Expert analysts from Enterprise Management Associates (EMA) discuss the latest technologies impacting cybersecurity.
…
continue reading
Making artificial intelligence practical, productive & accessible to everyone. Practical AI is a show in which technology professionals, business people, students, enthusiasts, and expert guests engage in lively discussions about Artificial Intelligence and related topics (Machine Learning, Deep Learning, Neural Networks, GANs, MLOps, AIOps, LLMs & more). The focus is on productive implementations and real-world scenarios that are accessible to everyone. If you want to keep up with the lates ...
…
continue reading
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
The Expert Podcast brings you firsthand narratives from experts across diverse industries, including private investigators, general contractors and builders, insurance agencies, vehicle specialists, lawyers, and many others.
…
continue reading
Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Stay ahead of the latest cybersecurity trends with Cyberside Chats—your go-to cybersecurity podcast for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity pro or an executive who wants to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you understand and proactively prepare for today’s top cybersecurity threats, AI-driven attack and defense strategies, and more!
…
continue reading
Geopolitics Decanted is a podcast featuring geopolitical analysis and in-depth expert interviews on topics ranging from War in Ukraine, Great Power Competition with China, changing nature of warfare, sanctions and export controls, semiconductors and cybersecurity. This is a podcast for people who care about the details and are seeking a comprehensive understanding of global issues, not just the sound bytes. It is hosted by Dmitri Alperovitch, Chairman of Silverado Policy Accelerator (www.sil ...
…
continue reading
Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC’s Mark Burnette, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
…
continue reading
It’s a conversation about what you did before, why did you pivot into cyber, what the process you went through Breaking Into Cybersecurity, how you keep up, and advice/tips/tricks along the way. Cybersecurity Leaders, we would love to help develop the next generation of cybersecurity leadership. You can also bring up topics like attraction/retention/developing the next generation of the workforce.
…
continue reading
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
…
continue reading
Stay informed with our exclusive interviews featuring industry experts, who share their valuable insights, expert opinions, and practical strategies to safeguard yourself and your organisation from cyber threats. In each episode, we shed light on cybersecurity trends, emerging technologies, and notable incidents shaping our digital world. Tune in to ThreatCast and embark on a journey to fortify your digital resilience.
…
continue reading
Sunny’s Silver Linings is a Top MSP Channel Podcast hosted by the CEO of IT By Design, Sunny Kaila. Sunny and his guests cover a wide range of MSP and Talent-based topics, including MSP services, cybersecurity, customer service, and strategies to achieve growth and success in the channel. Listen now to take your business to the next level! https://hubs.ly/Q02DrxnQ0
…
continue reading
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
Hosted by cybersecurity and anti-fraud leader Paul Benda of the American Bankers Association, the ABA Fraudcast brings you expert insights, tools and strategies to help fight fraud.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading

