Since 2015
…
  continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
  continue reading
Apresentado por Paulo Vasconcellos, Monique Femme e Gabriel Lages, o Data Hackers é o podcast oficial do maior ecossistema de dados e inteligência artificial do Brasil. Toda semana, recebemos líderes e especialistas para explorar as tendências, inovações e desafios que estão moldando o futuro da área de dados, da Inteligência Artificial (AI) e de Tecnologia. O Data Hackers é o seu radar para entender como a tecnologia está transformando carreiras, negócios e a sociedade. 🔗 Conheça mais em: w ...
…
  continue reading
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
…
  continue reading
Growth (anteriormente En.Digital) es el podcast de negocios digitales de Product Hackers. Cada semana, entrevistas con los principales referentes de los negocios digitales y startups que más crecen. En este podcast aprenderás las claves reales del crecimiento de los negocios digitales, de la mano de sus fundadores o responsables de crecimiento. Presentado con muchísimo cariño por José Carlos Cortizo (Corti).
…
  continue reading
The HackerSploit podcast is aimed at educating anyone interested in Infosec, Hacking or Cybersecurity.
…
  continue reading
Tu noticiero de ciberseguridad hecho podcast. La mejor manera de estar al día en temas de hacking, ciberamenazas y privacidad en Internet. Desgranamos las últimas noticias más relevantes para hacerlas accesibles a todos los públicos. Actualidad y divulgación a cargo de Martín Vigo y Alexis Porros. Suscríbete y escúchanos cualquier plataforma de podcasts. 🎙️ Apple Podcasts: apple.co/3bMSuSE 🎙️ Spotify: spoti.fi/2VB7tIM 🎙️ iVoox: bit.ly/2RHkC1E 🎙️ Google Podcasts: bit.ly/2QTDZqT Síguenos en Re ...
…
  continue reading
Neste podcast iremos conversar com diversos hackers para entender como o mundo do hacking funciona.
…
  continue reading
What are hackers? Cover art photo provided by Andrew Ridley on Unsplash: https://unsplash.com/@aridley88
…
  continue reading
Hacked
…
  continue reading
A podcast dedicated to teaching you how to protect yourself online. dontclickonthat.com
…
  continue reading
1
Culture Hackers
Robbe Richman and a cast of hackers, troublemakers, movers and shakers, Robbe Richman
A show all about culture hacking - at companies, in business and the world. The first episodes are the free audio book of Robert Richman's "Culture Blueprint."
…
  continue reading
Productivity Hackers (PH) is a podcast all about becoming more productive and successful
…
  continue reading
Two Friends Figuring Out The Balance Between Contentment and Self-Improvement
…
  continue reading
…
  continue reading
English Assessments
…
  continue reading
…
  continue reading
El podcast esencial para emprendedores, managers y directivos que buscan liderar la transformación digital. Analizamos las últimas tendencias y casos de éxito en salud, retail, banca, finanzas y entretenimiento. Aprende cómo innovar y mantenerte a la vanguardia en tu industria. Presentado por 4Geeks.
…
  continue reading
Everyday society depends more on electronics, social media etc, and by doing so they expose their private data to the public eye. Each Saturday, join Hackers Con Calle is a group of Cyber Security professionals dedicated to inform the audience of current trends and a how to protect the digital life.
…
  continue reading
Información sobre las células madre Cover art photo provided by Adam Frazier on Unsplash: https://unsplash.com/@galaxiez9
…
  continue reading
Health Hackers Point is your go-to podcast for unlocking smarter, science-backed ways to improve your body, mind, and lifestyle. Each episode dives into practical health tips, fitness strategies, nutrition advice, and mental wellness hacks that fit into your busy life. Whether you want to boost energy, build sustainable habits, or explore the latest breakthroughs in wellness, Health Hackers brings you expert insights and real-world solutions. Tune in weekly to learn how small changes can lea ...
…
  continue reading
1
Hackers Ouverts - Radio C-Lab
selon les dispos de chacun: Johanna, Morgan, Flavien Merwan, Olivier & Romain
L'émission qui décode !
…
  continue reading
Podcast de conversaciones reales entre emprendedores, empresarios y expertas sobre negocios, emprendimiento Marketing y tecnología. Para fortalecer nuestros negocios y llevarlos al siguiente nivel.
…
  continue reading
I'm Chris (REal0day) Magistrado, hacker who interviews hackers, entrepreneurs, community builders, and investors. https://HackersToFounders.com
…
  continue reading
Each episode our panel of International Map Hackers will dissect a buzzword from the world of GIS. We’ll give you concrete definitions, practical applications, and share where we hope the technology can go from here.
…
  continue reading
Ben Orenstein and Adam Wathan on surviving the transition from dev to founder.
…
  continue reading
O projecto local dos Legal Hackers em Lisboa. Um podcast sobre Direito e Tecnologia.
…
  continue reading
Podcast by BIZ HACKERS PODCAST
…
  continue reading
Stories of people hacking on weird and interesting projects.
…
  continue reading
A place where Human and Online collide... The Human Hackers podcast is all about you. It's about exploring the trials and tribulations of you as an entrepreneur, seeking success in a world of rapid change and competing interests. It is also raw and real. Phil and Ian relentlessly pursue solutions and ideas to overcome the most common Human and Online challenges. Letting it all go, they unleash their own vulnerabilities and challenges. As the Human Hackers podcast unfolds it's easy to get los ...
…
  continue reading
