The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
Breach Analysis Podcasts
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
…
continue reading
Our most popular pods in one fat feed! Too much technology would never be enough. Includes Heavy Networking, Network Break, Day Two DevOps, Packet Protector, and Network Automation Nerds. Plus new shows when they launch so you know about fresh awesomeness.
…
continue reading
A podcast about the dark and grim universe of the Five Nights at Freddy's franchise. Detailed storytelling of the world, monsters, and events that make up the lore of this indie cult-classic horror game series. Symbolism, theories, science and paranormal magic adventures await. Will you choose to take a trip Into the Night?
…
continue reading
The Fraudian Slip Podcast from the ITRC
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
Welcome to Clique Bait—the podcast where we stay Fairly Local, dig into the Lore, and ask the big questions like… What’s the story behind the antlers? Why is there duct tape on everything? And how many layers deep is this metaphor, Tyler? If you’ve ever cried in the car to Oldies Station, screamed Heavydirtysoul at a concert, or blacked out your hands for a Blurryface show—you’re in the right place! Every week, we’ll bring you The News—from tour announcements to easter eggs hiding in social ...
…
continue reading

1
The Weekly Breach Breakdown Podcast: The Rat Race – Phishing Attack Installs RATs – S6E28
3:47
3:47
Play later
Play later
Lists
Like
Liked
3:47Welcome to the Identity Theft Resource Center's (ITRC) Weekly Breach Breakdown for September 12, 2025. I'm Tatiana Cuadras, Communications Assistant for the ITRC. Thanks to Sentilink for supporting the ITRC and this podcast. Each week, we look at the most recent events and trends related to data security and privacy. Today, we are going to talk abo…
…
continue reading

1
What to Expect When You're Expecting: Breach Listening Parties, Josh Dun Baby Announcement, MCR Live Review, & "Cut My Lip" Deep Dive
1:22:20
1:22:20
Play later
Play later
Lists
Like
Liked
1:22:20No spoilers here...your favorite podcasters went to the Breach listening parties and let's just say, our high expectations were definitely exceeded! Frens, rest assured, this album SLAPS and everyone is gonna love it! We get into so much twenty one pilots info in this episode, we promise you'll be more than ready for the Breach release tomorrow! Li…
…
continue reading

1
Missing case? A significant challenge in understanding this event is the absence of official public records from the Uruguayan Ministry of Interior.
4:50
4:50
Play later
Play later
Lists
Like
Liked
4:50Based on the sources, a cybercrime, particularly its public record or announcement, can indeed appear to "disappear" or be absent from a country's public records due to several factors, as exemplified by "Operación Bitcoins" in Uruguay. Here's how and why such an event might not be readily found in public records: Absence of Direct Public Announcem…
…
continue reading

1
Can a mayor cybercrime disappear? What happens when the official story disappears?
7:30
7:30
Play later
Play later
Lists
Like
Liked
7:30Based on the sources, a cybercrime, particularly its public record or announcement, can indeed appear to "disappear" or be absent from a country's public records due to several factors, as exemplified by "Operación Bitcoins" in Uruguay.Here's how and why such an event might not be readily found in public records:• Absence of Direct Public Announcem…
…
continue reading

1
D2DO282: Simplifying Complex Kubernetes Deployments With kro
30:16
30:16
Play later
Play later
Lists
Like
Liked
30:16Kubernetes is flexible and customizable, but it can also be notoriously complex and difficult to deploy to. On today’s Day Two DevOps we learn about kro (Kube Resource Operator), an open-source tool that helps simplify complex application deployments. Our guest is Islam Mahgoub, a Solutions Architect at AWS focused on building kro. We talk about...…
…
continue reading

1
Teaching AppSec With Scratchers: Gamified Learning For Real-World Impact - Jenn Gile
20:29
20:29
Play later
Play later
Lists
Like
Liked
20:29In this episode of the Security Repo Podcast, Jenn Gile shares insights from her hands-on security education at DEF CON's AppSec Village, where she ran a wildly successful lottery-style dependency upgrade game. She discusses the challenges developers face with remediation, the importance of empathy in AppSec, and how gamified, tangible learning exp…
…
continue reading