1
Secure & Simple — Podcast for Consultants and vCISOs on Cybersecurity Governance and Compliance
Dejan Kosutic
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
The world of technology is complex. Each episode of TechSperience will uncover helpful technology, cybersecurity, cloud, and workplace transformation tips to help the everyday IT professional. Tune in for advice from leading IT experts covering retail, manufacturing, healthcare, K-12, higher education, and more.
…
continue reading
Welcome to The Bare Metal Cyber CISSP Prepcast — your essential guide to mastering the CISSP certification. Whether you're just starting your cybersecurity journey or preparing for exam day, this podcast delivers expert insights, practical strategies, and clear explanations to help you succeed. Designed by professionals who’ve walked the path, each episode helps you build confidence, sharpen your skills, and move one step closer to certification success.
…
continue reading
The CyberGov Podcast is dedicated to providing government contractors with the latest cybersecurity best practices, industry news, and actionable insights. Our mission is to help businesses safeguard their operations, stay informed about emerging threats, and effectively navigate the complexities of providing services to the government. Through expert interviews, in-depth analysis, and practical advice, we aim to build a more secure and resilient government contracting community.”
…
continue reading
a unique perspective on technology
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every weekday. Gain expert insights on what you need to takeaway from each story, and why. Learn and laugh at the same time with #TeamSC. Join us live at 8 AM Eastern every weekday morning at https://simplycyber.io/streams. I’m Gerald Auger, Ph.D., a cybersecurity professional, college professor, and content creator with over two decades of expertise in GRC cybersecurity. This field is collabor ...
…
continue reading
Hosted by Brett Gallant, founder of Adaptive Office Solutions, The Adaptive Mindset is the podcast for entrepreneurs and leaders ready to embrace change, overcome limiting beliefs, and grow both personally and professionally. Through compelling stories, expert insights, and actionable strategies, each episode empowers you to adapt, lead, and thrive in a rapidly changing world. From mindset shifts to business resilience and cybersecurity, this is your go-to resource for unlocking your full po ...
…
continue reading
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
…
continue reading
Techstrong Gang is your go-to weekday show on Techstrong TV and your favorite podcast platform, bringing together a rotating lineup of top thought leaders and technologists to break down the biggest stories and trends shaping the tech world. Hosted by industry veterans Alan Shimel, Mike Vizard, Mitchell Ashley, Jon Swartz, Lisa Martin, Tracy Ragan, Sulagna Saha, Anne Ahola Ward, Bonnie Schneider, and more, the show dives deep into everything from DevOps and cybersecurity to AI and cloud inno ...
…
continue reading
Welcome to F for Forensics — the ultimate digital forensic podcast for cybersecurity professionals, investigators, and tech sleuths! Hosted by Ben and Alex, each episode explores the tools, techniques, and real-world cases behind computer forensics, file system analysis, data recovery, incident response, and more. Whether you're into NTFS carving, malware artifacts, or forensic imaging, this is your byte-sized boost of expert insight and geeky banter. Subscribe now for deep dives into digita ...
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Podcast about Passwordless Password Management, Identity Theft Protection, Cloud Storage Encryption and Passwordless MFA. Made by https://logmeonce.com/
…
continue reading
TechDaily.ai is your go-to platform for daily podcasts on all things technology. From cutting-edge innovations and industry trends to practical insights and expert interviews, we bring you the latest in the tech world—one episode at a time. Stay informed, stay inspired!
…
continue reading
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
…
continue reading
Empowering Your IT Career Journey – From the first step to success! With a passion for technology and a mission to uplift others, I’m here to guide you through the dynamic IT industry. Whether you're just starting or looking to advance, you’ve found a community dedicated to your growth. Advice & Insights: From Help Desk to Director of Network Operations in 3 years, I share strategies to fast-track your career. Expert Conversations: Gain exclusive insights from industry leaders. Let’s make IT ...
…
continue reading
The HIP Podcast is the premier podcast for cybersecurity pros charged with defending hybrid identity environments. Hosted by 15-time Microsoft MVP and Active Directory security expert, Sean Deuby. Presented by Semperis: the pioneers of identity-driven cyber resilience for the hybrid enterprise.
…
continue reading
Stay ahead in the dynamic world of cybersecurity with "To the Point Cybersecurity." This podcast offers in-depth discussions on the latest cyber threats, trends, and technologies impacting businesses, governments, and communities globally. Listeners will gain insights into how emerging technologies, such as AI and frameworks like data governance and expanded global cyber regulations, are shaping modern security practices. The podcast also provides practical strategies for navigating the ever ...
…
continue reading
Step into the world of digital forensics, mobile forensics, OSINT, and cybersecurity with The Cyber Sleuth Show! Hosted by Kevin DeLong, this podcast dives deep into the ever-evolving landscape of digital investigations, featuring expert guests, cutting-edge tools, real-world case insights, and, of course, the occasional terrible dad joke. From law enforcement investigators and forensic analysts to OSINT specialists and cybersecurity pros, we uncover the latest trends, techniques, and challe ...
…
continue reading
Gain unparalleled access to the minds of industry-leading CIOs, CTOs, and CISOs. Enjoy episodes filled with expert insights, inspiring stories, and trend analysis, all brought to you by the people shaping the future of technology. Whether you're an IT professional, aspiring tech leader, or general tech enthusiast, IT Visionaries has something for everyone. Don't miss out on the chance to learn from the best – subscribe now! Produced by the team at Mission.org and brought to you by Brightspot.
…
continue reading
Talk to Th3 Doc with Steve Meek is designed for executives seeking to better understand the evolving landscape of technology through practical, high-level insights. Hosted by Steve 'The Doctor' Meek, an experienced technology strategist, each episode breaks down complex topics in Technical Support, Cybersecurity, and Artificial Intelligence into clear, actionable conversations tailored for leadership decision-making. With a focus on real-world applications and business outcomes, the show hel ...
…
continue reading
Host Keith Shaw and his expert guests discuss the latest technology news and trends happening in the industry. Watch new episodes twice each week or listen to the podcast.
…
continue reading
Welcome to PCN Podcasts! In Check with Fintech is our series which focuses on all things related to payments, fintech, blockchain, cybersecurity, and e-commerce. Our other series Work It Out focuses on the stories of leaders and experts with a wide range of insights for our audience. From start-ups to global brands, we dive into the ins and out of their industries to work out their formulas for success.
…
continue reading
A gumbo of insights and information about Cybersecurity and Data Protection
…
continue reading
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
…
continue reading
Security by Default is a cybersecurity podcast hosted by Joseph Carson, a renowned ethical hacker and security expert. Each episode dives into the latest security trends, real-world threats, and practical advice for staying safe in the digital world. With insightful interviews and clear explanations, Joseph makes complex topics accessible for both IT professionals and curious listeners alike.
…
continue reading