I'm going to share tricks and methods about Facebook advertising and on how to leverage the power of social media to make more sales and acquire more leads.
…
  continue reading
Get better every day with the Muslim Life Hackers Podcast. Actionable insights to help you win in this life and the next. muslimlifehackers.substack.com
…
  continue reading
🔥 This show is tailored for all of you guys that OWN AN ONLINE BUSINESS. I’m going to talk about the basics of growth hacking and work all the way up to complex strategies. I’ll also share some golden nuggets of information that I think will make you guys smarter! 🤓
…
  continue reading
Gabriella Coleman, a digital anthropologist most famous for her work with the Hacktivist collective Anonymous, interviews the most influential actors in each era of the evolution of hacking culture from the 1970s to the present day, unveiling how they have moulded the digital world, pop culture and global politics.
…
  continue reading
A podcast dedicated to the community that is building and using new digital tools for creation. We’re looking at the current palette of artmaking tools online, and taking a critical eye to the history of technology and the internet. We’re interested in where we’ve been and speculative ideas on the future.
…
  continue reading
Courtland and Channing Allen interview the ambitious indie hackers who are turning their ideas and side projects into profitable online businesses. Explore the latest strategies and tools founders are using to capitalize on new opportunities, escape the 9-to-5 grind, and create their own personal revenue-generating machines. The future is indie!
…
  continue reading
1
Success Hackers |  Empowering Entrepreneurs to Play Bigger in Business and Life
Scott Hansen brings you interviews from some of the most influential Entre
Success Hackers was created to inspire entrepreneurs to reach new heights in their business. If you're looking for strategies, success "hacks", and new ways to double, triple or 10x your business, Success Hackers is the podcast for you. Scott Hansen takes you inside the minds of some of the most talented and successful entrepreneurs who are impacting the world with their message. HACKER NATION!!
…
  continue reading
So the big question is this: how are parents like us who didn’t cheat on the FAFSA and who most of us have kids that finished high school as an average student, how are we packaging our kids, researching and selecting schools, and negotiating with colleges to get 50 to 80% off the listed cost of attendance? That was the question and this podcast will give you the answers. My name is Kelly O'Connor and welcome to #collegehackers.
…
  continue reading
Tune in for actionable insights on business growth, personal development, and expert tips on marketing and advertising. Growth Hackers Radio dives into strategies, hacks, and the latest trends, helping listeners enhance their skills, scale their ventures, and drive meaningful growth. Perfect for entrepreneurs, marketers, and anyone seeking practical advice to boost performance, this radio show is your go-to source for unlocking potential and reaching new heights in both business and personal ...
…
  continue reading
A podcast about cult hacking! Cracking the cult code to understand what they are, how they work, how people leave and how to make sense of the world after leaving. Father and daughter team, media graduate Celine, and former cult member now organizational psychologist Stephen, explore how cults work, why they are so dangerous and the experience of leaving and making sense of the world. They speak to cult hackers from all over the world, from ex members to academics, from writers to filmmakers ...
…
  continue reading
A short and to the point podcast about hacking and cyber security. A weekly podcast that give you best information and knowledge about cyber security. And helps you to save your time. Support this podcast: https://podcasters.spotify.com/pod/show/hacker-life/support
…
  continue reading
My name is Som Bathla. I’m an Amazon #1 Bestselling Author of 20+ self-improvement books. I’m passionate about personal development and love to help people find their true potential so they can perform to their best and achieve their dreams faster. I’m on a mission to help 10,000 people become authors, so that they could spread their message and boost their brand and impact globally. My core intention is to help people tap into their inner potential and become the best version of themselves.
…
  continue reading
Welcome to "The Traffic Hackers" podcast, your go-to resource for mastering the art of lead generation and demand generation. Each episode is packed with insights and strategies to help companies and entrepreneurs skyrocket their business growth. We delve deep into the secrets of increasing sales and revenue, transforming the way you attract and nurture leads. Join us as we explore innovative methods to increase lead sources and reveal the tools and tactics for automating your lead generatio ...
…
  continue reading
This podcast is for anyone wanting more… More time & energy. More fulfilment and success. More of the high-performing, purposeful, all-out version of life they know they could and should be living. The method is simple… to give you the proven strategies to live, feel & function at your best, by sharing personal strategies to optimising success on a daily basis, and intimately exploring the lives & minds of the world’s leading Sports Stars, CEOs, Special Forces Operatives & Performance Expert ...
…
  continue reading
Episode #350 11.02.2025 Second time is the charmעל ידי Hackers Podcast
…
  continue reading
1
Crypto24 Ransomware: Stealth Attacks Blending Legitimate Tools
8:10
8:10
 
