Forensics Talks is a series of interviews with Forensic Professionals from different disciplines around the globe. Learn about science, technology and important cases where Forensic Science has played an important role.
…
continue reading
Digital Forensics Podcasts
A podcast by digital forensics examiners for digital forensics examiners. Hear about the latest news in digital forensics and learn from researcher interviews with field memes sprinkled in.
…
continue reading
Digital forensics discussion for computer forensics, DFIR and eDiscovery professionals. Visit Forensic Focus at forensicfocus.com for more.
…
continue reading
The AI in Business Podcast is for non-technical business leaders who need to find AI opportunities, align AI capabilities with strategy, and deliver ROI. Each week, Emerj research staff and journalists interview top AI executives from Fortune 2000 firms and unicorn startups - uncovering trends, use-cases, and best practices for practical AI adoption. Visit our advertising page to learn more about reaching our executive audience of Fortune 2000 AI adopters: https://emerj.com/advertise
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Welcome to F for Forensics — the ultimate digital forensic podcast for cybersecurity professionals, investigators, and tech sleuths! Hosted by Ben and Alex, each episode explores the tools, techniques, and real-world cases behind computer forensics, file system analysis, data recovery, incident response, and more. Whether you're into NTFS carving, malware artifacts, or forensic imaging, this is your byte-sized boost of expert insight and geeky banter. Subscribe now for deep dives into digita ...
…
continue reading
Forensic Fix is a podcast from MSAB that covers the latest news and trends in the field of Digital Forensics. The show features guests from the industry who share their insights, experiences, and advice on various topics related to Digital Forensics. The podcast covers a wide range of subjects, including mobile device forensics, welfare, industry news and more. Listeners can expect to hear about the latest tools and techniques used by Digital Forensic professionals, as well as how the field ...
…
continue reading
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
…
continue reading
Get involved in the exciting world of Digital Forensics and Incident Response with: Traffic Light Protocol. The Digital Forensics Podcast. In each episode, we sit down with seasoned DFIR professionals, the blueteamers who work around the clock to investigate cyber intrusions. From data breaches to cyberattacks, they share firsthand accounts of some of the most intense investigations they've ever tackled, how they deal with burnout and the added pressure of cat and mouse while they learn abou ...
…
continue reading
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
We take the digital forensics news of today and forecast the future long term impact to our industry, both positive and negative.
…
continue reading
Come join Lee Reiber as he discusses some digital forensic gold. Also the home for the Forensic Happy Hour with guests from the DFIR community.
…
continue reading
Join Defense Forensic's Rob Walensky in this week's episode of "Digital Forensics, Redefined." As a 20-year veteran of law enforcement, Rob has seen it all, from near-death experiences with alligators to nationwide drug busts. Using digital forensics, he solved thousands of cases and still attends court for hundreds more. The life of a law enforcement agent never stops. Tune in each week as he brings on guests to discuss more of their digital forensic findings while reminiscing on past lives ...
…
continue reading
Pro Digital Forensic Consulting is a full-service forensic data acquisition, analysis, reporting & expert witness service based in Richmond, Virginia. We service clients all over the globe in areas of litigation, professional investigation & corporate needs related to the retrieval & analysis of data. We pride ourselves on adherence to the forensic methodology & best practices. Please contact us for more information: Web: ProDigital4n6.com Email: [email protected] Phone: 804-588 ...
…
continue reading
Welcome to Digital Detectives. We'll discuss computer forensics, electronic discovery and information security issues and what's really happening in the trenches. It's not theory, but practical information that you can use in your law practice on the Legal Talk Network.
…
continue reading
My picks of the month for the happenings in the DFIR community
…
continue reading
A new independent Podcast focusing on all things IT Security, although with a SOC focus. From Incident Response, Pen Testing, Ransomware and Digital Forensics, through to hiring, certification and recruitment. Enjoy a mix of up-to-date commentary and guest interviews with a few laughs and stories along the way.
…
continue reading
Discussions with industry professionals and lawyers who use our services on the latest developments and news in digital forensics, digital evidence, privacy and data security law and cyber security/incident response. Hosted by Tyler Hatch, B.A., LL.B., CCFE CMFE, a former lawyer and the founder of DFI Forensics (https://dfiforensics.com), a Canadian digital forensics and incident response firm.
…
continue reading