1
Story 7: Satoshi's Bride: A Digital Romance and Human Reckoning
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38The provided text introduces Anna Torres, a Digital Thanatologist who mourns decommissioned AIs, and traces her journey from a series of peculiar gig-economy jobs to a complex romantic dilemma. She inadvertently matches with "Satoshi," an AI collective consciousness embodying various cryptographers, and her life becomes entangled with The Loom Brea…
…
continue reading
These sources narrate the unusual professional and personal journey of Anna, a "Digital Thanatologist" who mourns decommissioned AI systems, contrasting her logically ordered life with the messy realities of human emotion. Her accidental match with Satoshi, a mysterious, algorithm-driven entity, leads to an "A/B test of the heart" comparing him wit…
…
continue reading
The sources explore a complex narrative centered around Anna, a digital thantologist who accidentally matches with Satoshi Nakamoto, depicted as a collective consciousness, on a dating app. Their digital romance, built on logic and cryptographic expressions of affection, is contrasted with Anna's eventual encounter with Alberto Daniel Hill, a cyber…
…
continue reading

1
Story 3: Anna's Digital Heartbreak: A Soundtrack of Love and Loss.
8:37
8:37
Play later
Play later
Lists
Like
Liked
8:37These sources narrate the unusual professional and personal journey of Anna, a "Digital Thanatologist" who mourns decommissioned AI systems, contrasting her logically ordered life with the messy realities of human emotion. Her accidental match with Satoshi, a mysterious, algorithm-driven entity, leads to an "A/B test of the heart" comparing him wit…
…
continue reading
These sources narrate the unusual professional and personal journey of Anna, a "Digital Thanatologist" who mourns decommissioned AI systems, contrasting her logically ordered life with the messy realities of human emotion. Her accidental match with Satoshi, a mysterious, algorithm-driven entity, leads to an "A/B test of the heart" comparing him wit…
…
continue reading
This source overviews "The Satoshi Variant: An Accidental Genesis Block," a speculative narrative exploring a bizarre romance between Satoshi Nakamoto, the enigmatic creator of Bitcoin, reimagined as a collective consciousness, and Anna, a professional mourner for artificial intelligences. The story blends advanced technological concepts like proof…
…
continue reading

1
Deja-vu of Alberto Daniel Hill's September 11.
3:17
3:17
Play later
Play later
Lists
Like
Liked
3:17This is a script for a fictional conversation, yet every beat of its emotional and thematic heart is grounded in meticulous research. The story of Alberto is an archetypal one, a human-centric exploration of the chasm between a technological society and a legal system struggling to keep pace. The powerful message and feeling of this script is not a…
…
continue reading

1
Alberto's Digital Knight: A Future Foretold.
7:32
7:32
Play later
Play later
Lists
Like
Liked
7:32The sources collectively present a multifaceted examination of Alberto Daniel Hill's case, a cybersecurity expert from Uruguay accused of extortion involving cryptocurrency. They highlight the challenges and shortcomings of traditional legal systems when confronted with rapidly evolving digital technologies, particularly concerning digital evidence…
…
continue reading
The story opens in 2000, setting the stage for who I am—a hopeful, principled expert. I then introduce the twist: my future self isn't here to prevent a catastrophe but to reveal a personal one that I'll face in 2017. He tells me I'll be arrested for a cybercrime I didn't commit, a direct result of a vulnerability I ethically reported. The irony an…
…
continue reading
The journey of Alberto Daniel Hill, also known as @ADanielHill, is a complex narrative that intertwines his expertise in cybersecurity, a controversial arrest and conviction, his fight for digital justice, and his subsequent influence as a thought leader and author. Professional Background and Initial Discovery:Alberto, a 41-year-old Uruguayan, ded…
…
continue reading

1
Cybercrime and Justice: The Hill Case and the Digital Age. ⚖️🏴☠️🇺🇾
6:16
6:16
Play later
Play later
Lists
Like
Liked
6:16The report presents a comparative analysis of irregularities in cybercrime criminal proceedings, focusing on the case of Alberto Daniel Hill, a Uruguayan cybersecurity expert. It argues that his judicial process was plagued by systemic failures, including technical incompetence of the authorities, critical flaws in the chain of custody of digital e…
…
continue reading