נגן מאוחר יותר
 
נגן מאוחר יותר
 
רשימות
 
לייק
 
אהבתי
8:10These sources provide a detailed comparative analysis of two significant ransomware threats: Crypto24 and LockBit. The first source offers a side-by-side comparison, establishing that LockBit operates as a massive Ransomware-as-a-Service (RaaS) model with highly variable tactics due to its use of affiliates, while the newer Crypto24 is characterize…
…
  continue reading
1
#69 Why He Left a Safe Job to Hack Companies for a Living ft. Jim Schultz
33:13
33:13
 
נגן מאוחר יותר
 
נגן מאוחר יותר
 
רשימות
 
לייק
 
אהבתי
33:13In this episode of The Hacker’s Cache, Kyser Clark sits down with Jim Schultz, an OSCP-certified penetration tester, cybersecurity instructor, and consultant with over 15 years of experience. Jim shares his journey from taking apart his first family computer in the 90s to teaching hundreds of students and returning full-time to the world of ethical…
…
  continue reading
1
Top 50 de marcas de moda en LLMs: Zara, H&M y el nuevo poder de las menciones en IA
27:39
27:39
 
נגן מאוחר יותר
 
נגן מאוחר יותר
 
רשימות
 
לייק
 
אהבתי
27:39La forma en la que descubrimos marcas está cambiando radicalmente. Ya no buscamos en Google, ahora pedimos respuestas a la IA. ¿Y qué marcas son las más visibles en este nuevo paradigma? 📄 Lee el informe completo aquí: https://producthackers.com/es/recursos/informe-moda-ia-top-50-marcas-llms-buscadores-inteligentes/ En este episodio, Corti comparte…
…
  continue reading
1
WhatsApp vai parar de funcionar em alguns modelos; A guerra dos navegadores voltou e agora com IA - Data Hackers News #96
9:27
9:27
 
נגן מאוחר יותר
 
נגן מאוחר יותר
 
רשימות
 
לייק
 
אהבתי
9:27Está no ar, o Data Hackers News !! Os assuntos mais quentes da semana, com as principais notícias da área de Dados, IA e Tecnologia, que você também encontra na nossa Newsletter semanal, agora no Podcast do Data Hackers !! Aperte o play e ouça agora, o Data Hackers News dessa semana! Para saber tudo sobre o que está acontecendo na área de dados, se…
…
  continue reading
1
138. Indirect Prompt Injection
1:05:30
1:05:30
 
נגן מאוחר יותר
 
נגן מאוחר יותר
 
רשימות
 
לייק
 
אהבתי
1:05:30
…
  continue reading
1
The Crypto24 Playbook: An Analysis of the Banco Hipotecario del Uruguay Ransomware Campaign
47:39
47:39
 
נגן מאוחר יותר
 
נגן מאוחר יותר
 
רשימות
 
לייק
 
אהבתי
47:39The sources consist of an in-depth LinkedIn article detailing the Crypto24 ransomware attack on a bank and a LinkedIn error page that suggests alternative content to explore. The article, written by Michael Slowik, explains how the Crypto24 group successfully breached the bank by exploiting basic security vulnerabilities such as weak passwords and …
…
  continue reading
1
Uruguay’s Digital Sovereignty Battle Combating Corporate Censorship with Labor Law and Algorithmic Transparency
5:33
5:33
 