1
OSINT with ShadowDragon & Digital Tools For Modern Investigations
Daniel Clemens from ShadowDragon, LLC
This podcast covers a variety of cyber security topics, with a focus on candor, and zero b.s. Topics may include OSINT, PAI, Tailored Monitoring, Investigations, Offensive Disciplines, AI/ML, Object Recognition, Forensics, Historical Industry Lore, All things considered in Cyber.
…
continue reading

1
How Not To Suck At Divorce: Divorce Advice and Relatable Humor
Morgan Stogsdill and Andrea Rappaport
How Not to Suck at Divorce guides anyone who’s divorcing or even just considering divorce. Hosted by Morgan Stogsdill and Andrea Rappaport, the show delivers equal parts strategy, empathy, and humor. Morgan Stogsdill is a powerhouse family law attorney and head of family law at the largest firm in the United States. She’s seen every curveball, knows the difference between drama and strategy, and helps clients avoid costly mistakes. Andrea Rappaport is a comedian, marketing pro, and divorced- ...
…
continue reading
THE PLUG ROOM - Plug your business. Plug your brand. "Community development is building people & linking people with people." THMLF The Plug Room has three categories we operate in. Community Development. Audio Forensics. The AU - Art Unveiled. ThePlugRoom.com | #ThePlugRoom "Digital wire-taps filled with knowledge & information directly from influencers all over the world." #1000Network | #NetworkDistribution | #Tagsofinterest Support this podcast: https://podcasters.spotify.com/pod/show/th ...
…
continue reading
Welcome to the new realities of cyber security podcast series, where we'll be looking at the key challenges and opportunities faced by businesses in the rapidly evolving area of cyber security. From digital crime scene forensics to GDPR, this series covers topical issues that matter.
…
continue reading
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
…
continue reading
Wait Just an Infosec is a weekly hour-long cybersecurity-focused broadcast produced by SANS Institute, streamed live on LinkedIn and YouTube, Tuesdays at 10am ET and available to listen to in podcast format on Wednesdays. Our hosts and invited guests are a rotating lineup of SANS faculty members and experts across all infosec domains – some of the brightest minds in cybersecurity, with decades of experience as practitioners. Each week will offer thought-provoking, rich content for a full ran ...
…
continue reading
The Forensic Lunch! The one hour, mostly, live digital forensics and incident response focused video cast and podcast.
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
Hidden Threads explores the intriguing and often untold stories behind private investigators' most puzzling and high-stakes cases. Each episode delves into the hidden connections, dark secrets, and unexpected twists uncovered by PI’s as they navigate the shadows of truth. 4o mini
…
continue reading
RISE fm’s Musa Sikhosana hosts our ever popular current affairs show RISE fm In 60 Minutes every weekday evening, 19h00-20h00, Mon-Thurs. RISE fm In 60 Minutes is a mixed bag of information with Musa expanding on the days top news stories and highlighting business, lifestyle & sport issues along with listener interaction.
…
continue reading
Looking for purpose-driven career or business advice? Want to match your personal brand with a values-aligned organization? The Caring Economy is your destination. Join us weekly for insightful discussions with influential leaders sharing how they balance purpose, profit, and legacy in today's challenging business landscape. Topics range from corporate social responsibility to brand stewardship and beyond. Discover how to transform your career or business through caring principles. Engage wi ...
…
continue reading
Technology and Security (TS) explores the intersections of emerging technologies and security. It is hosted by Dr Miah Hammond-Errey. Each month, experts in technology and security join Miah to discuss pressing issues, policy debates, international developments, and share leadership and career advice. https://miahhe.com/about-ts | https://stratfutures.com
…
continue reading
Hidden in Plain Sight is the podcast that de-mystifies the world of investigations, showing how a key piece of evidence can unlock even the most complex of legal cases. Presenters Lily Kennett and Juliet Young lead a team of investigators at Schillings. In this series they'll untangle cross-border investigations, art fraud, anonymous blogs and social media, metadata, imagery analysis, and more. Joined by guests from across the world of intelligence and digital forensics, Lily and Juliet expl ...
…
continue reading
"From Niche to Necessity: Tax & Accounting for Web3 and Digital Assets" is your source for expert insights on the rapidly evolving world of crypto and digital assets. Hosted by Taylor Zork, CPA, and presented by CryptoCFOs, this interview-based podcast delves into the complexities of tax and accounting for Web3 and digital assets. Tune in as Taylor sits down with top finance professionals, and CEOs of Web3 organizations to explore the latest developments and best practices in this exciting f ...