1
Federal Cybersecurity Rollbacks: What Got Cut—And What Still Stands
19:39
19:39
Play later
Play later
Lists
Like
Liked
19:39In June 2025, the White House issued an executive order that quietly eliminated several key federal cybersecurity requirements. In this episode of Cyberside Chats, Sherri and Matt break down exactly what changed—from the removal of secure software attestations to the rollback of authentication requirements—and what remains in place, including post-…
…
continue reading

1
Secure AF SOC Brief #5 - Chrome CVE-2025-6554
9:04
9:04
Play later
Play later
Lists
Like
Liked
9:04Got a question or comment? Message us here! In this episode of The SOC Brief, the team unpacks a critical zero-day vulnerability in Google Chrome (CVE-2025-6554) that’s being actively exploited. Learn how attackers use type confusion bugs to hijack browser memory, what makes this exploit so dangerous, and why it’s targeting high-value organizations…
…
continue reading
Mike, Chris Blask, Kate Scarcella, and Dan O’Brien (Futurum Group) unpack what IT leaders should focus on amid tariff chaos. Then, they dive into CoreWeave’s $9B buyout of Core Scientific—and what it means for the AI infrastructure race. Plus, how the U.S. Treasury is turning up the heat on cybercriminals.…
…
continue reading

1
A Marriage Fractured: Legal Battles and Digital Deceit
22:43
22:43
Play later
Play later
Lists
Like
Liked
22:43In an audio conversation , a woman shares her harrowing divorce experience, detailing how her husband orchestrated a protective order against her, leaving her homeless and without financial support. She describes psychological abuse and controlling tactics, as well as the struggle to maintain custody of her children, suggesting a narrative of manip…
…
continue reading

1
SolarWinds Settlement, Upgrade Your Leadership Instincts to Build Your Legacy - BSW #403
51:58
51:58
Play later
Play later
Lists
Like
Liked
51:58SEC settles with SolarWinds. We react! In the leadership and communications section, The Skills and Habits Aspiring CEOs Need to Build, Why People Really Quit — And How Great Managers Make Them Want to Stay, The Small Actions That Become Your Legacy, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https:/…
…
continue reading

