Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
What is Cybersecurity? What are the available roles? How do you get started? What industry certifications should I pursue? Dr. Jeff Colburn has 30 years of experience in the Information Technology industry. For the past 11 years, he has been teaching his students how to start careers in this field within 6 months without a college degree and without any experience.
…
continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it’s not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they’re secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
The DailyCyber Podcast and New Live Stream every Wednesday at 1:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brando ...
…
continue reading
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address [email protected] to make comments, pose questions or even ask to be on ...
…
continue reading
Host Noel Bradford teams up with cybersecurity experts to deliver essential tech insights for UK small businesses and consumers. Cutting through jargon with wit and authority, each episode tackles real-world cyber threats, updates, and digital security challenges that actually matter to your business. From patch management to data protection, get actionable advice that doesn't require a computer science degree.Where cybersecurity meets practicality.
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals commit ...
…
continue reading
北欧に居住していた古代民族にとって、サウナストーンと呼ばれる石の熱と、石に水をかけて立ち上る蒸気は、人間の生命力として考えられていました。サウナは今日でも、健康のためだけではなく、人々の意見交換の場としても使用されています WithSecureの日本語ポッドキャスト『Cyber SecurityサウナJapan』は、社内外のセキュリティエキスパートをホスト/ゲストとして、様々なことが起こっているセキュリティ業界でのホットなトレンドやテクノロジーに関する情報、そしてインサイトをお届けしていきます。
…
continue reading
Bop
…
continue reading
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
…
continue reading
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
…
continue reading
The cyber security podcast from SE LABS ® - Understand cyber security and other security issues. Practical and insightful, our experts have experience in attacking and defending in the physical and digital worlds. Peek behind the curtain with Cyber Security DE:CODED.
…
continue reading
A weekly podcast with short (15min) interviews around Cyber Security and Cyber Hygiene in the world of IoT
…
continue reading
Tune in to the StationX Cyber Security Diaries for your dose of cyber security knowledge and career guidance. Whether you’re a seasoned professional or just starting out, our series provides valuable insights and inspiration to help you grow and excel in cyber security.
…
continue reading
Saving you valuable time by providing the "Too Long Didn't Read" summary of Cyber Security topics and news.
…
continue reading
Iam Talking about the Information Security & Hacking in upcoming episodes. Im a Cyber Security Trainer https://instagram.com/chaudharypawansohlot
…
continue reading
At Cyber Security Solutions, we specialize in providing a wide range of cybersecurity services designed to protect your digital assets and ensure the security of your online presence. We offer tailored solutions to meet the unique security needs of individuals and businesses alike.
…
continue reading
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
…
continue reading
This is a podcast about my journey into information security it will be full of things that I've learned over the years and also things that I have researched and find interesting and want to present to you the audience.
…
continue reading
Welcome to The Cyber Security AI Agents Show — your daily dose of everything shaping the future of cyber defense, automation, and intelligent security operations. Every day, we break down how Security AI Agents are transforming Cyber Defense.
…
continue reading
The cyber security podcast from PwC UK covers the latest developments in cyber risk, resilience and threat intelligence. In each episode we’re joined by special guests to give you practical insight on how to improve your cyber security and create a more resilient business.
…
continue reading
Selva Kumar is SAP Career Trainer specializing in SAP Career Coaching, identifying skills for getting a Job. You can reach me @ 302 494 9476 or Email: [email protected] Download Free SAP GRC Guide. http://expressgrc.com/sap-grc-10-1-step-step-guide/
…
continue reading
Cyber Security Course Arabic كيف ابدأ في مجال أمن المعلومات الأمن الإلكتروني كيفية شراء البيتكوين في المملكة العربية السعودية ببطاقة الائتمان أسرع طريقة في ثواني تذكر الاشتراك عبر هذا الرابط ، كي تحصل على خصم 10٪ من جميع رسوم شراء البيتكوين على بيانس https://www.binance.com/en/register?ref=F2IKGVD8 جزاكم الله خيرا
…
continue reading
Our regular podcast series features threat research and security news, hosted by threat researchers from the Threat Hunter Team.
…
continue reading
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. WithSecure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
…
continue reading
Cyber security focused discussions geared towards students, early professionals and individuals moving into the cyber security profession. I use my ~30 years' experience in industry and provide examples, stories, suggestions and answer questions. This podcast is designed to help listeners learn, grown and advance in the cyber security profession.
…
continue reading
Interested in staying safe online or a cyber security professional? Leading cyber security consultant and advisor, Beverley Roche talks to global experts, academics and researchers to provide insights on the issues impacting the cyber security profession and our connected life. If you're interested in updates on current professional practice or protecting your online experience against criminal or unauthorised access, this podcast will help you with tips to protect your online identity and data.
…
continue reading

