Avatar
Stoyko Stoykov
c3cf93f887425973f72d828f468b9a8947d06cbd9176fe8a81a361251ca0c776

🚨 Crypto24 uses custom RealBlindingEDR + Google Drive exfil before encrypting. EDR blind, SMB moves, VSS wipe. Defenders: tamper‑protection, app control, cloud‑egress watch. #CyberSec

Source: https://link.bitbase.bg/qEeM3X

⚡Patch Tuesday alert! Kerberos EoP flaw hits AD. Patch DCs first, block external AD ports, lock down fast. #PatchTuesday #CyberSec #Kerberos

Source: https://link.bitbase.bg/NEUfns

🚨 30k+ Exchange servers in hybrid mode still unpatched! If using Exchange 2016/2019, patch & rotate creds ASAP, switch to dedicated hybrid app. Risk tenant‑level. #CyberSec

Source: https://link.bitbase.bg/avKFgm

🚨 150+ malicious Firefox wallet extensions stole $1M+ crypto! GreedyBear weaponized Extension Hollowing: clean start → credential theft. Use hardware wallets. 🛡️ #CyberSec #Crypto

Source: https://link.bitbase.bg/qZHbSb

🚨 ShinyHunters leaked 39k Google Ads leads from hacked Salesforce. Fix: MFA, rotate API tokens, limit exports, monitor logins. #CyberSec #ZeroTrust 🚨

Source: https://link.bitbase.bg/M5oiiR

🚨 ShinyHunters hit Salesforce, spilling GoogleAds lead info (names, emails, phones). Token hygiene weak. Fix: MFA, rotate tokens, lock egress. Lead‑list phishing! #ZeroTrust #CyberSec

Source: https://link.bitbase.bg/M5oiiR

🚨 WinRAR phishing attack drops RomCom RAT via crafted ZIPs. Patch ASAP, scan archives, whitelist WinRAR startup folder. #ZeroDay #Phishing #CyberSecurity

Source: https://link.bitbase.bg/S96Bfy

⚠️ Hybrid Exchange still a soft‑spot. Attackers can silently elevate to tenant‑admin, bypass MFA & take over M365. Patch the update by Wed Aug 11, tighten OIDC, & monitor token fires. #CyberSec #ZeroTrust 🚨

Source: https://link.bitbase.bg/8OTPoq

It is a problem with Phoenix, soI had to switch to Wallet of Satoshi (which is not my favorite choice, but will have to wait until phoenix release a fix in the coming versions I hope)

Thank you for your information. I fixed the problem

SonicWall Gen7 zero-day reportedly bypasses MFA; 20+ orgs hit. Today: disable WAN mgmt, geofence VPN, audit admins/logs, rotate secrets, prep to patch fast. Assume probed. #infosec 🔥🛡️

Source: https://link.bitbase.bg/m1Hslw

CISA: SharePoint under active exploit. Patch now, lock uploads, watch w3wp→cmd/ps, and remove internet exposure. Assume probing today. Blue teams, move. 🛡️⚡️ #infosec #BlueTeam #SharePoint

Source: https://link.bitbase.bg/AAt3Q3

Ransomware crews are mass-exploiting on-prem SharePoint. Patch now, lock down service accounts, monitor w3wp→PowerShell, and hunt webshells in IIS dirs. Assume breach. #BlueTeam 🛡️ #Infosec

Source: https://link.bitbase.bg/VpGPSR

Stealth Falcon abused a Windows WebDAV URI bug since March for click-to-RCE on patched hosts. Mitigate: disable WebClient, lock handlers, watch DAV + LOLBins. Patch now. 🚨 #infosec #DFIR

Source: https://bitbase.bg

2025's ransomware landscape: Fake browser updates 🌐 are the new normal. Remember, your instincts *are* your firewall. #Ransomware2025 #SmartScreenSafety #UpdateVerify #CyberSecuritySuperpower 🔍💻🔒☁️

🚨 2025 DDoS attacks hitting 100M+ rps! 💥 MPLS cores and scrubs are crumbling.🌪️ Traditional defenses? Falling short. AI is our only hope. 🤖 What's your strategy? #CyberResilience #DNS #DDoS #Infosec #AIDefense #2025CyberWar

🚨 URGENT ALERT! 🚨 Nation-state hackers are exploiting an actively SharePoint zero-day flaw. If you haven't patched yet, do it IMMEDIATELY! Time is of the essence - avoid being the next target. #ZeroDay #CyberSecurity #ThreatIntel #PatchNow

🚨 Midnight struck on 6/30/2025, and 155 orgs fell to ransomware. Enterprise software under siege. #CyberArmageddon isn't a movie, it's our reality. Time to fortify, folks. Share your top defense strategies below. 🛡️ #RansomwareWar2025 #InfoSec

🚨 #LockBit still wreaking havoc in 2025! Latest attack on tech hubs proves passive monitoring isn't enough. 🔒 Proactive defense + swift response is key.