נגן מאוחר יותר
 
נגן מאוחר יותר
 
רשימות
 
לייק
 
אהבתי
5:33A Regulatory Crossroads for Uruguay’s Digital Future Uruguay stands at a critical juncture in the formation of its digital policy, navigating a landscape defined by a stark “policy bifurcation.” This division is evident in the contrast between two distinct regulatory efforts: the swift, consensus-driven passage of a law governing the economic and l…
…
  continue reading
1
John McAfee's Final Interview: On the Run, Crypto, and Psychedelics.
5:30
5:30
 
נגן מאוחר יותר
 
נגן מאוחר יותר
 
רשימות
 
לייק
 
אהבתי
5:30The source provides excerpts from a transcript of a video interview with John McAfee, the British-American computer programmer and founder of the McAfee software company. McAfee, who notes he and his wife Janice are on the run from US authorities, discusses his rejection of traditional finance and investment, favoring cryptocurrencies like Monero a…
…
  continue reading
1
Briefing de Políticas: La Intersección de Vulnerabilidades Cibernéticas, Corrupción Sistémica y Poder del Crimen Organizado en México
59:07
59:07
 
נגן מאוחר יותר
 
נגן מאוחר יותר
 
רשימות
 
לייק
 
אהבתי
59:07Un Nuevo Paradigma de Amenaza Híbrida Este briefing tiene como propósito analizar la convergencia de tres fuerzas que están redefiniendo el panorama de la seguridad en México: la creciente sofisticación tecnológica del crimen organizado, la existencia de vulnerabilidades digitales críticas en la infraestructura nacional y una corrupción institucion…
…
  continue reading
1
El Secuestro Digital del Banco Hipotecario: Crónica de un Ciberataque Anunciado
57:50
57:50
 
נגן מאוחר יותר
 
נגן מאוחר יותר
 
רשימות
 
לייק
 
אהבתי
57:50Cuando se Apagaron las Luces El 30 de septiembre de 2025, una sombra digital se cernió sobre Uruguay. El Banco Hipotecario (BHU), una entidad estatal clave para la vivienda y la economía del país, sufrió un apagón total en su red. Este evento no fue un “incidente informático” aislado, como insistieron las voces oficiales. Fue la materialización pre…
…
  continue reading
1
The Sky is Leaking: A Case Study on Unencrypted Satellite Data
7:07
7:07
 
נגן מאוחר יותר
 
נגן מאוחר יותר
 
רשימות
 
לייק
 
אהבתי
7:07The source, a transcript from a YouTube video titled "HACKEAN A LA GUARDIA NACIONAL," discusses a critical cybersecurity vulnerability involving geo-stationary satellites where sensitive data is transmitted unencrypted. Researchers from the University of California San Diego and the University of Maryland demonstrated that with readily available eq…
…
  continue reading
1
El Cielo Espía: Cómo una Antena Satelital Reveló Secretos a Plena Vista
6:32
6:32
 
נגן מאוחר יותר
 
נגן מאוחר יותר
 
רשימות
 
לייק
 
אהבתי
6:32En la azotea de una universidad, un grupo de “cerebritos”, como los llama su fuente, apuntó una antena hacia el cielo. No buscaban estrellas ni señales extraterrestres. Buscaban secretos. Y con un equipo de apenas 14,000 pesos mexicanos, encontraron más de los que jamás imaginaron, desvelando las comunicaciones internas de la Guardia Nacional de Mé…
…
  continue reading
1
Huawei: La Historia del Gigante Tecnológico y la Operación Secreta que lo Acechó
7:32
7:32
 
נגן מאוחר יותר
 
נגן מאוחר יותר
 
רשימות
 
לייק
 
אהבתי
7:321. Introducción: Un Router Comprometido en Irán En 2010, un router Huawei recién instalado en la oficina de un político iraní se convirtió en la herramienta de vigilancia perfecta. Sin que nadie lo supiera, una falla de diseño permitía a un atacante eludir la contraseña con un simple comando, una “llave maestra” digital que abría la puerta a todos …
…
  continue reading
1
The Dragon's Network: Huawei, the NSA, and the Secret War for Global Tech Supremacy
7:44
7:44
 