…
continue reading
The Evidence Room takes you beyond the headlines and into the files where the truth hides. Each episode opens the door to a different case — from cold trails and missing persons to shocking confessions and trials that gripped the world. With investigative storytelling and an eye for the overlooked detail, we sift through the records, the testimonies, and the shadows left behind. Step inside. The evidence is waiting.
…
continue reading
This is a show on the science of how people are different from one another, where these differences come from, how they develop, and why they matter. The podcast’s hosts are Lisanne de Moor, PhD, René Mõttus, PhD, and Rebekka Weidmann, PhD, three personality researchers. It is a collaboration of the European Journal of Personality and the European Association of Personality Psychology (EAPP), and sponsored by EAPP. www.personalitypsychologypodcast.com
…
continue reading
Welcome to "Fit To Think - The Philosopher API" Are you ready to upgrade your thinking? Fit To Think is the channel where we explore the intersection of technology, philosophy, personal growth, and societal impact. I'm your host, Souhimbou Kone, the Tech-Soldier Warrior-Founder, and I'm here to guide you on a journey of intellectual exploration and self-discovery. Here, we'll dive deep into: The Philosopher API Comply With Innovation Integrity as a Health Factor Overcoming Imposter Syndrome ...
…
continue reading
Interviews and fun with professionals, hackers, and everything in between.
…
continue reading
At The Kitchen Table is a podcast where gratitude meets ambition! Amanda DiVito Parle is a passionate REALTOR and the proud leader of DiVito Dream Makers at RE/MAX Alliance, right here in beautiful Golden, Colorado. She’s thrilled to have you join her on this journey as she celebrates the incredible mentors and industry professionals who have shaped her path to success. In each episode, we’ll gather around the metaphorical kitchen table to share inspiring stories of entrepreneurship, collabo ...
…
continue reading
Join hosts Debbie Dujanovic, Sheryl Worsley and Becky Bruce in a virtual citizens' academy with the FBI in Salt Lake City, Utah. Learn about how agents respond to crimes and threats ranging from human sex trafficking to counterterrorism and intelligence to mass shootings and even the mafia. Take a virtual tour of the technology used by the evidence response teams that help process crime scenes and work your way through the firearms training simulator as agents explain how and why to use dead ...
…
continue reading
We Cover the Cyberspace.
…
continue reading
Welcome to Data Discourse, a podcast brought to you by the team at Precise Discovery. In this podcast, we take a look at practical strategies and insights regarding digital and mobile forensics, as well as eDiscovery. We break down the important aspects of this constantly evolving aspect of law, with each episode designed to elevate your knowledge and showcase why, since 2007, the experts at Precise Discovery have been the trusted partner to hundreds of law firms on thousands of matters. Be ...
…
continue reading
Meet the Gurus is a program sponsored by Starweaver and devoted to spreading ideas, knowledge and insights in short form and typically talks of 30 minutes or more. MTG is dedicated to technology, business, entertainment, entrepreneurship and design. These are fields that have converged in powerful ways to change the way we live. Tune in now! Find us here: https://go.starweaver.com/
…
continue reading
Experience the complete True Crime Documentary journey without interruption. All advertisements are strategically placed only at the beginning of each episode, ensuring you can immerse yourself fully in every investigation, every revelation, and every emotional moment without advertising cuts disrupting the flow of our true crime storytelling. We prioritize your uninterrupted listening experience above all else. In the shadows where criminal minds orchestrate their darkest deeds, True Crime ...
…
continue reading
Cyber resilience is the ultimate IT goal for every business. Twice per month, join Assurance IT as they discuss various cyber security topics with IT leaders to help you get closer to your cyber security goals. Each episode includes best practices that can be applied to your enterprise. Cyber resilience is a collaborative effort; let's work toward it together!
…
continue reading
Pour a glass and sit down with one of cybersecurity's most battle-worn CISOs Andy Bennett as he and his guests break down the complex problems, concepts, and technologies facing cybersecurity professionals today while exploring the complex flavors of our favorite distilled spirits. It's a free-flowing long-form conversation. Grab a seat and listen to security professionals break down cyber threats and actionable ways to be more resilient and prepared in the face of the world's biggest issues ...
…
continue reading