1
The Hacker or The Hero; The Uruguayan Cyber-Raid That Redefined Justice
6:09
6:09
Play later
Play later
Lists
Like
Liked
6:09The Digital Ghost of Montevideo: The Trials and Triumphs of Alberto Daniel Hill Introduction: The Paradox of the Perfect Target In September 2017, a specialized unit of the Uruguayan police descended upon an apartment in the capital city of Montevideo. Inside, they believed they had discovered the nerve center of a sophisticated cybercriminal. The …
…
continue reading

1
The Enigma of @jonathandata1: An Analytical Profile of Jonathan Scott
6:02
6:02
Play later
Play later
Lists
Like
Liked
6:02Jonathan Scott is a mobile security engineer, phone hacker, cloud hacker, and human rights defender who has publicly disclosed significant, deeply embedded vulnerabilities in major mobile operating systems and hardware. He holds a master's degree in computer science and is currently working on his doctorate. Professional Background and Ethical Shif…
…
continue reading

1
From Ethics to Injustice: A Security Expert's Ordeal
34:36
34:36
Play later
Play later
Lists
Like
Liked
34:36This text consists of excerpts from a YouTube video transcript of a presentation by Alberto Daniel Hill at the Ekoparty 2022 security conference. Hill recounts his personal experience of ethically reporting security vulnerabilities in a Uruguayan healthcare system, only to be wrongfully arrested and imprisoned for extortion and fraudulent document …
…
continue reading
This excerpt from a YouTube video features an interview with Alberto, a self-taught computer engineer from Uruguay who became the first person jailed for cybercrime in his country. The discussion centers on his early hacking experiences at age 12, his responsible disclosure of significant security vulnerabilities to the Uruguayan CERT in 2014 and 2…
…
continue reading

1
The Hacker's Dilemma: Good, Evil, and Justice
4:23
4:23
Play later
Play later
Lists
Like
Liked
4:23The YouTube video from "CYBERMIDNIGHT CLUB" discusses the complex relationship between legal cybersecurity professionals and illegal hackers, asserting they often share similar skills, interests, and appearances. The speaker, a security professional, explains that understanding and even embracing hacker culture is essential for effectively combatin…
…
continue reading

1
CyberSPEAKS: A Podcast Audience Deep Dive with Jack Rhysider and Alberto Daniel Hill
4:04
4:04
Play later
Play later
Lists
Like
Liked
4:04The "NEW YOUTUBE SOURCE" provides excerpts from a podcast discussion on the "CYBERMIDNIGHT CLUB" YouTube channel, focusing on audience engagement and specific episode content. The host highlights episode download figures, noting that an average episode receives 80,000 to 90,000 downloads, with some reaching 100,000. Alberto, a guest for the current…
…
continue reading

1
Victim of Corruption: An Inside Look at Police Misconduct
44:36
44:36
Play later
Play later
Lists
Like
Liked
44:36This YouTube transcript captures a lengthy and emotionally charged conversation involving a person named Alberto, his mother, and others, as they recount Alberto's traumatic experience with the Uruguayan police and Interpol. Alberto details his arrest, interrogation, and subsequent legal battles, highlighting alleged misconduct, theft of his digita…
…
continue reading

1
Chasing Edward Snowden: A Whistleblower's Hunt
12:39
12:39
Play later
Play later
Lists
Like
Liked
12:39This source documents the international manhunt for Edward Snowden after he leaked classified National Security Agency (NSA) documents. It details the risks Snowden took to meet journalists in Hong Kong, the US government's efforts to apprehend him, and the tense escape attempts with the help of WikiLeaks. The narrative highlights the legal and dip…
…
continue reading
This YouTube documentary transcript provides a comprehensive overview of the hacker group Anonymous, detailing its origins from the 4chan website's "B" board and its evolution from pranks and trolling to significant hactivist operations. The text outlines notable actions such as the takedown of the Church of Scientology's websites, the disruption o…
…
continue reading