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple
Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
…
continue reading
Welcome to the Cyber Security Happy Hour Podcast. This podcast is dedicated to discussing a variety of topics in all things Cyber Security.. Each episode features our host Christie Ogubere This is Cyber Security podcast - do not forget to protect your data in transit by using our affiliate link for Nordvpn. GET NORDVPN: https://go.nordvpn.net/aff_c?offer_id=288&aff_id=41574&url_id=11219 USE COUPON CODE: intexcyber USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free Website: https: ...
…
continue reading
National Cyber Security Radio gives the hottest topics in cyber security news and reveals all the Fake News by other experts. Topics include, hacker for hire murders, how to make money cyber security, should you get your college degree or certification in cyber security, plus over 20 over topics. Execute Produced by one of the world’s most known and respected Ex-hacker Gregory Evans (GregoryDEvans.com) listeners will not be disappointed.
…
continue reading
Control System Cyber Security Association International, or (CS)²AI, is the premier global non-profit workforce development organization supporting professionals of all levels charged with securing control systems. With over 34,000 members worldwide, we provide the platform for members to help members, foster meaningful peer-to-peer exchange, continue professional education, and directly support OT and ICS cyber security professional development in every way. Our founder, Derek Harp, intervi ...
…
continue reading
Just two people trying to do IT and Security the right way.
…
continue reading