1
Caught in the Code: How Digital Forensics Traps Criminals in the Modern Age
17:34
17:34
Play later
Play later
Lists
Like
Liked
17:34Send us a text Join us as we team up with Anthony "Jus" Majusiak to explore how digital forensics is making it nearly impossible for criminals to escape justice. From smartphone GPS data and social media trails to CCTV facial recognition and even fitness trackers, we dive into the tech revolutionizing crime-solving. We’ll unpack real-world cases, l…
…
continue reading
Send us a text A baby camel, a high-speed chase, and a heartfelt tribute set the stage for a season opener that is equal parts human and hard-nosed. We pause to honor Mark Baker, mentor, officer, and friend. This episode spotlights a free Belkasoft AI course along with the much-anticipated release of Rabbit Hole v3, designed to tackle complex data …
…
continue reading

1
The Soul of the Machine: A Beginner’s Guide to “The Hacker’s Manifesto”
6:05
6:05
Play later
Play later
Lists
Like
Liked
6:051. Introduction: The Voice from the Wires It’s 1986. The headlines are stark and sensational: “Teenager arrested in computer crime scandal”, “Hacker arrested after bank tampering”. To the public, these are simple stories of digital delinquency. But from behind the keyboard, a different voice emerges—a passionate, defiant defense of an entire cultur…
…
continue reading

1
The Unsafe Space: A Story of a Conversation Gone Wrong. Social media, social audio, twitter, x
14:04
14:04
Play later
Play later
Lists
Like
Liked
14:04Introduction: The Promise of a Safe Place Online On the internet, a “safe space” is a powerful idea. It’s meant to be a community where people can share difficult, painful experiences—especially when they feel wronged by powerful systems like governments, corporations, or universities—and be met with support and understanding. It’s a place built on…
…
continue reading

1
The Uruguayan Cyber-Dilemma: A Deep Dive into National Strategy, Legal Enforcement, and the Transparency Deficit (2024–2025)
5:41
5:41
Play later
Play later
Lists
Like
Liked
5:41The Uruguayan Cyber-Dilemma—A Critical AnalysisPresenter: Alberto Daniel Hill (Ethical Hacker, Forensic Expert, and Defender of Knowledge)Part 1 of 4: The Personal Cost of Transparency and the True Ethos of HackingI stand before you today not just as an expert in forensic science and ethical hacking, but as someone who has experienced firsthand the…
…
continue reading

1
Analysis of Twitter Space: “Ecos del Pasado en la Era Digital”
34:40
34:40
Play later
Play later
Lists
Like
Liked
34:40The source text is comprised of excerpts from a long-form, multi-topic audio discussion, which covers a wide array of subjects including personal relationships and intimacy, as indicated by early commentary on communication and sexual expression. A significant portion of the conversation focuses on geo-political and social issues, such as the perce…
…
continue reading