1
Hacker Resilience: Ethics, Prison, and Triumph
16:01
16:01
Play later
Play later
Lists
Like
Liked
16:01In an extensive dialogue, Alberto Daniel Hill shares his fascinating career as a cybersecurity specialist, detailing his beginnings in programming at an early age and how a juvenile hack of a video game ignited his curiosity. The conversation explores the complexity of cybersecurity, emphasizing the importance of analytical thinking and resilience …
…
continue reading

1
Hacker's Ordeal: A Journey Through Injustice and Recovery
16:01
16:01
Play later
Play later
Lists
Like
Liked
16:01This source offers a podcast interview with Alberto Daniel Hill, a computer security expert who was wrongfully imprisoned for eight months in Uruguay due to a misunderstanding of his ethical hacking practices. The discussion highlights the deficiencies in cyber law and the resiliency of the human spirit as Alberto recounts his experience, including…
…
continue reading

1
Persecution of Cybersecurity Researchers and Ethical Hackers
16:03
16:03
Play later
Play later
Lists
Like
Liked
16:03The speakers in this source are cybersecurity researchers who are discussing a concerning trend where investigators are being wrongly accused of cybercrimes, particularly in the context of data leaks. They highlight the case of Hiram Alejandro Camarillo, a colleague allegedly accused by Argentina of a false hacking incident. The conversation touche…
…
continue reading

1
SN 1033: Going on the Offensive - The Digital Arms Race
3:04:57
3:04:57
Play later
Play later
Lists
Like
Liked
3:04:57Another Israeli spyware vendor surfaces. Win11 to delete restore points more quickly. The EU accelerates its plans to abandon Microsoft Azure. The EU sets timelines for Post-Quantum crypto adoption. Russia to create a massive IMEI database. Canada and the UK create the "Common Good Cyber Fund". U.S. states crack down on Bitcoin ATMs amid growing sc…
…
continue reading

1
SN 1033: Going on the Offensive - The Digital Arms Race
3:04:57
3:04:57
Play later
Play later
Lists
Like
Liked
3:04:57Another Israeli spyware vendor surfaces. Win11 to delete restore points more quickly. The EU accelerates its plans to abandon Microsoft Azure. The EU sets timelines for Post-Quantum crypto adoption. Russia to create a massive IMEI database. Canada and the UK create the "Common Good Cyber Fund". U.S. states crack down on Bitcoin ATMs amid growing sc…
…
continue reading

1
Hackeo y Privacidad: Un Escándalo de Vulnerabilidades. Jonathan Scott.
4:52
4:52
Play later
Play later
Lists
Like
Liked
4:52El presentador del canal de YouTube "CYBERMIDNIGHT CLUB" entrevista a Jonathan Scott, un experto en ciberseguridad, quien revela cómo desarrolló herramientas capaces de saltarse las seguridades de dispositivos móviles Android para empresas como Verizon. Scott explica que estas soluciones, vendidas por 2.2 millones de dólares a Blanco Technology Gro…
…
continue reading

1
Hacking and Privacy: A Vulnerability Scandal. Jonathan Scott.
39:50
39:50
Play later
Play later
Lists
Like
Liked
39:50The host of the YouTube channel "CYBERMIDNIGHT CLUB" interviews Jonathan Scott, a cybersecurity expert, who reveals how he developed tools capable of bypassing the security of Android mobile devices for companies such as Verizon. Scott explains that these solutions, sold for $2.2 million to Blanco Technology Group, allow access, diagnosis, data era…
…
continue reading

