banking action. Cash those checks, keep those receipts, and hit up your ATM, the Banker is in town!
…
continue reading

1
HN52 - 800K Volkswagen EVs Hacked! Massive Data Breach & Mirai Botnet Attack Explained
21:55
21:55
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
21:55🔒🚗 Volkswagen’s Massive 800K EV Data Breach & Mirai Botnet Threats Explained | Exploit Brokers Welcome back to Exploit Brokers! In today’s episode, we dive deep into two major cybersecurity threats shaking the automotive and industrial sectors: Volkswagen’s 800,000 EV Data Breach Discover how a misconfigured Amazon cloud storage led to the exposure…
…
continue reading

1
HN51 - Chinese Hackers Breach U.S. Treasury AND 3M Fake GitHub Stars Exposed
23:16
23:16
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
23:16In this episode, we dive deep into two explosive cybersecurity stories making headlines right now: a major breach at the U.S. Treasury Department allegedly carried out by Chinese state-sponsored hackers, and the discovery of over 3.1 million fake stars on GitHub used to boost malicious repositories. We’ll explore how third-party vendor BeyondTrust …
…
continue reading

1
400 - School Spirit (1985)
3:19:17
3:19:17
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
3:19:17Bobby, Yobo, Wick, and Mike celebrate the 400th episode of the bin with a classic "Roger Please" movie that in no way holds up to modern standards. This episode has it all everyone: over 3 hours, soy sauce scholorships, rolling chair and dip bars, and a morning zoo radio show. Thanks for sticking with us everyone!…
…
continue reading

1
HN50 - IoT Webcams Hacked & 900k+ Health Records Exposed
25:36
25:36
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
25:36In this eye-opening episode, we uncover the disturbing reality of IoT webcam vulnerabilities and explore how hackers are leveraging outdated firmware and previously discovered but unpatched exploits to infiltrate personal devices. From prying eyes in your own home to the colossal health data breach exposing over 900,000 patient records, the digital…
…
continue reading

1
399 - Memorial Valley Massacre - CAMVEMBER 2024
3:18:08
3:18:08
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
3:18:08In true Grindbin fashion, Camvember 2024 finally comes to a close over half way through December... but with a real banger! Yobo, Matt, Bobby, and Mike pitch the tent, self-Nell, and drink some crotch warmed high lifes for an ill-fated camping trip. Memorial Valley Massacre is one of the most incohorent, logic defying, and intelligence insulting mo…
…
continue reading

1
HN49 - Fortnite Refund Update: Millions Refunded + Lazarus Group’s Crypto Hacks Revealed
23:15
23:15
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
23:15We’re diving into two major stories shaking up the gaming and cybersecurity worlds! First, we discuss the Fortnite Refund Update, where the FTC has forced Epic Games to refund millions due to their use of dark patterns. Find out if you’re eligible for a refund and how to claim it. Then, we shift gears to the Lazarus Group, North Korea’s infamous ha…
…
continue reading

1
HN48 - Hydra's Dark Web Empire CRUMBLES
21:26
21:26
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
21:26Uncover the fascinating yet chilling story of Hydra Market, the dark web’s largest illicit empire. Learn how this $1.35 billion platform operated, from smuggling narcotics and laundering money to offering hacking services. We’ll explore how its leader was sentenced to life in prison, the innovative (and illegal) technologies they used, and the glob…
…
continue reading

1
398 - Space Mutiny (1988) - CAMVEMBER 2024
2:36:30
2:36:30
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
2:36:30Fern, Artemis, Bobby, and Mike continue their deep dive into Cameron Mitchel films with another David Winter's "classic" Space Mutiny. Fake beards, directors quitting, space nepotism, this movie has it ALL!
…
continue reading

1
HN47 - Andrew Tate’s Platform Hacked by Activists + Russian Hackers Exploit Zero-Days
18:03
18:03
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
18:03Andrew Tate's platform, formerly known as Hustler’s University, has been hacked, exposing the data of over 800,000 users. Meanwhile, Russian hackers have exploited critical zero-day vulnerabilities in Firefox and Windows, demonstrating the growing sophistication of cyberattacks. In this video, we’ll break down the Andrew Tate hack, the implications…
…
continue reading

1
HN46 - Phobos’ $16M Haul & Helldown’s Secret Exploits – 2024’s Ransomware Crisis
27:53
27:53
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
27:53In this episode, we dive deep into the world of ransomware with two of 2024's most talked-about threats: Phobos and Helldown. Learn how the Phobos ransomware operation managed to dominate 11% of the market, generating $16 million in ransom payments, and the shocking details of its admin’s extradition to the U.S. We also explore the rise of Helldown…
…
continue reading

1
HN45 - Malware Madness: How Remcos RAT and Human Error Fuel Cyber Threats
33:15
33:15
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
33:15In today's episode, we dive deep into the fascinating yet troubling world of cybersecurity, exploring how even the most advanced antivirus software, firewalls, and endpoint security measures can fall short due to a single factor: human error. Despite the latest tech solutions, hackers continue to exploit one consistent vulnerability—users clicking …
…
continue reading