1
The takedown of the ‘Dictadores’ syndicate was not the story of a lone hacker in a basement. It was the dismantling of a structured, professional criminal organization
6:44
6:44
Play later
Play later
Lists
Like
Liked
6:44The takedown of the ‘Dictadores’ syndicate was not the story of a lone hacker in a basement. It was the dismantling of a structured, professional criminal organization Introduction: Two Hackers, Two Different Worlds In Argentina, law enforcement dismantles a sophisticated syndicate with direct ties to narco-traffickers, a group that built custom so…
…
continue reading

1
EP 112 | Brian Chiles | Axon Body Worn Cameras
57:31
57:31
Play later
Play later
Lists
Like
Liked
57:31Send us a text Body-worn cameras have become one of the most important tools in modern policing — not just for transparency, but for investigations, evidence collection, and courtroom testimony. On this episode of Forensics Talks, I’ll be speaking with Bryan Chiles, Senior Manager of Axon Forensics, about how Axon body cameras are helping shape the…
…
continue reading

1
Análisis de la Regulación de Plataformas Digitales en Uruguay
20:58
20:58
Play later
Play later
Lists
Like
Liked
20:58Análisis de la Regulación de Plataformas Digitales en UruguayResumen EjecutivoEl panorama regulatorio de las grandes plataformas digitales en Uruguay se caracteriza por una marcada bifurcación de políticas, avanzando en dos vías paralelas y distintas. La primera vía, la Regulación Laboral (Ley 20.396), ya ha sido promulgada y reglamentada. Esta ley…
…
continue reading

1
Análisis de la Regulación de Plataformas Digitales en Uruguay
6:08
6:08
Play later
Play later
Lists
Like
Liked
6:08La regulación de las plataformas digitales en Uruguay se desarrolla a través de dos trayectorias legislativas distintas y paralelas. Este camino legislativo, impulsado por el Poder Ejecutivo, se centra en establecer protecciones mínimas para los trabajadores de la economía gig, específicamente en los servicios de transporte urbano y entrega. Estado…
…
continue reading

101
Uruguay's Dual Digital Platform Regulation: Labor and Democratic Governance
5:33
5:33
Play later
Play later
Lists
Like
Liked
5:33The source provides an extensive analysis of Uruguay's efforts to regulate large digital platforms, identifying two distinct legislative tracks that characterize the nation's digital governance landscape. The first track successfully established Law 20.396, which focuses on labor regulation by setting minimum protections for gig economy workers and…
…
continue reading

1
173. What To Tell Your Divorce Attorney and What to Tell Your Friends- We Break it Down
43:43
43:43
Play later
Play later
Lists
Like
Liked
43:43When divorce gets messy, who gets the details, your best friend or your lawyer? Comedian Andrea Rappaport and family-law powerhouse Morgan L. Stogsdill break down exactly what belongs in your attorney’s inbox (strategy, facts, timelines, negotiations) and what belongs at brunch (feelings, venting, support). You’ll learn how to communicate efficient…
…
continue reading

101
Hactivism, Detention, and Digital Justice: Unpacking a Latin American Cybercrime Saga
35:42
35:42
Play later
Play later
Lists
Like
Liked
35:42These sources consist of transcripts from YouTube videos by the channel “CYBERMIDNIGHT CLUB,” primarily focusing on interviews and statements from a hacker known as Gob or Gob Etherium. The central topic is the arrest and imprisonment of Gob’s 18-year-old friend, Vlady, who is accused of various cybercrimes in Uruguay, including the defacement of t…
…
continue reading

1
Red Flag Forensics: How to Spot Stalkers, Scammers, and Cannibals on Dating Apps
33:45
33:45
Play later
Play later
Lists
Like
Liked
33:45A Beginner's Guide to Spotting Red Flags in Online DatingIntroduction: Trusting Your Gut in the Digital Dating World Online dating offers exciting possibilities, but your safety must be your first priority. This guide is not meant to scare you; it is meant to equip you. It will teach you to recognize the warning signs and manipulative tactics used …
…
continue reading

