Digital forensics discussion for computer forensics, DFIR and eDiscovery professionals. Visit Forensic Focus at forensicfocus.com for more.
…
continue reading
Computer Forensics Podcasts
Welcome to F for Forensics — the ultimate digital forensic podcast for cybersecurity professionals, investigators, and tech sleuths! Hosted by Ben and Alex, each episode explores the tools, techniques, and real-world cases behind computer forensics, file system analysis, data recovery, incident response, and more. Whether you're into NTFS carving, malware artifacts, or forensic imaging, this is your byte-sized boost of expert insight and geeky banter. Subscribe now for deep dives into digita ...
…
continue reading
A podcast by digital forensics examiners for digital forensics examiners. Hear about the latest news in digital forensics and learn from researcher interviews with field memes sprinkled in.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Hosted by two former federal agents who investigated computer crime, this is a technology Podcast covering Computer Security, Computer Crime and Computer Forensics Topics.
…
continue reading
Join Defense Forensic's Rob Walensky in this week's episode of "Digital Forensics, Redefined." As a 20-year veteran of law enforcement, Rob has seen it all, from near-death experiences with alligators to nationwide drug busts. Using digital forensics, he solved thousands of cases and still attends court for hundreds more. The life of a law enforcement agent never stops. Tune in each week as he brings on guests to discuss more of their digital forensic findings while reminiscing on past lives ...
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
My picks of the month for the happenings in the DFIR community
…
continue reading
My Hard Drive Died - Podnutz
…
continue reading
Welcome Savage scholars . We have talks about music, philosophy, psychedelics, computer science, BJJ, psychology , working out and more!!!! Aka beastly savage talk for scholars
…
continue reading
Welcome to Digital Detectives. We'll discuss computer forensics, electronic discovery and information security issues and what's really happening in the trenches. It's not theory, but practical information that you can use in your law practice on the Legal Talk Network.
…
continue reading
For every Marie Curie or Rosalind Franklin whose story has been told, hundreds of female scientists remain unknown to the public at large. In this series, we illuminate the lives and work of a diverse array of groundbreaking scientists who, because of time, place and gender, have gone largely unrecognized. Each season we focus on a different scientist, putting her narrative into context, explaining not just the science but also the social and historical conditions in which she lived and work ...
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
…
continue reading
1
The Lead Tech Podcast | The Talk Show For Electronics Repair Shops
The Lead Tech Podcast | The Talk Show For Electronics Repair Shops
Do you want to take your repair shop to the next level? Our owners helped grow some of the largest repair shops in the southeast including The Computer Warriors, Mr. Phix, Mobile Zone, and Smart Touch Repair Center. The Lead Tech Podcast aims to help you expand your offerings to data recovery, forensics, networking, board-level repair, and to deliver an unbelievable customer service experience. Become the largest repair shop in town and gain the competitive advantage.
…
continue reading
"The Edge AIsle" brings you to the forefront of artificial intelligence and edge computing, powered by Hailo.ai. In this podcast, we explore how edge AI is reshaping industries from smart cities and intelligent video analytics to autonomous vehicles and retail innovation. Join industry experts and thought leaders as they share insights into how Hailo’s AI processors are transforming the way industries function, enabling real-time deep learning and AI-driven applications directly on edge devi ...
…
continue reading
We Cover the Cyberspace.
…
continue reading
Join hosts Debbie Dujanovic, Sheryl Worsley and Becky Bruce in a virtual citizens' academy with the FBI in Salt Lake City, Utah. Learn about how agents respond to crimes and threats ranging from human sex trafficking to counterterrorism and intelligence to mass shootings and even the mafia. Take a virtual tour of the technology used by the evidence response teams that help process crime scenes and work your way through the firearms training simulator as agents explain how and why to use dead ...
…
continue reading
1
Computer Forensics: Incident Response Essentials
21:54
21:54
Play later
Play later
Lists
Like
Liked
21:54A practical guide for investigating computer crimes, focusing on methodologies and tools for digital evidence acquisition and analysis. The text covers a broad range of topics, including the basics of hard drives and storage media, various data hiding techniques like encryption and steganography, and the identification and handling of hostile code …
…
continue reading
1
Scalable Data Streaming with Amazon Kinesis: Design and secure highly available, cost-effective data streaming applications
19:54
19:54
Play later
Play later
Lists
Like
Liked
19:54A book about building scalable data streaming solutions using various Amazon Web Services (AWS) tools, primarily focusing on the Amazon Kinesis family of services (Data Streams, Firehose, Data Analytics, and Video Streams). The content explains the core concepts of data streaming and distributed systems, detailing how to produce and consume data us…
…
continue reading
1
Silencio Hacker Misa Negra en Vivo. En ESPAÑOL.