1
CRECo.ai Roundtable: Technology, Marketing, Brokerage, Government Policy, Capital, Construction & Cyber Security in Real Estate with Andreas Senie
Andreas Senie
Your all in one comprehensive view of what is happening across the real estate industry -- straight from some of the industry's earliest technology adopters and foremost experts in Technology, Marketing, Government Policy, Brokerage, Capital, Construction & Cyber Security in Real Estate. The show is broken down into three parts: Part I: Introductions and what's new for each panelist and the business sector Part II: Sector Focus on the past month's most prominent news and paradigm shifts Part ...
…
continue reading
Today’s built environment we face ever increasing risk from cyber security. In this podcast we explore some of the challenges and or imports solutions Cover art photo provided by bharath g s on Unsplash: https://unsplash.com/@xen0m0rph
…
continue reading
Welcome to the new realities of cyber security podcast series, where we'll be looking at the key challenges and opportunities faced by businesses in the rapidly evolving area of cyber security. From digital crime scene forensics to GDPR, this series covers topical issues that matter.
…
continue reading
Arisen Technologies is the Best IT Company, which provides all IT services like Cyber Security, Web Designing, Development, etc. It’s founded in 2006.
…
continue reading
We believe in empowering security leaders to maximize their strengths, equip them with the skills needed for the top security job and inspire them to become the leaders that their organizations and teams require and deserve. In this podcast Jeff Snyder, Executive coach and Cybersecurity Recruiter since 1997, and Yaron Levi, CISO and Security Advisor will share their experiences and the lessons learned in order to empower others to become the best version of themselves. This is our way to giv ...
…
continue reading
Welcome to Resilience: Voices in Cyber Security. The cyber threat landscape constantly evolves, and attacker's capabilities are growing in variety, volume, and sophistication. This podcast will provide the latest strategies and trends to ensure cyber resilience. I’m Yonatan Lipschitz, Director of Client Leadership at a leading cyber security consulting and incident response company. In each episode, a thought leader in the cyber sector will join me, sharing their insights, thoughts, and expe ...
…
continue reading
This Cyber Security podcast is intended to help people better protect themselves from Cyber criminals by offering quick tips, hacking news summaries and interviews with industry professionals. USB our Guest is the cyber security podcast you have been looking for. Offering quick tips and attack overviews 5-10 minutes in length intended to help people better protect themselves from Cyber criminals and 1-2hr interviews with industry professionals. From 2FA to Zero-Days and everything in between ...
…
continue reading
Welcome to the Do we need better Cyber Security policies In Asian Countries - By Mario96 podcast, where amazing things happen.
…
continue reading
Cyber Security happens all over the world. This podcast is focused on Cyber Security from the Asian perspective. Listen to interviews, discussions, insights and get to the issues that matters most, affecting business from the cyber perspective around the region. The episodes on this podcast is shorter than your drive home!
…
continue reading
Cyber Sentinel is your go-to podcast for expert insights into cybersecurity, digital privacy, and cutting-edge tech—featuring voices from pioneering companies like https://menavpn1.com/ . Hosted by Alex Carter of ByteShield, each episode features in-depth conversations with developers, ethical hackers, and privacy advocates working on the front lines of digital defense. Whether you’re a tech enthusiast, policy wonk, or developer, Cyber Sentinel brings you the knowledge and perspectives you n ...
…
continue reading
Major npm compromise A number of high-profile npm libraries were compromised after developers fell for a phishing email. This compromise affected libraries with a total of hundreds of millions of downloads a week. https://bsky.app/profile/bad-at-computer.bsky.social/post/3lydioq5swk2y https://github.com/orgs/community/discussions/172738 https://git…
…
continue reading
New malware phishing campaign hidden in SVG files Anthropic agrees to pay $1.5bn in book piracy lawsuit Qantas penalizes executives for cyberattack Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC…
…
continue reading
Links to stories: https://securityaffairs.com/181430/security/after-sharepoint-attacks-microsoft-stops-sharing-poc-exploit-code-with-china.html https://www.cybersecuritydive.com/news/software-vulnerabilities-breaches-checkmarx-report/757793/ https://www.securityinfowatch.com/cybersecurity/article/55309774/even-security-leaders-are-breaking-ai-rules…
…
continue reading

1
SANS Stormcast Monday, September 8th, 2025: YARA to Debugger Offsets; SVG JavaScript Phishing; FreePBX Patches;
5:34
From YARA Offsets to Virtual Addresses Xavier explains how to convert offsets reported by YARA into offsets suitable for the use with debuggers. https://isc.sans.edu/diary/From%20YARA%20Offsets%20to%20Virtual%20Addresses/32262 Phishing via JavaScript in SVG Files Virustotal uncovered a Colombian phishing campaign that takes advantage of JavaScript …
…
continue reading
The central debate in Alberto Daniel Hill's case ⚖️revolves around the profound technical misunderstanding of cryptocurrency technology by the Uruguayan judicial and law enforcement authorities, leading to severe irregularities in the investigation and a fundamental misrepresentation of Mr. Hill's actions and seized assets.Do you support the police…
…
continue reading
Are you getting the interviews but not the job? Are you tired of the rejections? Are you becoming frustrated and ready to quit? Don't do it. If you are determined to launch a career in the IT industry, you have to be persistent and smart about your approach. In this episode, I share how to continue to become the strongest entry-level candidate and …
…
continue reading
Understanding AI security threats before they become your next crisis On this episode of Razorwire, I explore the emerging frontier of AI security with leading experts Jonathan Care and Martin Voelk. We examine the latest risks, show you how adversaries are exploiting AI systems and share practical advice for professionals working with these rapidl…
…
continue reading
As we enter the era of agentic AI, we must also address its risks. At Zenith Live 2025, we speak with Ed Henry, Zscaler, Senior Data Scientist and discuss agentic AI, its potential to streamline operations, and what are some of the key security challenges. #ZL2025 #zerotrustsecurity #mysecuritytv #zscaler…
…
continue reading
Global Threats, Deepfakes & Quantum Risk | DailyCyber 273 with Evgueni Erchov ~ Watch Now ~ In this episode of DailyCyber, I’m joined by Evgueni Erchov, Sr. Director of Research & Threat Intelligence at Cypfer. With more than 25 years of experience in IT security, forensics, blockchain, and cybercrime investigations, Evgueni shares his perspective …
…
continue reading
In this episode of the Cybersecurity America Podcast, sponsored by DarkStack7, host Joshua Nicholson sits down with Nia Luckey — Army veteran, published author, and cybersecurity leader — to talk about her powerful journey from military service to the frontlines of cyber defense. Nia shares lessons on resilience, leadership, and transitioning from …
…
continue reading
🚨 Episode 11: When Your Safety Net Becomes the Target Backup Security Under Fire + Business Email Compromise Reality Check Your backups aren't protecting you anymore—they're the primary target. In this explosive double-header episode, we expose why 94% of ransomware attacks now target backup systems first, and how Business Email Compromise enables …
…
continue reading
In this episode, Richard commences his look into infamous hacking group Scattered Spider.
…
continue reading
Alberto Daniel Hill's complex "Proof of Love" concept, originating from his traumatic experiences, particularly his imprisonment, and his relationship with Evelyn. This "proof" is described as a rigorous process, akin to blockchain's "proof of work," validated by shared adversity and emotional vulnerability rather than computational effort, with Ev…
…
continue reading
have spent a significant portion of my life living in the public domain, my personal story meticulously documented and repurposed. It has been transformed from a private ordeal into a public crusade, a narrative of survival that fuels my work and my advocacy.1 To the world, I am Alberto Daniel Hill—the cybersecurity expert, the public advocate, the…
…
continue reading
I explore my concept of "proof of love," contrasting it with the digital world's "proof of work". As Alberto Daniel Hill, a cybersecurity expert, I recount my personal story of being the first person in Uruguay imprisoned for a computer-related crime I did not commit. This ordeal has transformed my private suffering into a public crusade for digita…
…
continue reading