1
397 Codename Vengeance (1987) - CAMVEMBER 2024
2:39:16
2:39:16
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
2:39:16Wick, Lee, Vaughn, and Mike discuss an extremely unhinged Cameron Mitchell performance in a movie starring Grindbin legend, Robert Ginty. Directed by David Winters (Rage to Kill, Thrashin') Codename Vengeance is undoubtedly some sort of tax dodge scheme that nobody was actually intended to watch... yet here we are nearly 40 years later discussing i…
…
continue reading

1
HN44 - Malicious Crack Tools & Malvertising Attack: How Hackers Steal Your Data
22:42
22:42
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
22:42In today's episode, we’re diving into the hidden dangers of malicious installers, software cracks, and deceptive ads on Google. We'll explore recent stories, including the SteelFox malware that's hijacking Windows PCs, stealing credit card data, and mining cryptocurrency using vulnerable drivers. Plus, we’ll uncover a new wave of malvertising attac…
…
continue reading

1
396 - Screamers (1981) - CAMVEMBER 2024
2:23:53
2:23:53
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
2:23:53Camvember 2024 has arrived and the boys find themselves stranded on an island full of fishmen in some weird sex game. Tanner, Bobby, and Mike are joined by new guest Greg (Absolute Zeros: Camp Launchpad, Junior Braves of the Apocalypse) to talk about a very drunk Cameron Mitchell appearance that really isn't supposed to be in the movie.…
…
continue reading

1
HN43 - Dutch Police Take Down Major Information Stealers: Redline & Meta Stealer
10:45
10:45
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
10:45In a significant international operation, Dutch police and global law enforcement partners have taken down two major information stealers: Redline and Meta Stealer. These dangerous malware operations targeted thousands of victims worldwide, stealing passwords, sensitive data, and more. This video explores how law enforcement agencies worked togethe…
…
continue reading

1
395 - Night of the Demons (1988)
2:35:54
2:35:54
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
2:35:54Bobby, Yobo, and Mike find themselves trapped in an abandoned house for the annual Grindbin Halloween episode! Night of the Demons is your classic "people stuck in a house" movie where we wander around for 90 minutes and hope something fun might happen. Does it? Will Yobo be spread over an open fire?? Did anyone bring the Double D batteries?!…
…
continue reading

1
HN42 - Hackers Breach Internet Archive TWICE – How Safe is Your Data?
16:12
16:12
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
16:12The Internet Archive has been breached… AGAIN! 🛑 This time, hackers managed to compromise sensitive user data not once, but twice, exploiting stolen GitLab and Zendesk tokens. In this episode of Exploit Brokers, we break down what went wrong, why access tokens are crucial for cybersecurity, and how this breach could have been prevented. 🚨 We’ll div…
…
continue reading

1
394 - Southern Comfort (1981)
2:31:05
2:31:05
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
2:31:05Greg, Chris in Miami, Bobby, and Mike discuss the lesser-known Walter Hill film, lovingly referred to on the show as "Swamp Warriors". When a group of National Guardsmen get stuck in the swamps of Louisiana, they find themselves hunted by locals who really don't like outsiders. Featuring a cast of great charactor actors: Keith Carradine, Powers Boo…
…
continue reading

1
393 - The Boss (1973)
2:04:12
2:04:12
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
2:04:12The Patreon Poll winner for "Silva September" is here... in October! Vaughn, Chuck, Bobby, and Mike discuss the Fernando Di Leo crime drama in which Henry Silva plays our leading man (only not in his own voice). Does the Boss live up to the hype? Will we get a complete org chart of the mob before the movie is over? Did we find yet another Grindbin …
…
continue reading

1
HN41 - Chinese Hackers Hijack US Telecom Networks
15:46
15:46
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
15:46In this eye-opening episode of Exploit Brokers, your host Lauro dives deep into the recent cyberattacks that have compromised major U.S. telecommunications networks. Chinese state-sponsored hackers, known as Salt Typhoon, have exploited a 30-year-old backdoor mandated by U.S. law, targeting giants like AT&T, Lumen (formerly CenturyLink), and Verizo…
…
continue reading

1
392 - Thrilling Bloody Sword (1981)
2:55:29
2:55:29
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
2:55:29Wick, Brady, Bobby, and Mike discuss the Taiwanese re-imagining of Snow White. Only this time she is birthed from a space bean and restaurant Cyclops rule the streets.
…
continue reading

1
HN40 - Shocking Move: Kaspersky Uninstalls Itself and Installs Ultra AV Overnight!
13:13
13:13
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
13:13Imagine waking up to find that your trusted antivirus software has uninstalled itself and replaced itself with a completely different program—without your consent! 😱 In today's video, we dive deep into the shocking move by Kaspersky as it uninstalls itself and installs Ultra AV on users' computers. We'll explore why this happened, how users are rea…
…
continue reading