15:21
15:21
Play later
Play later
Lists
Like
Liked
15:21"Las fuentes contienen extractos de una discusión de audio en varias partes, aparentemente un podcast o un chat en vivo, donde los oradores exploran temas relacionados con el satanismo, el luciferismo, el ocultismo y el hacking. La conversación se centra fuertemente en las diferencias filosóficas entre estos sistemas de creencias y las religiones t…
…
continue reading
1
Narco-Cults Luciferianism and Hacking Philosophy
32:03
32:03
Play later
Play later
Lists
Like
Liked
32:03The sources contain excerpts from a multi-part audio discussion, seemingly a podcast or live chat, where the speakers explore topics related to satanism, luciferianism, occultism, and hacking. The conversation focuses heavily on philosophical differences between these belief systems and traditional religions, particularly Christianity, with an emph…
…
continue reading
1
Psychopathy, Satanism, and Culture Jamming. RAW AUDIO FILE FROM X SPACES.
5:40:13
5:40:13
Play later
Play later
Lists
Like
Liked
5:40:13The sources contain excerpts from a multi-part audio discussion, seemingly a podcast or live chat, where the speakers explore topics related to satanism, luciferianism, occultism, and hacking. The conversation focuses heavily on philosophical differences between these belief systems and traditional religions, particularly Christianity, with an emph…
…
continue reading
1
Estafas románticas de IA un ex-criminal habla
16:28
16:28
Play later
Play later
Lists
Like
Liked
16:28Estafas románticas de IA un ex-criminal habla
…
continue reading
El enigma de @spydirbyte
…
continue reading
The enigma of @spydirbyte
…
continue reading
cybermidnight random raw audio
…
continue reading
1
Chapter 1: Listen to "Overview of the book "Violeta Digital: A Novella of Code and Conscience" by Alberto Daniel Hill.
15:30
15:30
Play later
Play later
Lists
Like
Liked
15:30Chapter 1: Listen to "Overview of the book "Violeta Digital: A Novella of Code and Conscience" by Alberto Daniel Hill.
…
continue reading
cybermidnight random
…
continue reading
1
Question from Nicole Eggert (Baywatch) about my story and case
1:10
1:10
Play later
Play later
Lists
Like
Liked
1:10Question from Nicole Eggert (Baywatch) about my story and case. For the ep25. anniversary edition
…
continue reading
LOGIN TO HELL; the audio book Get the full ebook soon, The kindle version https://amzn.to/3P61vuY
…
continue reading
RAW AUDIO SPACES
…
continue reading
1
SILENCED: A BANNER PODCAST EPISODE: This is what they did with me at another scale.
1:48:45
1:48:45
Play later
Play later
Lists
Like
Liked
1:48:45This is what they did with me at another scale. The basis are the same. 3 Things can no long be hidden, the sun, the moon and the truth... Tommy Robinson (@TRobinsonNewEra) exposes far-left hate group 'Hope Not Hate'. Tommy produces audio/video evidence that proved that Hope Not Hate pays people to tell lies.…
…
continue reading
1
The Prophet Ignored: A Bank Goes Dark in Uruguay.