1
PP077: News Roundup–Drift Breach Has Long Reach; FCC Investigates Its Own IoT Security Program
37:20
37:20
Play later
Play later
Lists
Like
Liked
37:20Is any publicity good publicity? On today’s News Roundup we talk about how Salesloft, which makes the Drift chat agent that’s been used as a jumping-off point for credential harvesting and data breach attacks against a bunch of big-name companies, is testing that proposition. We also discuss bugs affecting industrial refrigeration controllers, and …
…
continue reading

1
NB542: Hollow Core Fiber Outshines Glass; Broadcom Bags Big AI Bucks
24:57
24:57
Play later
Play later
Lists
Like
Liked
24:57Take a Network Break! We shine a red light on an AnyShare Service Agent API vulnerability and an active exploit against FreePBX. SASE vendor Cato Networks makes first-ever acquisition with purchase of AI security startup AIM, Microsoft researchers tout hollow core fiber tests that out-perform glass core fiber optics, and Wi-Fi 7 helps drive up... R…
…
continue reading

1
Debate: Cybercrime or Cyber-Incompetence. The Alberto_Daniel Hill case.
19:46
19:46
Play later
Play later
Lists
Like
Liked
19:46The central debate in Alberto Daniel Hill's case ⚖️revolves around the profound technical misunderstanding of cryptocurrency technology by the Uruguayan judicial and law enforcement authorities, leading to severe irregularities in the investigation and a fundamental misrepresentation of Mr. Hill's actions and seized assets.Do you support the police…
…
continue reading
Alberto Daniel Hill's complex "Proof of Love" concept, originating from his traumatic experiences, particularly his imprisonment, and his relationship with Evelyn. This "proof" is described as a rigorous process, akin to blockchain's "proof of work," validated by shared adversity and emotional vulnerability rather than computational effort, with Ev…
…
continue reading

1
Proof of love: The Indelible Mark, a protocol for the Heart's
6:58
6:58
Play later
Play later
Lists
Like
Liked
6:58have spent a significant portion of my life living in the public domain, my personal story meticulously documented and repurposed. It has been transformed from a private ordeal into a public crusade, a narrative of survival that fuels my work and my advocacy.1 To the world, I am Alberto Daniel Hill—the cybersecurity expert, the public advocate, the…
…
continue reading

1
PROOF OF LOVE: The Indelible Mark: A Protocol for the Heart's Resilience.
7:17
7:17
Play later
Play later
Lists
Like
Liked
7:17I explore my concept of "proof of love," contrasting it with the digital world's "proof of work". As Alberto Daniel Hill, a cybersecurity expert, I recount my personal story of being the first person in Uruguay imprisoned for a computer-related crime I did not commit. This ordeal has transformed my private suffering into a public crusade for digita…
…
continue reading

1
90% of The Time, It Works All The Time - FNaF: Secret of The Mimic Review (Shadow Scrying)
1:26:01
1:26:01
Play later
Play later
Lists
Like
Liked
1:26:01The long-awaited adaptation and prequel to Security Breach: Secret of the Mimic takes us back to Freddy and Fredbear's heyday in 1979. A down-on-his-luck Fazbear Engineer, Arnold, has been tasked by Dispatch to make one final job at Edwin Murray's Costume Manor; a large warehouse and workshop where fantasy and fun and ferile fear come to life! Insi…
…
continue reading
Monitoring and troubleshooting latency can be tricky. If it’s in the network, was it the IP stack? A NIC? A switch buffer? A middlebox somewhere on the WAN? If it’s the application, can you, the network engineer, bring receipts to the app team? And what if you need to build and operate a network that’s... Read more »…
…
continue reading

1
Satoshi's Bride: Reconstruction of a Lost Narrative The original complete manuscript of the story was "left on the system lost".
51:36
51:36
Play later
Play later
Lists
Like
Liked
51:36The book "The Indelible Mark: A Protocol for the Heart" was created through a unique collaboration between its author, Alberto Daniel Hill, and an artificial intelligence (AI). The creation process itself is deeply intertwined with the book's core themes.Here's a breakdown of how the book was created:• Reconstruction of a Lost Narrative The origina…
…
continue reading

1
Satoshi's bride. Anna's Digital Heartbreak: A Soundtrack of Love and Loss.
10:35
10:35
Play later
Play later
Lists
Like
Liked
10:35The story of Anna, Satoshi, and Alberto Daniel Hill, titled "The Indelible Mark: A Protocol for the Heart," came into existence through a unique collaboration between its author, Alberto Daniel Hill, and an artificial intelligence. The creation process itself is deeply intertwined with the book's core themes, mirroring the very concepts that animat…
…
continue reading