1
391 - On the Right Track (1981)
2:42:02
2:42:02
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
2:42:02Yobo, Molly, Bobby, and Mike FINALLY discuss the Gary Coleman "classic" about him living in a train station locker and betting on horses. Who was this made for? Why did they destroy an entire rain forest to build a train station Shakey's? And is Gary just actually a vampire? All these questions will be answered... and more!…
…
continue reading

1
HN39 - Apple's Shocking Decision: Dropping the Fight Against NSO Spyware
14:15
14:15
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
14:15In an unexpected turn of events, Apple has decided to drop its three-year-old lawsuit against the notorious spyware maker, NSO Group. What led to this shocking decision, and what does it mean for the future of cybersecurity and your personal data? 🤔 In today's video, we dive deep into the reasons behind Apple's surprising move. We'll explore how th…
…
continue reading

1
390 - Kiss the Girls and Make Them Die (1966)
2:23:55
2:23:55
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
2:23:55Faustus joins Bobby and Mike to talk about the Dino De Laurentiis "spoof" of James Bond films. CIA agent Kelly is stationed in Rio de Janeiro, covertly monitoring a wealthy industrialist, David Ardonian, who harbors a secret plan to sterilize the global population and repopulate the world himself, with captured women in clear cubes.…
…
continue reading

1
389 - Reform School Girls (1986)
2:43:40
2:43:40
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
2:43:40Tanner, Fern, Bobby, and Mike find themselves locked up with Grindbin All Star Tom DeSimone (Hell Night, Chatterbox, Angel III) in his "sendup" of women in prison movies. What promises to be a fun time ends up being one of the most angry, mean-spirited films we've seen in a long time. Tom, you doing ok buddy?…
…
continue reading

1
388 - Smokey and the Bandit Part 3 (1983) - Summer Sequel Month 2024
2:40:40
2:40:40
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
2:40:40Summer Sequel Month 2024 comes to the a dramatic close with the Patreon Poll winner, Smokey and the Bandit Part 3. Chuck, Bobby, and Mike discuss the movie that wouldn't die by forcing it's way into existence. Can a Bandit movie exist without the Bandit? Has Jerry Reed seen the first two films?? Did Jackie Gleeson put his mom in this movie?! IT'S A…
…
continue reading

1
HN38 - Is Your Tap-to-Pay Secure? The Latest Android Malware Warning
13:35
13:35
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
13:35Is Your Tap-to-Pay Secure? The Latest Android Malware Warning 🔒 In this episode of Exploit Brokers, we dive deep into a new Android malware that targets NFC technology to steal your banking information. 📱💳 If you use tap-to-pay or any NFC-based service, this is something you NEED to know. We’ll break down how this malware works, why it's so dangero…
…
continue reading

1
387 - Snake Eater II: The Drug Buster (1991) - Summer Sequel Month 2024
2:42:03
2:42:03
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
2:42:03Lee, Daniel, Bobby, and Mike are here to discuss the Lorenzo Lamas "classic" Snake Eater 2! Have any of us seen a Snake Eater before? Does this movie have anything to do with the first one? Do we end the episode fighting on a roof with wheelchairs?! All this... and more!
…
continue reading

1
HN37 - AI Manipulation: The Silent Threat to Democracy
16:32
16:32
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
16:32🚨 AI Propaganda Exposed: How It’s Influencing Elections Right Now! 🚨 In this episode of Exploit Brokers, we dive deep into the unsettling world of AI-driven misinformation campaigns. From targeting voters on both sides to spreading chaos across social media, AI is being weaponized in ways that sound like science fiction but are shockingly real. We’…
…
continue reading

1
HN36 - Fake Sites, Real Danger: The Trojan Malware in Extensions
15:08
15:08
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
15:08In this episode of Exploit Brokers, we dive into a significant new threat spreading across the web—Trojan malware hidden in malicious browser extensions. These sneaky extensions are distributed through fake download sites mimicking popular software like Roblox FPS Unlocker, YouTube, VLC, or KeePass. We’ll discuss how these Trojans operate, how they…
…
continue reading

1
386 - Penitentiary III - Summer Sequel Month 2024
2:58:21
2:58:21
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
2:58:21Yobo, Terry, Bobby, and Mike find themselves locked back up in the Penitentiary for one more fight (even though we said we would never fight again and it doesn't really make any sense for us to be locked up for a third time). Can Canon elevate the Penitentiary series to new heights? Can you eat an orange with the skin on? Will Yobo mention the comp…
…
continue reading

1
HN35 - Deceptive Admin Tool You Should NOT Install
17:22
17:22
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
17:22In this episode of Exploit Brokers, we're diving into a new and alarming trend in cybersecurity: Remote Access Trojans (RATs) targeting IT professionals. Discover how malware disguised as legitimate tools is being installed by unsuspecting IT teams, leading to severe breaches and ransomware attacks. We'll explore the tactics used by Hunter's Intern…
…
continue reading