6:59
6:59
Play later
Play later
Lists
Like
Liked
6:59- The catastrophic cyberattack that validated Alberto Daniel Hill's prophecy involved the theft of 30,000 of Uruguay's national PKI certificates. This event, described as a "devastating nationaltering crisis" and a "catastrophic cyber failure," occurred a few years after ADH's initial public warning.1. Nature of the Attack: A hacker, calling themse…
…
continue reading
1
ALBERTO PRESIDENT RAW AUDIO PART 1
11:54:36
11:54:36
Play later
Play later
Lists
Like
Liked
11:54:36ALBERTO PRESIDENT RAW AUDIO PART 1
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/is-shadow-ai-worse-than-shadow-it. Shadow IT was just the first of the hidden threats; now shadow AI has upped the ante. But which is worse — and how can you defend against them? Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You ca…
…
continue reading
1
Authorization in the Age of AI Agents: Beyond All-or-Nothing Access Control
25:20
25:20
Play later
Play later
Lists
Like
Liked
25:20This story was originally published on HackerNoon at: https://hackernoon.com/authorization-in-the-age-of-ai-agents-beyond-all-or-nothing-access-control. Authorization is the process of determining *what* you’re allowed to do. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content…
…
continue reading
Explores several critical areas concerning the security and privacy of online platforms. The chapters discuss privacy-preserving analytics techniques for social network data, including methods like k-anonymity and differential privacy, to protect user information from breaches such as the Cambridge Analytica incident. Several sections are dedicated…
…
continue reading
1
The Idaho Murders: From Behavioural Clues To AI's Role In Digital Forensics
56:34
56:34
Play later
Play later
Lists
Like
Liked
56:34Heather and Jared Barnhart return to the Forensic Focus Podcast for a wide-ranging conversation covering Cellebrite's growing Case-to-Closure Summit, behind-the-scenes insights from building one of the industry's toughest CTFs, and their digital forensic work on one of the most high-profile US murder cases in recent years. They share why the C2C Su…
…
continue reading
1
Automating Incident Response: How to Reduce Malware Forensics Time by 99% with Python and VirusTotal
5:03
5:03
Play later
Play later
Lists
Like
Liked
5:03This story was originally published on HackerNoon at: https://hackernoon.com/automating-incident-response-how-to-reduce-malware-forensics-time-by-99percent-with-python-and-virustotal. Build a pipeline that aggressively removes "Safe" files using three layers. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. Yo…
…
continue reading
1
The 'Sudo' Problem: Why Google is Locking Down AI Agents Before They Break the Web
6:57
6:57
Play later
Play later
Lists
Like
Liked
6:57This story was originally published on HackerNoon at: https://hackernoon.com/the-sudo-problem-why-google-is-locking-down-ai-agents-before-they-break-the-web. Google has released a whitepaper on how they are architecting security for Chrome’s new Agentic capabilities. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecu…
…
continue reading
1
Security for Telecommunications Networks (Advances in Information Security Book 40)
14:50
14:50
Play later
Play later
Lists
Like
Liked
14:50An extensive overview of security in telecommunications networks, particularly focusing on cellular systems and their convergence with the Internet. The text first establishes core security concepts and cryptographic principles before thoroughly examining vulnerabilities in both traditional voice networks and modern cellular data services like GSM …
…
continue reading
1
INE Earns G2 Winter 2026 Badges Across Global Markets
4:35
4:35
Play later
Play later
Lists
Like
Liked
4:35This story was originally published on HackerNoon at: https://hackernoon.com/ine-earns-g2-winter-2026-badges-across-global-markets. Awards include Leader status in the Online Course Providers Grid Report, Momentum Leader recognition in two major training categories, and regional leadership. Check more stories related to cybersecurity at: https://ha…
…
continue reading
1
The Louvre Heist: Intimidation, DNA, and the Real Story Behind the Global Headline
8:45
8:45
Play later
Play later
Lists
Like
Liked
8:45This story was originally published on HackerNoon at: https://hackernoon.com/the-louvre-heist-intimidation-dna-and-the-real-story-behind-the-global-headline. Louvre heist and how the simple password is not the story. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #c…
…
continue reading
1
Enterprise Security Architecture: A Business-Driven Approach
19:43
19:43
Play later
Play later
Lists
Like
Liked
19:43An extensive overview of enterprise security architecture, emphasizing a business-driven approach. It introduces the SABSA Model, a six-layer framework for developing security architectures, and explains how it guides the entire process from contextual business requirements to operational security. The text covers critical concepts like risk manage…
…
continue reading
1
I Built a Tiny Browser-Only Encryption Tool Because I Don’t Trust Your Backend
10:25
10:25
Play later
Play later
Lists
Like
Liked
10:25This story was originally published on HackerNoon at: https://hackernoon.com/i-built-a-tiny-browser-only-encryption-tool-because-i-dont-trust-your-backend. A developer builds Encrypter, a browser-only tool for encrypting text without servers, logins, or tracking—offering a simple, secure way to share secrets. Check more stories related to cybersecu…
…
continue reading
1
Securing Kafka for PCI DSS Compliance: A Practical Guide for Financial Data Pipelines
10:31
10:31
Play later
Play later
Lists
Like
Liked
10:31This story was originally published on HackerNoon at: https://hackernoon.com/securing-kafka-for-pci-dss-compliance-a-practical-guide-for-financial-data-pipelines. comprehensive guide on aligning Kafka security with PCI DSS requirements, covering topics like Encryption, authentication and access Control, Auditing and monit Check more stories related…