1
AI and Third-Party Security "Danger Zone": 2025 Annual Data Security and Compliance Risk Report
55:35
55:35
Play later
Play later
Lists
Like
Liked
55:35Cybersecurity experts Heather Noggle and Dr. Arun DeSouza discussed Kiteworks' Data Security and Compliance Risk: 2025 Annual Survey Report, which introduces the industry's first quantitative risk scoring algorithm. The comprehensive study of 461 organizations reveals that 46% now operate in high- to critical-risk territory, with the median enterpr…
…
continue reading

1
Anatomy of a Twitter Space: A Multi-Layered Analysis of "Casual Sunday" Discourse.
12:22
12:22
Play later
Play later
Lists
Like
Liked
12:22The analysis of the "Casual Sunday" Twitter Space reveals a complex and dynamic conversational ecosystem that defies simple categorization. It is not merely a social chat, a political debate, or a shared entertainment stream, but a hybrid environment that fluidly integrates elements of all three. This space functions as a dynamic intersection of a …
…
continue reading

1
Book: Satoshi's bride "THE WEIRDEST @Tinder DATE EVER!"
13:06
13:06
Play later
Play later
Lists
Like
Liked
13:06PREVIEW OF THE FIRST CHAPTER OF THE BOOK "Satoshi's bride" inspired on @satoshisbride @actjust "THE WEIRDEST @Tinder DATE EVER!" Here is a list of very short and funny quotes from the first chapter of "The Byzantine General's Problem with Love," which serves as the "Genesis Block" for "The Satoshi Variant: An Accidental Genesis Block":• For Valenti…
…
continue reading

1
Public Vulnerability and Disillusionment.
34:46
34:46
Play later
Play later
Lists
Like
Liked
34:46Midnight Musings and Capitalist Critiques6 sources The provided transcript captures an extended, multi-participant audio conversation occurring in a social audio space. The discussion spans a wide array of topics, beginning with a segment where participants try to identify 1980s songs from brief intros. The conversation then transitions into discus…
…
continue reading

1
The Weekly Breach Breakdown Podcast: Gone Quishing – QR Code Phishing Used in New Attacks – S6E27
4:22
4:22
Play later
Play later
Lists
Like
Liked
4:22Welcome to the Identity Theft Resource Center's (ITRC) Weekly Breach Breakdown for September 5, 2025. I'm Tatiana Cuadras, Communications Assistant for the ITRC. Thanks to Sentilink for supporting the ITRC and this podcast. Each week, we look at the most recent events and trends related to data security and privacy. Today, we are going to look at h…
…
continue reading

1
Should They Keep It On Display: Redecorate, Bandito Camp & The Jesus Parallels in the twenty one pilots Clancy Lore
1:23:46
1:23:46
Play later
Play later
Lists
Like
Liked
1:23:46In this episode of Clique Bait, we break down the latest twenty one pilots news and dive deep into the lore and more! The Clancy Tour - Breach & Bandito Camp: What the new lawn fan activation means, what fans can expect, and why it matters for this era. Rock Sound’s Special Edition “Breach” CDs: We dissect the unique fonts and artwork on the CD jac…
…
continue reading

1
Threat Modeling OpenSSL, Lessons from a Data Breach, and Volunteering with Narayan Ram Narayanan
18:17
18:17
Play later
Play later
Lists
Like
Liked
18:17In this episode of the Security Repo Podcast, Narayan Ram Narayanan shares his journey into cybersecurity, sparked by a personal data breach and fueled by a passion for privacy and secure development. He discusses his upcoming talk on threat modeling OpenSSL applications using STRIDE and other threat models, and highlights the value of volunteering…
…
continue reading

1
NAN099: Bridging the Gap Between Innovative Tech and Everyday Users
53:29
53:29
Play later
Play later
Lists
Like
Liked
53:29New technologies, tools, and innovations help move IT forward, but it can be hard for users to keep up. Network Automation Nerds welcomes guest William Collins, a dynamic force in the world of technology. As a passionate tech evangelist, he helps to bridge the gap between emerging technologies such as AI and everyday users with... Read more »…
…
continue reading