51
The Parmaster: Underground: Hacking, Madness, and Obsession on the Electronic Frontier
6:51
6:51
Play later
Play later
Lists
Like
Liked
6:51The provided excerpts, primarily sourced from Suelette Dreyfus and Julian Assange's work "Underground," examine the early culture, motives, and legal challenges faced by the international computer underground, particularly focusing on Australian hackers. They illustrate that early hacking communities formed on BBSes (Bulletin Board Systems), where …
…
continue reading

1
Putin’s Bears: World’s Most Dangerous Hackers
44:25
44:25
Play later
Play later
Lists
Like
Liked
44:25Case Study: Russian State-Sponsored Cyber Operations and their Geopolitical ImpactIntroduction: The Threat Doctrine of the "Bears" Russian state-sponsored cyber units, colloquially known as the "Bears," operate as direct instruments of national policy. Their actions extend far beyond traditional espionage, representing a strategic capability for de…
…
continue reading
De la Crisis al Ciberdelito: La Historia del Hacking en Argentina1. Introducción: El Nacimiento de una Cultura Única La cultura hacker en Argentina no surgió en un laboratorio tecnológico ni en un próspero entorno corporativo. Fue forjada en el crisol de una de las peores crisis socioeconómicas de su historia. La debacle de 2001 dio origen a una me…
…
continue reading

1
Estudio de Caso: Anatomía de una Estafa Cripto con Deepfakes de Elon Musk
6:04
6:04
Play later
Play later
Lists
Like
Liked
6:04Estudio de Caso: Anatomía de una Estafa Cripto con Deepfakes de Elon Musk1.0 Introducción: El Advenimiento de las Estafas Potenciadas por IA Las estafas en línea han evolucionado significativamente desde sus primeras iteraciones. Tácticas que alguna vez fueron prevalentes, como el conocido engaño del "Príncipe Nigeriano", han dado paso a operacione…
…
continue reading
La Trampa de Tinder The sources present a composite study of the dangers of online dating and the emergence of an unconventional media platform dedicated to cybersecurity and digital advocacy. One set of transcripts details several chilling dating app accounts, ranging from stories of near-abduction and ambushes in isolated locations to three separ…
…
continue reading

1
Kevin Powers: From Academic to Practical Cybersecurity
50:39
50:39
Play later
Play later
Lists
Like
Liked
50:39Kevin Powers, Faculty Director of the Masters of Legal Studies in Cybersecurity Risk and Governance at Boston College Law School, began his professional and academic journey when he volunteered for a task force exploring cybersecurity education at Boston College. Rather than developing a purely technical curriculum, he advocated for an interdiscipl…
…
continue reading
Un Análisis Exhaustivo de la Catástrofe Cibernética del Gobierno Uruguayo: Fallos Sistémicos, el Compromiso Fatal de 30.000 Certificados PKI de Identidad Nacional, y la Peligrosa Brecha entre la Ambición Digital y la Ineptitud Operacional.Fallo Sistémico (Systemic Failure): Se reporta un "fallo sistémico en la protección de la infraestructura críti…
…
continue reading

51
Uruguay's Digital Breach: A Crisis of Trust and Security
7:12
7:12
Play later
Play later
Lists
Like
Liked
7:12Analysis of Systemic Cybersecurity Failures in the Uruguayan GovernmentExecutive Summary This briefing analyzes a series of large-scale data breaches targeting Uruguayan government entities, which starkly contradict the nation's reputation as a digital leader in Latin America. Key findings reveal a systemic failure to protect citizen data and criti…
…
continue reading
Anonymous: We Are Legion. Expect Us. Dive into the chaotic world of Anonymous, the decentralized computer hacker group and serious political movement that became known as the "final boss of the internet". Anonymous is a collective of nameless, faceless folks who have achieved significant geopolitical impact worldwide. They are characterized as the …
…
continue reading