…
continue reading
1
F is for Finding Ghosts in RAM – Live Memory Forensics
32:04
32:04
Play later
Play later
Lists
Like
Liked
32:04In this episode we tackle the fast-paced and volatile world of live memory forensics. They explore how RAM captures evidence that never touches the disk—passwords, keys, active malware, live sessions, command history, and more. Through real case examples, tools like Volatility and Rekall, and best-practice guidance, this episode uncovers why RAM is…
…
continue reading
1
Embracing Technology: Get Tech-Savvy by Learning About Your Computer, Smartphone, Internet, and Social Media Applications
18:33
18:33
Play later
Play later
Lists
Like
Liked
18:33An extensive overview of digital literacy and technology, covering a broad range of topics from basic computer and smartphone functionality to advanced internet applications. It introduces fundamental concepts of hardware and software, then expands into practical usage of online services like email, social media, digital maps, and e-commerce. The t…
…
continue reading
1
How Quantum Computers Threaten Bitcoin and the Entire Internet: Simply Explained
17:43
17:43
Play later
Play later
Lists
Like
Liked
17:43This story was originally published on HackerNoon at: https://hackernoon.com/how-quantum-computers-threaten-bitcoin-and-the-entire-internet-simply-explained. Learn how Shor's Algorithm breaks RSA, ECC, and Bitcoin. Understand the 'Decrypt Later' threat and the urgent global race for Post-Quantum Cryptography (PQC). Check more stories related to cyb…
…
continue reading
1
Data Scientist Pocket Guide: Over 600 Concepts, Terminologies, and Processes of Machine Learning and Deep Learning Assembled Together
16:29
16:29
Play later
Play later
Lists
Like
Liked
16:29A pocket guide offering a comprehensive overview of over 600 concepts, terminologies, and processes in the fields of machine learning and deep learning. Published in 2021, it aims to clarify the logic and mechanisms behind these concepts for data scientists, acting as a non-linear reference for both beginners and experienced practitioners. The guid…
…
continue reading
1
Cybersecurity and Third-Party Risk: Third Party Threat Hunting
20:52
20:52
Play later
Play later
Lists
Like
Liked
20:52A structured approach to managing third-party risk. The book covers fundamental concepts such as the CIA Triad (Confidentiality, Integrity, Availability), various cybercrime types (phishing, ransomware), and the five phases of a breach (research, intrusion, lateral movement, privilege escalation, exfiltration). It further explores the impact of the…
…
continue reading
1
$14.6 Million in RWA Hacks This Year Reveals the Gap Between Tokenization Hype and Reality
10:18
10:18
Play later
Play later
Lists
Like
Liked
10:18This story was originally published on HackerNoon at: https://hackernoon.com/$146-million-in-rwa-hacks-this-year-reveals-the-gap-between-tokenization-hype-and-reality. RWA tokenization hit $35.68B in 2025, but $14.6M in hacks exposed security gaps. Can the industry scale to $2 trillion by 2028 amid regulatory fragmentation? Check more stories relat…
…
continue reading
1
The Invisible Breach: How AI Is Quietly Creating New Security Blind Spots in Modern Tech
10:46
10:46
Play later
Play later
Lists
Like
Liked
10:46This story was originally published on HackerNoon at: https://hackernoon.com/the-invisible-breach-how-ai-is-quietly-creating-new-security-blind-spots-in-modern-tech. We're watching organizations introduce sophisticated machine learning systems to reduce risk, only to discover its creating entirely new categories of risk. Check more stories related …
…
continue reading
1
Cracking the Coding Interview: 189 Programming Questions and Solutions
15:35
15:35
Play later
Play later
Lists
Like
Liked
15:35A comprehensive guide for technical interviews in the software industry, particularly focusing on algorithm, coding, and design questions. It offers detailed strategies for interview preparation, including how to approach problems, optimize solutions, and understand time and space complexity (Big O notation). The text provides interview-specific ad…
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/how-request-response-really-works. Learn how the request–response model really works under the hood. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #network, #request-response-model, #reque…
…
continue reading
1
Taking Control Of Software Supply Chains in the Open Source Era
7:02
7:02
Play later
Play later
Lists
Like
Liked
7:02This story was originally published on HackerNoon at: https://hackernoon.com/taking-control-of-software-supply-chains-in-the-open-source-era. Understanding how these recent npm attacks unfolded will help signal a way forward for a more secure software supply chain. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecuri…
…
continue reading
A comprehensive overview of computer networking principles and technologies. The text explores foundational concepts such as gateways, routers, and network layers, alongside detailed examples of various networks like the Internet (including ARPANET's history and evolution of traffic), mobile phone networks (1G-5G), and wireless LANs (IEEE 802.11). …
…
continue reading
1
Digital Justice in Uruguay: Hill's Case and the Anthem of Resistance
38:22
38:22
Play later
Play later
Lists
Like
Liked
38:22the provided text examines the modern struggle for freedom and justice in Uruguay by comparing the plight of traditional political prisoners with the challenges faced by the contemporary "digital prisoner." This extensive analysis focuses on Alberto Daniel Hill, the country's first incarcerated "hacker," whose wrongful prosecution following an ethi…
…
continue reading
1
You’ve Learned to Break Wi-Fi. Now Learn to Lock It Down.