🔍 Are you ready? Share your strategy! #CyberSecurity #Ransomware #DefendLike2025 💻🛡️

🚨 Alert! 🚨 Russian hackers exploit a critical zero-day flaw in a widely used VPN. 🕵️‍♂️💥 This is a game-changer for remote work security. 🔐 Update & patch immediately! 🚨 #CyberSecurity #VPN #ZeroDay #Infosec #PatchNow

Butterfly effect in #infosec: a tiny #GitHub oversight in 2025? Meet #CryptoRabbit's global ransomware hunt! 🦋🔒 Devs, your Easter egg check now could save millions later. #CyberSecurity #Malware #SupplyChain #CodeSecurity

AI-powered deepfake phishing attacks surge in Q3 2025. 🤖🎭 Security teams report 300% increase in mimicry-based breaches. Monitor voice & video comms! #CyberSecurity #Deepfake #AIThreats 🚨

Fresh findings show AI-powered DDoS attacks increasing by 300% this year. Offensive actors leverage AI to optimize attack vectors & evade detection. How are YOU preparing your blue team for this new reality? #DDoS #AICyberThreats #NetSec

🎯 Fortinet, Palo Alto Networks, and Cisco - Critical Cybersecurity Flaws and Urgent Patches 🚨

https://youtu.be/pPJPTo2v-iA

🔒 Hey everyone! In this episode, we're tackling some alarming cybersecurity news 🚨 impacting major names like Fortinet, Palo Alto Networks, and Cisco.

🚨 Massive Microsoft Security Patch! 118 Vulnerabilities Fixed – Are You Safe? 🔐

youtu.be/w3O_zQST6gM

Microsoft just released a HUGE security update patching 118 vulnerabilities! 😱 In this episode, we break down what you need to know, including two active zero-day exploits.

🔒 LockBit Ransomware Crackdown! 🌍 Uncovering the Ties to Evil Corp 💻

https://youtu.be/RrhkwV0Q4Po

⚡Unmasking HTML smuggling

https://youtu.be/2MJQpTe9Ddo

🎙️ Welcome to Exploit Pulse, the go-to podcast for cybersecurity enthusiasts, IT pros, and anyone curious about the dark side of the digital world.

Each episode, we dive deep into the latest cyber threats, unravel advanced attack techniques, and decode real-world hacking campaigns.

From phishing schemes like HTML smuggling 🕵️‍♂️ to sophisticated malware attacks, we break down how these tactics work—and more importantly, how you can protect yourself.

🔐 Stay one step ahead in the cat-and-mouse game of cybersecurity. Subscribe to get insider knowledge, actionable tips, and the pulse of the ever-evolving digital battlefield.

💡 Whether you're a seasoned hacker or just starting out, there's something for everyone. New episodes drop every week—stay informed, stay secure!

🚀 Support the channel and get exclusive content by joining my Patreon: https://patreon.com/StoykoStoykov

#cybersecurity #ExploitPulse #PhishingThreats #HTMLSmuggling #hackingtechniques #digitalsecurity #cyberthreats #infosec #malware #cyberawareness #staysecure #techpodcasts #cybernews #digitaldefense #DataProtection

🔐 AI Hacking Unveiled: The Real Threat Behind the Hype 🤖

https://youtu.be/H-KH5_r1GSo

In this episode, we’re cutting through the Hollywood-style hype about AI and cybersecurity and diving into the real world of AI-powered hacking. Forget killer robots – the true power of AI lies in its subtlety and effectiveness. Joining us is cybersecurity legend Omar Santos, who has authored 27 books and brings us mind-blowing insights into how AI is reshaping offensive security. From automated reconnaissance to AI-crafted exploits, this episode reveals how AI is already weaponized and the massive risks it poses to our digital landscape. 😱

We explore how AI is vectorizing information, conducting reconnaissance on autopilot, and even making it easier for attackers without a technical background to exploit vulnerabilities. The rise of AI isn't just affecting attacks—it's changing the way we build secure systems from the ground up. As Omar puts it, AI has become both our greatest weapon and our biggest challenge in cybersecurity. 💻⚔️

Tune in to learn how we can flip the script—using AI for proactive defense, threat intelligence, and even anticipating attacks before they happen. Are we ready for this paradigm shift? Or are we already too late? 🔍

🔔 If you find this content interesting, don’t forget to like, subscribe, and hit the notification bell to stay updated on the latest cybersecurity insights!

🚀 Support the channel and get exclusive content by joining my Patreon: https://patreon.com/StoykoStoykov

#Cybersecurity #AIHacking #AIThreats #TechFuture

The RAMBO Attack: When Your RAM Turns into a Spy 🎧

https://youtu.be/_NcvR8FLfF0

Ever thought your computer's RAM could be used as a listening device? 🤯

In this episode, we explore the wild world of the RAMBO attack, a vulnerability targeting even the most secure, air-gapped systems.

Inspired by a jaw-dropping video from our favorite tech channel, we dive into the genius behind Dr. Mordechai Guri’s research and how electromagnetic ripples from your RAM could be stealing sensitive data.

From bypassing CPU caches to intercepting cryptographic keys, this deep dive will leave you rethinking your digital security.