1
The Strategic Paradox: Inside Peru's Escalating Cyber Crisis—From Hacktivism to RaaS Extortion
6:56
6:56
Play later
Play later
Lists
Like
Liked
6:56Title: The Strategic Paradox: Inside Peru's Escalating Cyber Crisis—From Hacktivism to RaaS Extortion Description: In this episode, we dive deep into the dramatic escalation of cyber threats gripping Peru, a nation where rapid digital integration has consistently outpaced the development of national institutional capacity and legal enforcement, cre…
…
continue reading
The Prophet and the Storm Cybersecurity expert Alberto Daniel Hill delivers an unflinching analysis of the moment Uruguay’s celebrated reputation as a digital pioneer collapsed, arguing that the catastrophic 2025 BHU ransomware attack was not an isolated event, but the inevitable payment for years of accumulated "national cyber debt". This episode …
…
continue reading
The BHU Data Breach: How Uruguay’s Digital Star Fell Victim to the Crypto24 Ransomware and 95% Weak Passwords In September 2025, the state-owned Banco Hipotecario del Uruguay (BHU) suffered a catastrophic systems failure. While the institution quickly minimized the event as a manageable "incidente informático" or "problema técnico", cybersecurity e…
…
continue reading
Truth Inside BHU Cyberattack In this explosive episode, cybersecurity expert and renowned critic Alberto Daniel Hill rips apart the official narrative surrounding the catastrophic double-extortion ransomware attack on the Banco Hipotecario del Uruguay (BHU) that began in late September 2025. When the state-owned bank shut down its systems, official…
…
continue reading

1
The Art of Listening Without Ego: Bruce Cohen on Storytelling and Democracy
45:53
45:53
Play later
Play later
Lists
Like
Liked
45:53How do we tell stories that bring people together when everything else is pushing us apart? Oscar and Tony-winning producer Bruce Cohen, whose credits include American Beauty, Milk, Silver Linings Playbook, and Big Fish, joins The Caring Economy to talk about storytelling as an act of public service. In conversation with Toby Usnik, Bruce reflects …
…
continue reading

1
700 Gigabytes and a Guy Fawkes Mask: How Uruguay's Cyber Silence Led to the BHU Catastrophe
14:28
14:28
Play later
Play later
Lists
Like
Liked
14:28Hipotceario del Uruguay (BHU), where authorities characterized a massive 700GB data theft and extortion bythe group Crypto24 The source provides a forensic and geopolitical analysis of two major cyber incidents in Uruguay, contrasting the official institutional narratives with the detailed technical perspectives of security expert Alberto Hill. The…
…
continue reading

1
Sleuths & Systems: The Future of Private Investigation
13:10
13:10
Play later
Play later
Lists
Like
Liked
13:10Send us a text In this engaging episode of Hidden Threads, Macky Outlaw and Jus dive deep into the shadowy world of private investigation to debate a burning question: Will artificial intelligence take over the PI industry? From AI-driven surveillance and data crunching to facial recognition and predictive analytics, we unpack how tech is shaking u…
…
continue reading

1
Obscura Ransomware: Unmasking a Stealthy New Threat ⚠️
12:25
12:25
Play later
Play later
Lists
Like
Liked
12:25Got a question or comment? Message us here! In this week’s #SOCBrief, Hickman and Peters break down Obscura ... a new ransomware variant making waves with aggressive evasion tactics, process terminations, and domain controller targeting. We cover what’s known so far, the risks it poses to businesses, and the key defenses every SOC should prioritize…
…
continue reading

51
The Digital Dissident: Alberto Daniel Hill and the Battle for Transparency in Uruguayan Cybersecurity
6:48
6:48
Play later
Play later
Lists
Like
Liked
6:48Introduction: The Whistleblower’s Paradox For most nations, the line between a state-sponsored cybersecurity expert and a state-prosecuted criminal is clear. In Uruguay, that line runs through one man: Alberto Daniel Hill. He is a figure first imprisoned by the state for ethically reporting a critical vulnerability, only to emerge as the nation’s m…
…
continue reading