נגן מאוחר יותר
 
נגן מאוחר יותר
 
רשימות
 
לייק
 
אהבתי
7:44The source provides an overview of Operation Shotgiant, a sophisticated cyber-espionage effort by the National Security Agency (NSA) of the United States targeting the Chinese telecommunications giant, Huawei. The operation began with an effort to determine if Huawei was spying on behalf of the Chinese government, as well as to map the company's in…
…
  continue reading
1
La Historia de Shady Rat: El Ciberataque que Redefinió el Espionaje Digital
7:17
7:17
 
נגן מאוחר יותר
 
נגן מאוחר יותר
 
רשימות
 
לייק
 
אהבתי
7:17Introducción: Un Cebo en la RedEn diciembre de 2012, el investigador de ciberseguridad Kyle Wilhoit lanzó un experimento fascinante. Creó una planta de tratamiento de agua completamente virtual, con sistemas de control industrial, documentación detallada y hasta un sitio web. Aunque supuestamente estaba ubicada en Missouri, en realidad funcionaba d…
…
  continue reading
1
Operation Shady Rat: China's Cyber Espionage Engine
7:44
7:44
 
נגן מאוחר יותר
 
נגן מאוחר יותר
 
רשימות
 
לייק
 
אהבתי
7:44The source provides an overview of Operation Shady Rat, a long-running, extensive campaign of cyber-espionage attributed to a unit of the Chinese military (Unit 61398) starting around 2006. This operation involved Advanced Persistent Threats (APTs) utilizing simple but effective spear-phishing emails to install malware (often referred to as a "rat"…
…
  continue reading
1
De lo Falsificado a lo Digital: La Sorprendente Evolución del Imperio Criminal de Corea del Norte
8:08
8:08
 
נגן מאוחר יותר
 
נגן מאוחר יותר
 
רשימות
 
לייק
 
אהבתי
8:08Introducción: El Asalto de los $600 Millones En marzo de 2022, millones de jugadores del popular videojuego Axie Infinity comenzaron a experimentar algo extraño. Lo que al principio parecía una simple falla técnica —algunas funciones dejaron de responder— pronto se reveló como algo mucho más siniestro. El sistema no se podía arreglar porque no esta…
…
  continue reading
1
From Super Dollars to Super Hackers: The Secret History of North Korea's Criminal Empire
7:34
7:34
 
נגן מאוחר יותר
 
נגן מאוחר יותר
 
רשימות
 
לייק
 
אהבתי
7:34The video transcript explores the phenomenon of highly effective North Korean state-sponsored hacking, contrasting this technological prowess with the nation's overall economic poverty and technological isolation enforced by its Juche ideology. It details how the government identifies and trains gifted math and science students to become hackers, o…
…
  continue reading
1
La Guerra por la PS3: La Historia del Hackeo a PlayStation Network
7:10
7:10
 
נגן מאוחר יותר
 
נגן מאוחר יותר
 
רשימות
 
לייק
 
אהבתי
7:10Introducción: El Apagón que Conmocionó al Mundo de los Videojuegos El 20 de abril de 2011, el universo de los videojuegos se detuvo. Sin previo aviso, una fuerza misteriosa desconectó la PlayStation Network (PSN) de Sony, sumiendo a millones de jugadores en un silencio digital. Lo que comenzó como una simple interrupción del servicio se convirtió r…
…
  continue reading
The source, an excerpt from a YouTube video transcript, offers a detailed account of the events surrounding the 2011 PlayStation Network (PSN) hack. It begins by introducing George "GeoHot" Hotz, a renowned hacker who first gained fame by jailbreaking the iPhone and later successfully hacked the PS3 console, challenging Sony's proprietary control o…
…
  continue reading
Episode #349 10.25.2025 10 Million Dollar Rewardעל ידי Hackers Podcast
…
  continue reading
The sources comprise a transcript of a YouTube video titled "Saving Samantha on Twitter Spaces" and a Spotify podcast listing for the same event, hosted by the "Cybermidnight Club – Hackers, Cyber Security and Cyber Crime." The primary source, the transcript, documents a live, often chaotic discussion among several individuals—Alberto, Sapit, Nana,…
…
  continue reading
The provided texts offer two distinct perspectives on modern forms of influence and security, with the Darknet Diaries podcast excerpts exploring the history and function of PSYOP (Psychological Operations), or Military Information Support Operations (MISO). These audio transcripts explain how the US military uses non-lethal methods—including leafl…
…
  continue reading
1
#68 Q&A: Why You’ll Fail in Cybersecurity if You Stop Learning
35:51
35:51
 
