HN 12 - The Dark Side of Hacking: Russian Hackers' Infrastructural Shift and Google AI's Fuzzing

HN 12 - The Dark Side of Hacking: Russian Hackers' Infrastructural Shift and Google AI's Fuzzing

Author: Cipherceval August 24, 2023 Duration: 14:46

In the Dark Side of Hacking, we take a look at how Russian Hackers have shifted their focus to attacking infrastructure rather than individuals after being identified and putting victims through panic.

Google AI launches a new bug hunting strategy called Fuzzing, which uses a machine learning algorithm to search for flaws in software. Fuzzing is a more targeted approach to bug hunting that can be used to find vulnerabilities before they are exploited.

 

Article: https://exploitbrokers.com/hacking-news/hn-12-the-dark-side-of-hacking-russian-hackers-infrastructural-shift-and-google-ais-fuzzing/

 

 

🔍 Minecraft's BleedingPipe Vulnerability: Breaking down the dangerous vulnerability found in popular mods and how to protect your server. Details here ➡️ Sources: https://www.bleepingcomputer.com/news/security/hackers-exploit-bleedingpipe-rce-to-target-minecraft-servers-players/

MMPA: https://blog.mmpa.info/posts/bleeding-pipe/

🕵️ BlueCharlie's Evasive Moves: Dive deep into how this Russian APT actor shifts tactics and what this means for cybersecurity

➡️ Source: https://www.darkreading.com/attacks-breaches/russian-apt-bluecharlie-swaps-infrastructure-to-evade-detection Blue Charlie Higher Up: https://www.nisos.com/blog/coldriver-group-report/ Infrastructure switch up: https://www.recordedfuture.com/bluecharlie-previously-tracked-as-tag-53-continues-to-deploy-new-infrastructure-in-2023

 

🤖 Google's AI Bug Hunter: Learn how Google is utilizing AI to push the boundaries of vulnerability discovery ' ➡️ Source https://security.googleblog.com/2023/08/ai-powered-fuzzing-breaking-bug-hunting.html

 

🍎 New Mac Malware Alert: Unmasking the new variant of XLoader hiding in a productivity app

➡️ Source https://thehackernews.com/2023/08/new-variant-of-xloader-macos-malware.html

 

🔔 If you enjoyed this episode of Exploit Brokers, consider subscribing  to get notified of our latest updates! Share with others to raise awareness! #Minecraft #BleedingPipe #BlueCharlie #APT #GoogleAI #Cybersecurity #MacMalware #XLoader #ExploitBrokers #hackingnews #googleai #russianhacking


Ever wonder how a hacker actually thinks when they're picking a digital lock? That's the kind of curiosity that drives Exploit Brokers By Forgebound Research. Hosted by Cipherceval, this isn't just a rundown of the week's scary headlines. Instead, it's a deep, analytical dive into the mechanics behind major cyber events. Each episode takes apart real-world incidents-from sprawling data breaches and clever malware to massive botnet takedowns-and walks through the how and why. The goal is practical: by understanding the tools and tactics used in an attack, we can all build smarter defenses. You'll find a mix of sharp commentary on breaking tech news and clear, insightful tutorials that demystify complex security concepts. Tune in for a perspective that goes beyond surface-level reporting, offering a genuine look into the mindset of both attackers and defenders. This podcast serves as a valuable resource for anyone from IT professionals to simply tech-curious listeners who want to move past fear and into comprehension.
Author: Language: en-us Episodes: 62

Exploit Brokers By Forgebound Research - Tech and Hacking News Commentary
Podcast Episodes
I'm Back and Introducing Forgebound Research | The Rebrand [not-audio_url] [/not-audio_url]

Duration: 8:53
Exploit Brokers is back—under a new banner. In this episode, I explain why the show went quiet, what Forgebound Research means, and how the podcast is evolving. We're shifting to a hybrid model: some episodes will be new…
HN58 - Havoc in the Cloud: The Shocking Click Fix Exploit Revealed [not-audio_url] [/not-audio_url]

Duration: 24:22
Welcome to Exploit Brokers with your host Cipherceval! In this deep dive, we uncover a sophisticated cyber assault where hackers exploited Microsoft SharePoint to launch the Havoc C2 via a stealthy click fix attack. Lear…