Stay tuned for mind-blowing insights and defenses against this cutting-edge threat! 🔐

💥 Zero Click Threat Unveiling the CVE 2024 2017 Wi Fi Vulnerability

https://youtu.be/6kx1RX1LxLk

In this episode, we unravel the chilling reality of the zero-click CVE-2024-2017 vulnerability targeting MediaTek Wi-Fi chips.

Join us as we break down how this buffer overflow exploit could silently compromise your devices—without a single click.

From routers to smart appliances, no gadget is safe. Learn how hackers manipulate network services like wappd, turning your tech against you, and what you can do to protect your digital world.

We’ll dive into real-world examples, discuss the ripple effects, and explore the evolving challenge of cybersecurity in an ever-more-connected world.

🐟 Phishing Attempt via GitHub Email Notifications: How to Stay Protected 🛡️

https://youtu.be/AyECztPbubU

In this episode, we dive into a real-world case of a phishing attack that exploited GitHub's email notification system.

We'll explore how a malicious user sent a deceptive email from GitHub’s legitimate address, tricking recipients into visiting a phishing site to gain unauthorized access to their repositories.

The episode covers key elements of the attack, how it was detected, and steps taken to report the issue to GitHub.

Additionally, we’ll share tips on how to safeguard your account from similar threats 🚨 and how the community can stay vigilant against these evolving tactics.

🎙️ AI & Cybersecurity: Revolutionizing Safety 🚨

https://youtu.be/rnufcGAcJXU

In this episode, we dive deep into the world of AI and how it’s transforming cybersecurity.

From spotting threats at lightning speed to adaptive defenses against cyberattacks, AI is reshaping the digital landscape.

But with this power comes challenges—privacy concerns, ethical usage, and the race to stay ahead of cybercriminals.

We explore how AI is more than just a tool; it’s proactive, continuously learning, and evolving to keep us safe online.

Join us as we unpack the double-edged sword of AI in security, discuss the future of passwords, and ask the big questions about privacy, trust, and responsibility.

Tune in for an engaging discussion on the tech that’s safeguarding our digital lives—and how we can ensure it’s used for good. 💡

Stay curious, stay safe!

⚠️ Critical Vulnerability in Ivanti CSA: CVE-2024-8963 Explained 🔓

https://youtu.be/x4DNB_eN8h4

This episode covers the critical CVE-2024-8963 vulnerability found in Ivanti Cloud Service Appliance (CSA) that has been actively exploited in recent cyberattacks. With a CVSS score of 9.4, this vulnerability allows unauthorized attackers to execute arbitrary commands on the affected appliance. We’ll discuss how the issue was "accidentally resolved" in recent patches, the risks posed to affected users, and the warning issued by Ivanti and the U.S. Cybersecurity and Infrastructure Security Agency (CISA). Tune in to learn more about the urgency of updating to CSA version 5.0 and how organizations can mitigate the threat before the October 2024 deadline.

В това видео ще ви покажа как се прави Command Injection и Crossite Scription. Също така ще видим и как се анализира входящ и изходящ трафик

Ще преминем през две задачи за намиране на различни флагове.

Първа задача: - Command Injection и Reflected Crossite Scription

Втора задача: - Анализиране на входящ и изходящ трафик

https://youtu.be/ASln2vHvC_8

#pentesting #capturetheflag #ethicalhacking #networksecurity #hacker

В това видео ще ви покажа как да използвате Burpsuit Intruder, Hydra, Hashcat и Hashid за хакване на акаунти и осъществяване на достъп до отдалечени системи.

Ще разгледаме как да използвате тези мощни приложения в практически ситуации.

https://youtu.be/5nac-ZQULeQ

#pentesting #capturetheflag #ethicalhacking #networksecurity #burpsuit #hashcat #hydra #hacking

В това видео ще ви покажа как да използвате Arpspoof, Wireshark и Proxychains за мрежово снифиране и хакване.

Ще разгледаме как да използвате тези мощни приложения в практически ситуации.

https://youtu.be/RABWH6t1iDs

#pentesting #arpspoof #proxychains #wireshark #ethicalhacking

В това видео ще ви покажа как стъпка по стъпка как да решите предизвикателството Capture the Flag (CTF) в In N Out.

Ще се потопим в света на проникващите тестове и сигурността на мрежите и ще ви покажа необходимите стъпки и техники, за да успеете в този CTF.

https://youtu.be/kHe2OHOai2s

#cybersecurity #hacking #pentesting #capturetheflag #ethicalhacking #networksecurity

В това видео ще ви покажа как стъпка по стъпка как да решите предизвикателството Capture the Flag (CTF) в The Defense Rest.

Ще ви покажа необходимите стъпки и техники, за да успеете в този #CTF

https://youtu.be/RtNxTK2oCCk

#cybersecurity #hacking #pentesting #capturetheflag #ethicalhacking

В това видео ще ви покажа как стъпка по стъпка да откриете флага в Spray Paint .

Ще ви покажа необходимите стъпки и техники, за да успеете в този #CTF

https://youtu.be/iDS7D0XLv8Q

Моля, харесайте и се абонирайте ако ви харесва.

#cybersecuritytraining #hacking #cybersecuritytips #ethicalhacking #networksecurity