נגן מאוחר יותר
 
נגן מאוחר יותר
 
רשימות
 
לייק
 
אהבתי
35:51In this episode of The Hacker’s Cache Podcast, Kyser Clark answers real cybersecurity career questions from whether the OSCP or Hack The Box CPTS is better for breaking into pentesting, to how to renew your Security+ the smart way, and why cybersecurity isn’t for those who hate learning. He also exposes the truth behind bootcamps, entry-level job m…
…
  continue reading
1
Aprender sí ocupa lugar: Sergio San Juan y el arte del Aprendizaje Infinito
1:07:52
1:07:52
 
נגן מאוחר יותר
 
נגן מאוחר יותר
 
רשימות
 
לייק
 
אהבתי
1:07:52En este episodio converso con Sergio San Juan, autor del libro Aprendizaje Infinito y creador de la newsletter del mismo nombre. Hablamos sobre cómo aprender mejor en un mundo lleno de distracciones, por qué aprender sí ocupa lugar (y ese lugar es nuestra atención), cómo generar hábitos de aprendizaje sostenibles y cómo la curiosidad y la opcionali…
…
  continue reading
Episode #348 10.19.2025 We are at Hackers HQ!על ידי Hackers Podcast
…
  continue reading
1
The Soul of the Machine: A Beginner’s Guide to “The Hacker’s Manifesto”
6:05
6:05
 
נגן מאוחר יותר
 
נגן מאוחר יותר
 
רשימות
 
לייק
 
אהבתי
6:051. Introduction: The Voice from the Wires It’s 1986. The headlines are stark and sensational: “Teenager arrested in computer crime scandal”, “Hacker arrested after bank tampering”. To the public, these are simple stories of digital delinquency. But from behind the keyboard, a different voice emerges—a passionate, defiant defense of an entire cultur…
…
  continue reading
1
The Unsafe Space: A Story of a Conversation Gone Wrong. Social media, social audio, twitter, x
14:04
14:04
 
נגן מאוחר יותר
 
נגן מאוחר יותר
 
רשימות
 
לייק
 
אהבתי
14:04Introduction: The Promise of a Safe Place Online On the internet, a “safe space” is a powerful idea. It’s meant to be a community where people can share difficult, painful experiences—especially when they feel wronged by powerful systems like governments, corporations, or universities—and be met with support and understanding. It’s a place built on…
…
  continue reading
1
The Uruguayan Cyber-Dilemma: A Deep Dive into National Strategy, Legal Enforcement, and the Transparency Deficit (2024–2025)
5:41
5:41
 
נגן מאוחר יותר
 
נגן מאוחר יותר
 
רשימות
 
לייק
 
אהבתי
5:41The Uruguayan Cyber-Dilemma—A Critical AnalysisPresenter: Alberto Daniel Hill (Ethical Hacker, Forensic Expert, and Defender of Knowledge)Part 1 of 4: The Personal Cost of Transparency and the True Ethos of HackingI stand before you today not just as an expert in forensic science and ethical hacking, but as someone who has experienced firsthand the…
…
  continue reading
1
Analysis of Twitter Space: “Ecos del Pasado en la Era Digital”
34:40
34:40
 
נגן מאוחר יותר
 
נגן מאוחר יותר
 
רשימות
 
לייק
 
אהבתי
34:40The source text is comprised of excerpts from a long-form, multi-topic audio discussion, which covers a wide array of subjects including personal relationships and intimacy, as indicated by early commentary on communication and sexual expression. A significant portion of the conversation focuses on geo-political and social issues, such as the perce…
…
  continue reading
1
The takedown of the ‘Dictadores’ syndicate was not the story of a lone hacker in a basement. It was the dismantling of a structured, professional criminal organization
6:44
6:44
 
נגן מאוחר יותר
 
נגן מאוחר יותר
 
רשימות
 
לייק
 
אהבתי
6:44The takedown of the ‘Dictadores’ syndicate was not the story of a lone hacker in a basement. It was the dismantling of a structured, professional criminal organization Introduction: Two Hackers, Two Different Worlds In Argentina, law enforcement dismantles a sophisticated syndicate with direct ties to narco-traffickers, a group that built custom so…
…
  continue reading
1
Análisis de la Regulación de Plataformas Digitales en Uruguay
20:58
20:58
 