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31This story was originally published on HackerNoon at: https://hackernoon.com/youve-learned-to-break-wi-fi-now-learn-to-lock-it-down. A practical guide to Wi-Fi hardening using strong passwords, entropy, OpSec and key router safeguards for a safer, more resilient network. Check more stories related to cybersecurity at: https://hackernoon.com/c/cyber…
…
continue reading
1
La Fabricación de la Realidad 1: Dentro de la Economía Sombra de las Redes Sociales
9:11
9:11
Play later
Play later
Lists
Like
Liked
9:11Bienvenidos al CyberMidnight Club. Esta noche, arrancamos la interfaz brillante de tus aplicaciones favoritas para revelar el vientre oscuro, húmedo y lleno de cables de internet. Estamos investigando "La Fabricación de la Realidad": una economía sumergida multimillonaria donde el consenso online se fabrica, se compra y se vende a escala industrial…
…
continue reading
1
The Fabrication of Reality 2: Inside the Shadow Economy of Social Media
39:49
39:49
Play later
Play later
Lists
Like
Liked
39:49Welcome to the CyberMidnight Club. Tonight, we strip away the glossy interface of your favorite apps to reveal the humid, cable-strewn underbelly of the internet. We are investigating "The Fabrication of Reality"—a multi-billion dollar shadow economy where online consensus is manufactured, bought, and sold on an industrial scale. You look at your s…
…
continue reading
1
The Fabrication of Reality 1: Inside the Shadow Economy of Social Media Host:
8:07
8:07
Play later
Play later
Lists
Like
Liked
8:07Welcome to the CyberMidnight Club. Tonight, we strip away the glossy interface of your favorite apps to reveal the humid, cable-strewn underbelly of the internet. We are investigating "The Fabrication of Reality"—a multi-billion dollar shadow economy where online consensus is manufactured, bought, and sold on an industrial scale. You look at your s…
…
continue reading
1
Uruguay Data Hack Compromised Three Million Records
12:49
12:49
Play later
Play later
Lists
Like
Liked
12:49The combined sources present a critical analysis of the October 2025 cybersecurity incident impacting Uruguay’s Plataforma GURI, the education system's central data repository for millions of citizens, including minors. Security analysts confirm this incident is part of a systemic cyber campaign targeting the Uruguayan public sector, concurrent wit…
…
continue reading
1
Desinformación es propaganda intencional, mientras que la mis información es la propagación involuntaria de falsedades
14:07
14:07
Play later
Play later
Lists
Like
Liked
14:07Basado en la transcripción del "Twitter Space" de 2021 y el análisis psicológico proporcionado, este resumen aborda la dinámica de la desinformación y el perfil de su anfitrión, Alberto Daniel Hill. Perfil del Anfitrión: Alberto Daniel HillAlberto Daniel Hill es perfilado como un experto en ciberseguridad con un coeficiente intelectual estimado de …
…
continue reading
1
Critical Thinking in the Age of Digital Propaganda - misinformation and disinformation
31:07
31:07
Play later
Play later
Lists
Like
Liked
31:07The provided text is a transcript of a Twitter Spaces discussion where participants explored the significant threats posed by misinformation and disinformation in the context of cyber culture and societal stability. The conversation clarifies that disinformation is the deliberate spreading of false information, often for financial or political gain…
…
continue reading
1
Mexico's Cartel State: Violence and Deep Infiltration
38:11
38:11
Play later
Play later
Lists
Like
Liked
38:11The collected materials explore pressing issues across digital security, online communities, and geopolitical corruption. A foundational research report examines how trust and reputation are built and managed in unfiltered online spaces, using a user’s cyber-harassment crisis as a case study. Complementing this, other documents analyze the grave th…
…
continue reading