Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
The Future of Cybercrime is dedicated to helping security practitioners defend their organizations by distilling insights, best practices, and actionable tips from the world’s leading cyber crime experts. This show is brought you by KELA Cyber Threat Intelligence. For more information, visit www.kelacyber.com
…
continue reading
TRUE | CYBER | CRIME | STORIES Willkommen zu unseren True Cyber Crime Stories, mit spannenden Geschichten, echten Fällen und wissenswerten Hintergrundinfos. In diesem Podcast wird Jan Morgenstern gemeinsam mit Yannick Haymann über die Themen, Trends und Fälle vergangener und gegenwärtiger Cyberkriminalität sprechen, die technischen und rechtlichen Hintergründe beleuchten und Zusammenhänge erklären. Weitere Informationen findest du auf www.morgenstern-privacy.com. Wir freuen uns auch, wenn du ...
…
continue reading

1
Cybercrime vs Small Business. Insider View of Cyber Crime.
49:17
49:17
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
49:17Ron Sharon, a well-known cybersecurity & IT leader having served at such great companies as CANNON, LA Clippers, Universal Music, Mercedes, and more. Ron is a mentor to IT and cyber professionals across the globe and a friend of this show. Chapters 00:00 The Journey into Cybersecurity 04:58 Cyber Crime vs Small Business 09:56 Insider View of Cyber …
…
continue reading

1
Pearson Breached Via Exposed GitLab Token
5:30
5:30
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
5:30Pearson is an education giant, providing learning tools and standardized assessments across many fields, schools, and organizations. Recently they were breached by what was likely a series of relatively minor mistakes. Sources: https://pastebin.com/YemUE0XiOleh Chloe Thonus
…
continue reading

1
Logged Into Hell. An Injustice, a Fortune Lost, and the Resilience That Followed (2/2)
4:12
4:12
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
4:12Logged Into Hell. An Injustice, a Fortune Lost, and the Resilience That Followed (2/2) This article was prepared by the Global Institute for Digital Rights and Justice.
…
continue reading

1
Logged Into Hell. An Injustice, a Fortune Lost, and the Resilience That Followed (1/2)
5:30
5:30
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
5:30Logged Into Hell. An Injustice, a Fortune Lost, and the Resilience That Followed. This article was prepared by the Global Institute for Digital Rights and Justice.
…
continue reading

1
Trump's Signal Clone App was Hacked in 15 minutes
8:11
8:11
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
8:11Trump's Signal Clone App was Hacked in 15 minutes
…
continue reading

1
**"To Hell and Back" - my talk @ekoparty 2022 - For Spotify Video with English subtitles!**
48:33
48:33
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
48:33**"To Hell and Back" - my talk @ekoparty 2022 - with English subtitles!** In 2014, Alberto Daniel Hill, a cybersecurity expert, discovered a security vulnerability on a medical provider's website. While reporting on the issue, he became the first person imprisoned in Uruguay for a computer-related crime—a crime he did not commit and that likely nev…
…
continue reading

1
Jonathan Scott - Full Episode- Apple products and privacy.
2:14:38
2:14:38
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
2:14:38We are speaking about YOUR privacy and YOUR #HumanRightsViolated tonight. I will disclose the tools that @Apple has, and show you the truth about what has been going on for a long time. VPN logs, Contacts, Emails, SMS logs, and much more. @jonathandata1
…
continue reading

1
Mano a mano con el hacker mas buscado del Rio de la Plata gov.eth - Alberto Daniel Hill
2:00:22
2:00:22
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
2:00:22Mano a mano con el hacker mas buscado del Rio de la Plata gov.eth - Alberto Daniel Hill#policia #argentina #hacker #goveth -------------------Alberto Daniel Hill https://albertohill.com https://x.com/ADanielHill https://cybermidnight.club https://t.me/cybermidnight #hacker #uruguay #cybersecurity #cybersecuritytips #infosecurity #hacking #police #p…
…
continue reading

1
The Dark Web Black Market Trade Cyber Crime Crime Alpha Bay
1:30:58
1:30:58
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:30:58The Dark Web Black Market Trade Cyber Crime Crime Alpha Bay
…
continue reading

1
Cyber Traps at Home! How to Keep Your Family Safe Online.🔥
54:23
54:23
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
54:23Host David Mauro interviews Dr. Feleks Kravetz, US citizen who migrated from the former USSR and founder of Cuber Security Easy. We discuss: 🎯protecting yourself online, 🎯cybersecurity risks for families, and 🎯the importance of cybersecurity awareness. Find Dr. Felix and his mission to raise awareness for all here: 🌐 Website: https://www.CyberSecur…
…
continue reading