1
Week in Review: Baltimore’s expensive gaffe, ransomware takedown outcomes, Workiva Salesforce breach
27:47
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Ray Espinoza, vp of information security, Elite Technology Thanks to our show sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day …
…
continue reading

1
Satoshi's Bride: Reconstruction of a Lost Narrative The original complete manuscript of the story was "left on the system lost".
51:36
The book "The Indelible Mark: A Protocol for the Heart" was created through a unique collaboration between its author, Alberto Daniel Hill, and an artificial intelligence (AI). The creation process itself is deeply intertwined with the book's core themes.Here's a breakdown of how the book was created:• Reconstruction of a Lost Narrative The origina…
…
continue reading
The story of Anna, Satoshi, and Alberto Daniel Hill, titled "The Indelible Mark: A Protocol for the Heart," came into existence through a unique collaboration between its author, Alberto Daniel Hill, and an artificial intelligence. The creation process itself is deeply intertwined with the book's core themes, mirroring the very concepts that animat…
…
continue reading
France fines Google and Shein over cookie misconduct CISA adds more TP-Link routers flaws to its KEV catalog World’s largest sports piracy site shut down Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomwar…
…
continue reading

1
SANS Stormcast Friday, September 5th, 2025: Cloudflare Response to 1.1.1.1 Certificate; AI Modem Namespace Reuse; macOS Vulnerability Allowed Keychain Decryption
8:18
Unauthorized Issuance of Certificate for 1.1.1.1 Cloudflare published a blog post with more details regarding the bad 1.1.1.1 certificate that was issued by Fina. https://blog.cloudflare.com/unauthorized-issuance-of-certificates-for-1-1-1-1/ AI Model Namespace Reuse Deleted accounts on Huggingface can be taken over by other entities unrelated to th…
…
continue reading
The analysis of the "Casual Sunday" Twitter Space reveals a complex and dynamic conversational ecosystem that defies simple categorization. It is not merely a social chat, a political debate, or a shared entertainment stream, but a hybrid environment that fluidly integrates elements of all three. This space functions as a dynamic intersection of a …
…
continue reading
PREVIEW OF THE FIRST CHAPTER OF THE BOOK "Satoshi's bride" inspired on @satoshisbride @actjust "THE WEIRDEST @Tinder DATE EVER!" Here is a list of very short and funny quotes from the first chapter of "The Byzantine General's Problem with Love," which serves as the "Genesis Block" for "The Satoshi Variant: An Accidental Genesis Block":• For Valenti…
…
continue reading
Midnight Musings and Capitalist Critiques6 sources The provided transcript captures an extended, multi-participant audio conversation occurring in a social audio space. The discussion spans a wide array of topics, beginning with a segment where participants try to identify 1980s songs from brief intros. The conversation then transitions into discus…
…
continue reading