נגן מאוחר יותר
 
נגן מאוחר יותר
 
רשימות
 
לייק
 
אהבתי
20:58Análisis de la Regulación de Plataformas Digitales en UruguayResumen EjecutivoEl panorama regulatorio de las grandes plataformas digitales en Uruguay se caracteriza por una marcada bifurcación de políticas, avanzando en dos vías paralelas y distintas. La primera vía, la Regulación Laboral (Ley 20.396), ya ha sido promulgada y reglamentada. Esta ley…
…
  continue reading
1
Análisis de la Regulación de Plataformas Digitales en Uruguay
6:08
6:08
 
נגן מאוחר יותר
 
נגן מאוחר יותר
 
רשימות
 
לייק
 
אהבתי
6:08La regulación de las plataformas digitales en Uruguay se desarrolla a través de dos trayectorias legislativas distintas y paralelas. Este camino legislativo, impulsado por el Poder Ejecutivo, se centra en establecer protecciones mínimas para los trabajadores de la economía gig, específicamente en los servicios de transporte urbano y entrega. Estado…
…
  continue reading
1
Uruguay's Dual Digital Platform Regulation: Labor and Democratic Governance
5:33
5:33
 
נגן מאוחר יותר
 
נגן מאוחר יותר
 
רשימות
 
לייק
 
אהבתי
5:33The source provides an extensive analysis of Uruguay's efforts to regulate large digital platforms, identifying two distinct legislative tracks that characterize the nation's digital governance landscape. The first track successfully established Law 20.396, which focuses on labor regulation by setting minimum protections for gig economy workers and…
…
  continue reading
1
Jornalismo de Dados: Como a EPTV usa Snowflake para inovar o jornalismo - Data Hackers Podcast #116
47:56
47:56
 
נגן מאוחר יותר
 
נגן מאוחר יותר
 
רשימות
 
לייק
 
אהבתי
47:56A inteligência de dados está remodelando indústrias inteiras, e o jornalismo é um dos exemplos mais fascinantes dessa transformação! Neste episódio, contamos como a EPTV, uma das maiores afiliadas da Rede Globo, está reinventando a forma de produzir notícia com a criação de um Núcleo de Jornalismo de Dados em parceria com a Snowflake. Um projeto qu…
…
  continue reading
1
Hactivism, Detention, and Digital Justice: Unpacking a Latin American Cybercrime Saga
35:42
35:42
 
נגן מאוחר יותר
 
נגן מאוחר יותר
 
רשימות
 
לייק
 
אהבתי
35:42These sources consist of transcripts from YouTube videos by the channel “CYBERMIDNIGHT CLUB,” primarily focusing on interviews and statements from a hacker known as Gob or Gob Etherium. The central topic is the arrest and imprisonment of Gob’s 18-year-old friend, Vlady, who is accused of various cybercrimes in Uruguay, including the defacement of t…
…
  continue reading
1
Red Flag Forensics: How to Spot Stalkers, Scammers, and Cannibals on Dating Apps
33:45
33:45
 
נגן מאוחר יותר
 
נגן מאוחר יותר
 
רשימות
 
לייק
 
אהבתי
33:45A Beginner's Guide to Spotting Red Flags in Online DatingIntroduction: Trusting Your Gut in the Digital Dating World Online dating offers exciting possibilities, but your safety must be your first priority. This guide is not meant to scare you; it is meant to equip you. It will teach you to recognize the warning signs and manipulative tactics used …
…
  continue reading
1
The Parmaster: Underground: Hacking, Madness, and Obsession on the Electronic Frontier
6:51
6:51
 
נגן מאוחר יותר
 
נגן מאוחר יותר
 
רשימות
 
לייק
 
אהבתי
6:51The provided excerpts, primarily sourced from Suelette Dreyfus and Julian Assange's work "Underground," examine the early culture, motives, and legal challenges faced by the international computer underground, particularly focusing on Australian hackers. They illustrate that early hacking communities formed on BBSes (Bulletin Board Systems), where …
…
  continue reading
1
Putin’s Bears: World’s Most Dangerous Hackers
44:25
44:25
 