1
Security Firm CEO Installs Malware on Hospital Computer
9:05
9:05
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
9:05This is one of the craziest stories I've ever covered in my 3 years of this podcast, and hearing both sides somehow makes the situation even less clear. Cybersecurity firm CEO Jeff Bowie accessed hospital computers and wrote malicious scripts on them intended to steal data. But why? Sources: https://pastebin.com/qqLMem11…
…
continue reading

1
Identity Crisis: Aaron Painter on Mobile ID Verification, Cryptography, and Reducing Cyber Risk
51:25
51:25
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
51:25Catch the Video episode: https://youtu.be/zMNsjSGT-yw Aaron Painter, former global executive at Microsoft, discusses the rising risks of deepfakes, how deep fake videos increase security risks, and how mobile-based identity verification helps like the new company he founded called Nametag. In this story David Mauro interviews Aaron and discusses id…
…
continue reading
Cybersecurity tips
…
continue reading

1
Hackers vulneraron la página de Buquebus Turismo. La mayor informacion en la web sobre el hecho aqui! gov.eth @adanielhill
6:10
6:10
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
6:10Este video:📽️Video sin editar de gov.eth sobre los recientes hackeos a servidores en Uruguay🇺🇾💻: su versión de los hechos. Está frustrado😡 tras perder tiempo con periodistas . 📷Por favor difundir para que la gente no se quede solo con la versión de los medios tradicionales.📺😇Yo, Alberto Daniel Hill, no estoy involucrado en estos eventos. 😇@Observad…
…
continue reading

1
To Hell and Back" - my talk @ekoparty 2022 - with English subtitles!
48:33
48:33
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
48:33El audio original es el español. Para spotify, el video tiene subtitulos en Ingles In 2014, Alberto Daniel Hill, a cybersecurity expert, discovered a security vulnerability on a medical provider's website. While reporting on the issue, he became the first person imprisoned in Uruguay for a computer-related crime—a crime he did not commit and that l…
…
continue reading
Okay Charlie your turn
…
continue reading
Good luck Greg (& some news)
…
continue reading

1
Este HACKER Estuvo en la CARCEL Alberto Hill Cafe & Pizza Podcast #0023
1:12:48
1:12:48
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:12:48Este HACKER Estuvo en la CARCEL Alberto Hill Cafe & Pizza Podcast #0023 "Esta noche se viene al podcast el gran @ADanielHill hablaremos de su paso por la carcel, de #hacking y de el #cibercrimern no os lo podeis perder !"https://x.com/ADanielHill/status/1918005504808567117
…
continue reading

1
How Hackers Think.🔥Chris Roberts🔥Latest AI Risks for Business
58:38
58:38
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
58:38Rural Healthcare and small/midsized businesses are being tipped over the edge. Not by Tariffs or high interest rates, but by investments needed into protecting their people and systems from disruption. How can you protect yourself from something you don’t know? A risk you don’t understand. What if you could think like a hacker… and use that power t…
…
continue reading

1
Corte de Energia en España, Europa! 60% of the supply of energy vanished in 5 seconds!
2:25:48
2:25:48
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
2:25:48Key Points A massive power outage hit Spain and Portugal on April 28, 2025, disrupting critical infrastructure, with the cause still under investigation. It seems likely that a grid failure caused the outage, though a cyberattack is being investigated but not confirmed. The Spanish government has been transparent, stating no conclusive cause yet, w…
…
continue reading

1
SuperCardX Steals Payment Data via NFC
6:51
6:51
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
6:51NFC has allowed for payments to be easier than ever, but it was only a matter of time before this method was exploited by threat actors. A bold, new real time malware that leverages NFC has been making rounds. Sources: https://pastebin.com/QgquMLj8Oleh Chloe Thonus
…
continue reading

1
Alberto shares his personal story of being wrongly accused and imprisoned
2:48:57
2:48:57
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
2:48:57Alberto shares his personal story of being wrongly accused and imprisoned due to security vulnerabilities in a medical records system. He recounts how he was initially suspected of hacking into the system, but he believes that the evidence against him was incomplete or misleading. Alberto's experience led him to write a book about it, which was pub…
…
continue reading

1
Are you at Risk? Personal Liability Cyber Breaches.
54:33
54:33
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
54:33We interview Joseph Brunsman of the Brunsman Group, a thought leader in cybersecurity insurance. They discuss the liability in data breaches and the changes happening in the cybersecurity insurance industry. They also explore the impact of AI on cyber insurance and the importance of accurate application and underwriting processes. The conversation …
…
continue reading

1
🚨New FBI Alert🚨Got a DM from the “FBI” on Telegram?
1:47
1:47
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:47📲 Got a DM from the “FBI” on Telegram? 🚨 Did someone named “Jaimie Quin” claim they run IC3? ⚠️ It’s a scam. Full stop. The FBI just issued an alert warning the public: They are NOT direct messaging victims on Telegram or any other social media app. A scammer posing as “Jaimie Quin” is pretending to be the head of the FBI’s Internet Crime Complaint…
…
continue reading