1
SANS Stormcast Thursday, September 4th, 2025: Dassault DELMIA Apriso Exploit Attempts; Android Updates; 1.1.1.1 Certificate Issued
6:22
Exploit Attempts for Dassault DELMIA Apriso. CVE-2025-5086 Our honeypots detected attacks against the manufacturing management system DELMIA Apriso. The deserialization vulnerability was patched in June and is one of a few critical vulnerabilities patched in recent months. https://isc.sans.edu/diary/Exploit%20Attempts%20for%20Dassault%20DELMIA%20Ap…
…
continue reading
Fintech foils bank heist NotDoor backdoor Salesloft-Drift impact continues drifting Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the at…
…
continue reading

1
Google: Gmail is secure, Cloudflare blocks largest DDoS attack, Amazon shutters theft campaign
6:55
'2.5 billion Gmail users at risk'? Entirely false, says Google Cloudflare blocks largest recorded DDoS attack peaking at 11.5 Tbps Jaguar Land Rover says cyberattack ‘severely disrupted’ production Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect bu…
…
continue reading

1
SANS Stormcast Wednesday, September 3rd, 2025: Sextortiion Analysis; Covert Channel DNS/ICMP; Azure AD Secret Theft; Official FreePBX Patches
5:29
A Quick Look at Sextortion at Scale Jan analyzed 1900 different sextortion messages using 205 different Bitcoin addresses to look at the success rate, lifetime, and other metrics defining these campaigns. https://isc.sans.edu/diary/A%20quick%20look%20at%20sextortion%20at%20scale%3A%201%2C900%20messages%20and%20205%20Bitcoin%20addresses%20spanning%2…
…
continue reading
When comparing the National Anthem of Uruguay with other anthems around the world, especially those born in the revolutionary fervor of the 19th century, its unique characteristics are revealed. Many anthems from that era are war songs or hymns to freedom, particularly in Latin America, where nations were emerging from anti-colonial struggles. Howe…
…
continue reading
LegalPwn technique hides LLMs prompts inside contract legalese Maryland Transit investigating cyberattack Hacker attempts to forge his way into Spanish university Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and …
…
continue reading

1
SANS Stormcast Tuesday, September 2nd, 2025: pdf-parser Patch; Salesloft Compromise; Velociraptor Abuse; NeuVector Default Password
5:39
pdf-parser: All Streams Didier released a new version of pdf-parser.py. This version fixes a problem with dumping all filtered streams. https://isc.sans.edu/diary/pdf-parser%3A%20All%20Streams/32248 Salesloft Drift Putting OAuth Tokens at Risk OAuth tokens used by Salesloft Drift users to provide access to integrations with Salesforce, Google Works…
…
continue reading
The provided texts offer an overview of current cybersecurity events and global threats, highlighting recent legislative efforts, significant cyberattacks, and broader industry challenges. Specifically, they discuss Nigeria's new Cybercrimes Act of 2025 aimed at combating digital offenses, and a major financial breach against the Iranian cryptocurr…
…
continue reading
Velociraptor forensic tool used for C2 tunneling City of Baltimore gets socially engineered to the tune of $1.5 million Ransomware gang takedowns create more smaller groups Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day at…
…
continue reading
This comprehensive analysis examines the evolving fight for justice in the digital age, drawing parallels between historical struggles against oppression and contemporary challenges posed by technology. It highlights Alberto Daniel Hill's case as a prime example of a "digital prisoner," an expert in cybersecurity unjustly incarcerated due to a tech…
…
continue reading