1
X Under Siege: Data Leaks, Bots, and Security Failures
40:29
40:29
Play later
Play later
Lists
Like
Liked
40:29Features a conversation with Alberto Daniel Hill and his friends, where Alberto asserts that Twitter (now known as X) is "completely compromised". The core of Alberto's concern stems from an alleged GitHub hack that specifically targeted the Twitter repository, impacting entries for the Chirp contest. He explains that an AI system called Co-pilot, …
…
continue reading

1
Ciberataques en Uruguay: Justicia, Medios y las Narrativas del Hacking.
9:26
9:26
Play later
Play later
Lists
Like
Liked
9:26Ciberseguridad en Uruguay, según lo analizado en las fuentes: Justicia: Las autoridades uruguayas, principalmente a través de AGESIC, CERTuy y la Unidad de Cibercrimen de la Policía Nacional, han respondido a estos ataques. Se han iniciado investigaciones y se han realizado arrestos, como en el caso del incidente de la DNIC. Uruguay ha fortalecido …
…
continue reading

1
Uruguay Cyber Incidents: Justice, Media, and Hacking Narratives
1:15:45
1:15:45
Play later
Play later
Lists
Like
Liked
1:15:45Uruguay presents a complex cybersecurity landscape, showcasing a paradoxical situation where its high regional standing in cybersecurity maturity coexists with a significant surge in detected cyber incidents and notable discrepancies in the public narratives surrounding these attacks. This "cybersecurity trust deficit" is further exacerbated by the…
…
continue reading

1
Turn Your Router Into a Secure RAID 1 NAS for Home Data Control
39:29
39:29
Play later
Play later
Lists
Like
Liked
39:29What if your home router could double as a secure, centralized storage server? In this hands-on episode, we explore how to transform a basic router into a powerful Network-Attached Storage (NAS) hub using its built-in USB port and a RAID-enabled hard drive enclosure. You’ll learn: The step-by-step setup using RAID 1 (mirroring) for redundancy How t…
…
continue reading

1
Cisco C9000 Smart Switches: Performance, Security & Trust
18:09
18:09
Play later
Play later
Lists
Like
Liked
18:09In this episode of techdaily.ai, we break down Cisco’s latest leap in networking: the C9000 smart switches—and what they mean for enterprise IT. Sponsored by StoneFly, this deep dive explores how these switches are built for the real-world demands of AI, Wi-Fi 7, and post-quantum security—while also confronting legacy concerns about reliability. We…
…
continue reading

1
Cloud Seeding, Rainmakers & the Truth Behind Weather Control
31:14
31:14
Play later
Play later
Lists
Like
Liked
31:14Can we really make it rain? This episode takes a grounded look at cloud seeding, the science—and controversy—behind human-influenced weather. We explore: How silver iodide and salt are used to trigger precipitation The methods: static vs. dynamic seeding Scientific debates on effectiveness and data inconsistency Environmental and health safety asse…
…
continue reading

1
Focus: Par. Underground: Hacking, Madness, and Obsession on the Electronic Frontier.
32:06
32:06
Play later
Play later
Lists
Like
Liked
32:06This document is an eBook titled "Underground: Hacking, madness and obsession on the electronic frontier" by Suelette Dreyfus, with Julian Assange credited as a researcher. Released in 2003 and last updated in 2024, the text explores the world of computer hacking and phreaking through a collection of true stories focusing on individual hackers and …
…
continue reading

1
Layoffs in Tech: How IT Pros Can Stay Ahead in 2025
17:29
17:29
Play later
Play later
Lists
Like
Liked
17:29The tech job market is changing fast—and for IT professionals, that means adapting faster. In this essential deep dive, brought to you by StoneFly, we explore what’s driving widespread layoffs and what you can do to stay valuable, visible, and resilient in a rapidly evolving field. In this episode, you'll learn: Why over 235,000 tech layoffs are pr…
…
continue reading