1
Cyber Crime-Biggest Threat to Critical Infrastructure. Unmasking Top Cyber Threats Today To US Critical Infrastructure
1:36:41
1:36:41
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:36:41Panel discussion with international leaders part of the Silicon Valley Think Tank, Tortora Brayda AI & Cyber Institute Task Force. Find out and join the Think Tank: https://www.tortorabrayda.org/home Chapters 00:00 Introduction to the Challenges of Securing Critical Infrastructure 03:11 Vulnerabilities and Weaknesses in Critical Infrastructure 10:0…
…
continue reading

1
New Alert 🚨 Beware of Your Next Google Search🚨
1:55
1:55
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:55👀 Could your next Google search lead you into a cyber trap? 🔐 Are you sure that “HR login” link isn’t a fake? 🚨 The FBI just issued a Public Service Announcement warning EVERYONE — yes, even you — that cybercriminals are now targeting employee self-service websites (like payroll, benefits, and HR portals). Here’s how it works: ⚠️ Fraudsters buy sea…
…
continue reading

1
Man CONTINUES sending money to his military girlfriend!
35:26
35:26
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
35:26Man CONTINUES sending money to his military girlfriend! [1]
…
continue reading

1
New Alert. 🚨 Don't Fall For The New Google Subpoena🚨
1:39
1:39
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:39📬 Would you fall for a fake Google subpoena? 🛡️ What if it passed every security check — and looked 100% real? 🚨 A new phishing tactic is slipping past traditional defenses — and it’s terrifyingly convincing. 🕵️♂️ Recent reports reveal cybercriminals are sending fake emails that mimic legal subpoenas from Google. ✅ No misspellings ✅ No suspicious …
…
continue reading

1
Zero Trust, SMB & National Security. INTEL CTO Exclusive.
1:01:40
1:01:40
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:01:40Don't miss the video interview for details: https://youtu.be/-G7hbLGDK9o Steve Orrin, Federal CTO for Intel, discusses secrets inside zero trust and r latest cyber security concerns. He is a recognized security leader and public speaker. Steve has orchestrated projects for federal government agencies on Security and AI. Steve is a key advisor in em…
…
continue reading

1
Secrets To Cyber Crime Discussions. Ransomware Negotiations Unleashed.
58:15
58:15
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
58:15David Mauro interviews ransomware negotiator, George Just, a former VP at Oracle and current CRO at Digital Asset Redemption (https://www.digitalassetredemption.com/), about how to deal with online extortion, understanding ransomware payments, and we uncover secrets to cyber crime discussions you need to know. Chapters 00:00 The Reality of Cybercri…
…
continue reading
The CVE program is essential for tracking vulnerabilities all across the technology industry, but what happens when funding is cut? Let's talk about what's been going on with the CVE program. Sources: https://pastebin.com/QPVXe6kDOleh Chloe Thonus
…
continue reading

1
How start a career in cybersecurity today. Josh Mason
56:21
56:21
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
56:21Discussed how start a career in cybersecurity today with military veteran and security teacher, trainer and expert, Josh Mason. Covering what employers want in cybersecurity, new approaches to enter cyber security, how transition fro military into cybersecurity today, new approaches to enter cybersecurity, how start a career in cybersecurity today,…
…
continue reading

1
How Hackers Stole $1,000,000,000 From Banks
14:10
14:10
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
14:10How Hackers Stole $1,000,000,000 From Banks Check Out @DarknetDiarieshttps://darknetdiaries.com/episode/35/
…
continue reading

1
These Nerdy Students Took Vegas for Millions
30:11
30:11
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
30:11These Nerdy Students Took Vegas for Millions
…
continue reading

1
Zero Trust. Social Engineering. Ron Woerner.
44:18
44:18
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
44:18Zero Trust. New Approaches to Social Engineering. Video Episode: https://youtu.be/U-RiapHidco We discuss new approaches to understanding zero trust and new approaches to understanding social engineering with Ron Woerner. Ron is a Keynote Speaker, Tedx Speaker, Author, Security Community Leader, CEO of Cyber-AAA, Professor of Cyber Studies, CISO, Ha…
…
continue reading

1
Oracle Breach 2025 🎯 How Hackers Attack
35:53
35:53
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
35:53In early 2025, Oracle faced two significant cybersecurity breaches that exposed sensitive data and raised serious concerns about its security practices. The first breach involved outdated Cerner servers, compromising healthcare data, while the second targeted an inactive legacy system, leading to the theft of client credentials. Both incidents high…
…
continue reading