1
The Homeland or the Digital Tomb: Alberto Daniel Hill, the Political Prisoner and the National Anthem as a Manifesto for Justice in the Age of Surveillance.
6:01
The struggle for justice in the digital age is not a new phenomenon, but the continuation of a historic battle for freedom and human dignity against the changing forms of oppressive power. To understand the nature of this new conflict, it is necessary to draw a bridge between the struggles of the past and the challenges of the present. This report …
…
continue reading
A censorship case in Mexico related to a tweet by journalist Álvaro Delgado Gómez about the marriage of a Supreme Court candidate, Magda Zulema Mosri Gutiérrez, and her alleged link to a former prosecutor. "
…
continue reading
Reporte Especial: Censura Electoral y Libertad de Expresión en México – El Caso Delgado vs. INEAmigos y oyentes, el epicentro de nuestra discusión de hoy es un incidente que tuvo lugar en mayo de 2025 en México. El periodista Álvaro Delgado Gómez publicó un tuit el 24 de mayo de 2025, denunciando una orden del Instituto Nacional Electoral (INE) par…
…
continue reading
Alberto's poignant statement, "The judge and prosecutor hardly know what an IP address was," reveals a profound and dangerous disconnect. It shows a justice system operating in the dark, unable to comprehend the very world it is meant to govern. In his case, the battle wasn't against malice but against a staggering ignorance that turned his experti…
…
continue reading
Alberto Daniel Hill desafió la injusticia de múltiples maneras, transformando su experiencia personal de persecución en una plataforma para la reforma y la educación. Su lucha abarcó tanto la resistencia personal como la defensa activa de un sistema más justo y conocedor.Aquí se detalla cómo Hill desafió la injusticia:• Resistencia personal y legal…
…
continue reading
Las fuentes presentan discusiones con un hacker llamado Gob.eth y otros participantes con respecto al arresto y encarcelamiento de un asociado de 18 años, Vlady , en Uruguay. Gob.eth afirma que Vlady está acusado erróneamente de múltiples delitos de piratería informática, alegando que sus acciones fueron principalmente desfiguraciones de sitios web…
…
continue reading
This episode covers the The Watchman Privacy podcast, hosted by Gabriel Custodiet, focusing on its mission to help listeners understand and escape the "Technocracy". It examines Custodiet's background in cybersecurity and finance, which underpins the podcast's credibility and consistent editorial focus. A significant portion of the report details t…
…
continue reading
Los textos proporcionados ofrecen un examen multifacético del panorama de la ciberseguridad de Uruguay, destacando tanto sus ambiciones digitales como sus vulnerabilidades significativas. Una narrativa central se centra en Alberto Daniel Hill, un hacker ético que fue encarcelado injustamente, convirtiéndose en un ejemplo conmovedor de la desconexió…
…
continue reading
Alberto Daniel Hill introduces and reflects on a publication titled "My Life in Anonymous: An Atonement" by a former hacktivist known as Dexer. The discussion traces Dexer's decade-long journey from an observer to an active member of Anonymous, detailing his group's efforts to legitimize themselves in information security. It highlights the movemen…
…
continue reading
Los textos proporcionados describen el podcast Cyber Midnight Club, presentado por el experto uruguayo en ciberseguridad Alberto Daniel Hill, que explora temas como la piratería, el cibercrimen y la privacidad digital, a menudo con eventos del mundo real y su defensa de la justicia. Una parte significativa del contenido del podcast se centra en el …
…
continue reading
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Johna Till Johnson, CEO and founder, Nemertes Thanks to our show sponsor, Prophet Security Ever feel like your security team is stuck in a loop of alert fatigue and manual investigations? Meet Prophet Security. Their Agentic AI SOC Pl…
…
continue reading
This briefing synthesizes information from "Cyber Midnight Club: Mexico's Digital Underbelly" and "Héctor López & Alberto Daniel Hill: Cybersecurity Collaboration" with the podcast "Jacobo Grinberg, El PENTAGONO Y CHINA; Hacker EXPONE VERDADES — Héctor López." It provides a detailed overview of the key themes, prominent figures, and critical insigh…
…
continue reading