נגן מאוחר יותר
 
נגן מאוחר יותר
 
רשימות
 
לייק
 
אהבתי
44:25Case Study: Russian State-Sponsored Cyber Operations and their Geopolitical ImpactIntroduction: The Threat Doctrine of the "Bears" Russian state-sponsored cyber units, colloquially known as the "Bears," operate as direct instruments of national policy. Their actions extend far beyond traditional espionage, representing a strategic capability for de…
…
  continue reading
De la Crisis al Ciberdelito: La Historia del Hacking en Argentina1. Introducción: El Nacimiento de una Cultura Única La cultura hacker en Argentina no surgió en un laboratorio tecnológico ni en un próspero entorno corporativo. Fue forjada en el crisol de una de las peores crisis socioeconómicas de su historia. La debacle de 2001 dio origen a una me…
…
  continue reading
1
Estudio de Caso: Anatomía de una Estafa Cripto con Deepfakes de Elon Musk
6:04
6:04
 
נגן מאוחר יותר
 
נגן מאוחר יותר
 
רשימות
 
לייק
 
אהבתי
6:04Estudio de Caso: Anatomía de una Estafa Cripto con Deepfakes de Elon Musk1.0 Introducción: El Advenimiento de las Estafas Potenciadas por IA Las estafas en línea han evolucionado significativamente desde sus primeras iteraciones. Tácticas que alguna vez fueron prevalentes, como el conocido engaño del "Príncipe Nigeriano", han dado paso a operacione…
…
  continue reading
La Trampa de Tinder The sources present a composite study of the dangers of online dating and the emergence of an unconventional media platform dedicated to cybersecurity and digital advocacy. One set of transcripts details several chilling dating app accounts, ranging from stories of near-abduction and ambushes in isolated locations to three separ…
…
  continue reading
Un Análisis Exhaustivo de la Catástrofe Cibernética del Gobierno Uruguayo: Fallos Sistémicos, el Compromiso Fatal de 30.000 Certificados PKI de Identidad Nacional, y la Peligrosa Brecha entre la Ambición Digital y la Ineptitud Operacional.Fallo Sistémico (Systemic Failure): Se reporta un "fallo sistémico en la protección de la infraestructura críti…
…
  continue reading
1
Uruguay's Digital Breach: A Crisis of Trust and Security
7:12
7:12
 
נגן מאוחר יותר
 
נגן מאוחר יותר
 
רשימות
 
לייק
 
אהבתי
7:12Analysis of Systemic Cybersecurity Failures in the Uruguayan GovernmentExecutive Summary This briefing analyzes a series of large-scale data breaches targeting Uruguayan government entities, which starkly contradict the nation's reputation as a digital leader in Latin America. Key findings reveal a systemic failure to protect citizen data and criti…
…
  continue reading
1
Anonymous: We Are Legion. Expect Us.
7:23
7:23
 
נגן מאוחר יותר
 
נגן מאוחר יותר
 
רשימות
 
לייק
 
אהבתי
7:23Anonymous: We Are Legion. Expect Us. Dive into the chaotic world of Anonymous, the decentralized computer hacker group and serious political movement that became known as the "final boss of the internet". Anonymous is a collective of nameless, faceless folks who have achieved significant geopolitical impact worldwide. They are characterized as the …
…
  continue reading
1
The Strategic Paradox: Inside Peru's Escalating Cyber Crisis—From Hacktivism to RaaS Extortion
6:56
6:56
 
נגן מאוחר יותר
 
נגן מאוחר יותר
 
רשימות
 
לייק
 
אהבתי
6:56Title: The Strategic Paradox: Inside Peru's Escalating Cyber Crisis—From Hacktivism to RaaS Extortion Description: In this episode, we dive deep into the dramatic escalation of cyber threats gripping Peru, a nation where rapid digital integration has consistently outpaced the development of national institutional capacity and legal enforcement, cre…
…
  continue reading
The Prophet and the Storm Cybersecurity expert Alberto Daniel Hill delivers an unflinching analysis of the moment Uruguay’s celebrated reputation as a digital pioneer collapsed, arguing that the catastrophic 2025 BHU ransomware attack was not an isolated event, but the inevitable payment for years of accumulated "national cyber debt". This episode …
…
  continue reading
The BHU Data Breach: How Uruguay’s Digital Star Fell Victim to the Crypto24 Ransomware and 95% Weak Passwords In September 2025, the state-owned Banco Hipotecario del Uruguay (BHU) suffered a catastrophic systems failure. While the institution quickly minimized the event as a manageable "incidente informático" or "problema técnico", cybersecurity e…
…
  continue reading