1
Wi-Fi 7: The Next Big Shift in Speed, Security, and Connectivity
19:50
19:50
Play later
Play later
Lists
Like
Liked
19:50Today on techdaily.ai, we break down what makes Wi-Fi 7 the most important wireless upgrade in years. Sponsored by StoneFly, this episode dives into how Extremely High Throughput (EHT) technology is built to meet the demands of today’s connected world—and tomorrow’s. In this episode: How Wi-Fi 7 reaches up to 46 Gbps—5x faster than Wi-Fi 6E Why fea…
…
continue reading

1
2025 Tech Trends: Gen AI, Quantum, XR & Career Insights
19:30
19:30
Play later
Play later
Lists
Like
Liked
19:30Get ready to decode the future. In this tech-packed deep dive brought to you by StoneFly, we explore the critical innovations shaping our world as we head into 2025. From generative AI disrupting creative problem-solving and hiring priorities, to the real-world impact of quantum and neuromorphic computing, this episode cuts through the noise to hig…
…
continue reading

1
EyeOnDV True story about Cyberstalking.. The extent to which an abuser will use technology to control a victim. @ADanielHill
43:57
43:57
Play later
Play later
Lists
Like
Liked
43:57EyeOnDV Cyberstalking: The extent to which an abuser will use technology to control and terrorize their victim and the extreme and dark places that it can lead to. This is real. Author: Symone Fairchild.SOURCE:https://www.youtube.com/watch?v=UNyahFbyUFAhttp://darkweb.today/eVqjMEnTYKqQ4pdgGOYT
…
continue reading

1
Log into Hell, Logout to Hope: A live twitter space where the person in charge of computer crimes of Interpol Uruguay "has no idea how to deal with fraud on platforms like Mercado Libre."
7:22
7:22
Play later
Play later
Lists
Like
Liked
7:22November 2021: Direct Interaction with Interpol (Pivotal Moment) Hill visits Interpol's Uruguay offices to retrieve seized belongings and opens a live Twitter Space to document his experience. Astonishing Request: The Director of Computer Forensics at Interpol Uruguay (the same official who questioned Hill during his arrest and denied knowledge of …
…
continue reading

1
Spying on your kids, Bank Robberies, Qantas, LOTL, sudo, Hunters, Aaran Leyland... - SWN #492
33:26
33:26
Play later
Play later
Lists
Like
Liked
33:26Spying on your kids, Bank Robberies, Qantas, LOTL, sudo, Hunters, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-492
…
continue reading

1
Ep 91: The Engineers React to Breach News
45:27
45:27
Play later
Play later
Lists
Like
Liked
45:27Got a question or comment? Message us here! In this episode, our security engineers break down the latest cybersecurity headlines, from the real scoop behind the “16 billion password” leak to the rise of hacker groups like Scattered Spider. 🕷️ We discuss how attackers bypass MFA, why exploited data keeps resurfacing, and what organizations can do t…
…
continue reading

1
Spying on your kids, Bank Robberies, Qantas, LOTL, sudo, Hunters, Aaran Leyland... - SWN #492
33:25
33:25
Play later
Play later
Lists
Like
Liked
33:25Spying on your kids, Bank Robberies, Qantas, LOTL, sudo, Hunters, Aaran Leyland, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-492
…
continue reading

1
Cybermidnight Club Podcast Analytics Report
49:15
49:15
Play later
Play later
Lists
Like
Liked
49:15Cybermidnight Club Podcast Analytics Report. The source showcases a data analysis project focused on the performance of a Spotify podcast titled "Cybermidnight Club." It begins by illustrating Python code utilizing the pandas library to load and inspect podcast data from a CSV file, revealing information about columns like "Hora (UTC)," "Reproducci…
…
continue reading

1
Alberto Daniel Hill's podcast, "Cyber Midnight Club," launched in December 2018
28:34
28:34
Play later
Play later
Lists
Like
Liked
28:34The "Cyber Midnight Club" is a trailblazing daily True Crime podcast hosted by Alberto Daniel Hill, a Uruguayan cybersecurity expert. It boasts over 100,000 plays across all platforms, including 12,000 plays on Spotify. Launched in December 2018, the podcast features 522 episodes with an average length of about one hour. The podcast's unique conten…
…
continue reading

1
From Prison to Changing the Laws: Hill's Digital Advocacy
29:08
29:08
Play later
Play later
Lists
Like
Liked
29:08Personal trauma and digital platforms can be leveraged for widespread advocacy and systemic change through a multi-faceted process that involves radical transparency, community building, and the strategic dissemination of raw, authentic narratives. Alberto Daniel Hill's journey provides a compelling real-world case study for this transformation. He…
…
continue reading

1
Episode 139: RSAC 2025 Unpacked - Expert Reactions from the CNXN Security Team
22:12
22:12
Play later
Play later
Lists
Like
Liked
22:12In this episode of the Connection Cybersecurity Podcast, host Kim Coombes is joined by our Security Center of Excellence leaders John Chirillo and Rob Di Girolamo, along with Microsoft Security expert Robin Camirand, to unpack the biggest insights from the RSAC 2025 Conference. From the rise of AI-powered defenses and identity threats to the growin…
…
continue reading

1
X Spaces de @ADanielHill: Compromiso e Influencia
6:03
6:03
Play later
Play later
Lists
Like
Liked
6:03Este informe ofrece una descripción general y un análisis del uso exhaustivo de X Spaces por parte de @ADanielHill, destacando su importante presencia como profesional de la ciberseguridad en la plataforma desde octubre de 2020. Detalla la frecuencia y consistencia de sus Spaces, señalando un aumento reciente en la actividad. El análisis examina ad…
…
continue reading

1
ADanielHill's X Spaces: Engagement and Influence Part 2 of 2.a
36:05
36:05
Play later
Play later
Lists
Like
Liked
36:05This report provides an overview and analysis of @ADanielHill's extensive use of X Spaces, highlighting his significant presence as a cybersecurity professional on the platform since October 2020. It details the frequency and consistency of his Spaces, noting a recent increase in activity. The analysis further examines his collaborations with diver…
…
continue reading

1
ADanielHill's X Spaces: Engagement and Influence Part 1 of 2.
51:40
51:40
Play later
Play later
Lists
Like
Liked
51:40This report provides an overview and analysis of @ADanielHill's extensive use of X Spaces, highlighting his significant presence as a cybersecurity professional on the platform since October 2020. It details the frequency and consistency of his Spaces, noting a recent increase in activity. The analysis further examines his collaborations with diver…
…
continue reading

1
🔴 July 8’s Top Cyber News NOW! - Ep 914
1:32:04
1:32:04
Play later
Play later
Lists
Like
Liked
1:32:04The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber for #incidentresponse, #ransomware protection, and business recovery services: https://barricadecyber.com Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what y…
…
continue reading

1
Counterfeit Crisis: How AI fuels dangerous fake goods | Ep. 236
37:54
37:54
Play later
Play later
Lists
Like
Liked
37:54Counterfeit products are no longer just fake handbags and watches—today they include brake pads, skincare, prescription drugs, and even aircraft parts. In this episode of Today in Tech, Keith Shaw talks with Roei Ganzarski, CEO of Alitheon, about how technology—including generative AI—is empowering fraudsters and putting lives at risk. From sophist…
…
continue reading

1
Anticipation and Preparation The Science Behind Cyber Threat Intelligence with Dmitry Bestuzhev (Rerun)
23:28
23:28
Play later
Play later
Lists
Like
Liked
23:28Joining the podcast this week is Dmitry Bestuzhev, senior director of cyber threat intelligence (CTI) at Blackberry. He gives Petko an inside look into the key types of CTI and how the insights can be used to build context and determine response in specific circumstances, such as in the recent case of attempted targets at NATO. Dmitry also turns ou…
…
continue reading