51
INFORME: Análisis Estratégico del Incidente de Ciberseguridad ANEP GURI (Octubre de 2025)
21:49
21:49
Play later
Play later
Lists
Like
Liked
21:49Preparado para: Supervisión del Sector Público e Iniciativas de Ciberresiliencia Analista: Alberto Daniel Hill (Analista de Ciberseguridad y Defensor de la Ciberjusticia) Fecha: Octubre de 2025 (Revisión Post-Incidente) El incidente de ciberseguridad dirigido a la Plataforma GURI (Gestión Unificada de Registros e Información) en octubre de 2025 rep…
…
continue reading

51
Caso Banco Hipotecario del Uruuguay - Analizando la narrativa oficial
6:17
6:17
Play later
Play later
Lists
Like
Liked
6:171. Introducción: Contexto de la Crisis y la Declaración Oficial El 30 de septiembre de 2025, el Banco Hipotecario del Uruguay (BHU) fue el epicentro de un ciberataque de alto perfil que culminó con el apagón total de su red el 1 de octubre, paralizando operaciones y exponiendo una cantidad masiva de datos sensibles. Casi dos semanas después, en med…
…
continue reading
In this episode, Adam Firman interviews Sonja Ryan, founder of the Carly Ryan Foundation, who shares her personal journey following the tragic loss of her daughter Carly to an online predator. Sonja discusses the foundation's mission to promote online safety for children, the introduction of Carly's Law in Australia, and the importance of education…
…
continue reading

1
Rethinking How Life Sciences Organizations Approach AI - Mathias Cousin of Deloitte
38:14
38:14
Play later
Play later
Lists
Like
Liked
38:14Today’s guest is Mathias Cousin, Managing Director at Deloitte. With extensive experience in R&D transformation and regulated industry data strategy, Mathias joins Emerj Editorial Director Matthew DeMello to unpack what it really takes for enterprise leaders to deliver ROI from AI and data initiatives. Mathias also shares actionable guidance on bui…
…
continue reading

1
Truth Under Fire: How PIs Macky Outlaw and Jus Majusiak Spot Lies in Interviews
17:47
17:47
Play later
Play later
Lists
Like
Liked
17:47Send us a text Join private investigators Macky Outlaw and Anthony "Jus" Majusiak as they pull back the curtain on the high-stakes world of lie detection. With years of experience grilling suspects, witnesses, and clients, Macky and Jus share their go-to techniques for uncovering deception in interviews. From reading micro-expressions and body lang…
…
continue reading

1
Streamlining Fund Compliance with AI-Ready Data - Sandro Venturini of UBS
21:47
21:47
Play later
Play later
Lists
Like
Liked
21:47Today’s guest is Sandro Venturini, Executive Director and Consultant at UBS. Specializing in cross-border fund structuring and regulatory strategy, he holds years of experience guiding financial institutions through complex launches across jurisdictions for the world’s largest private bank. Sandro joins Emerj Editorial Director Matthew DeMello on t…
…
continue reading

1
From Tool Sprawl to Defensible Value in AI for Legal - with Christo Siebrits of AbbVie
27:50
27:50
Play later
Play later
Lists
Like
Liked
27:50Today’s guest is Christo Siebrits, Senior Associate and General Counsel at AbbVie. With over 20 years of experience in global pharmaceutical legal and compliance leadership, Siebrits leads AbbVie’s AI initiatives and provides strategic guidance on AI-related legal and regulatory matters. Christo joins Emerj Editorial Director Matthew DeMello to dis…
…
continue reading

1
F is for Footprints – Tracing User Activity Across Systems
39:43
39:43
Play later
Play later
Lists
Like
Liked
39:43On this episode, we uncover how digital footprints—from browser history and shell commands to registry hives and DNS logs—reveal a user’s activity even when they think it’s been erased. Real cases, practical tools, and expert tips for tracing every click, command, and mistake. #FforForensics #DigitalFootprints #UserActivity #DigitalForensics #DFIR …
…
continue reading

1
Paraguayan Card Fraud: The First Data Currency Anomaly
6:53
6:53
Play later
Play later
Lists
Like
Liked
6:53The source material is an extensive report analyzing a major financial fraud incident that occurred in Uruguay between 2008 and 2014, rooted in a catastrophic software flaw within the First Data payment processing system for Maestro/Mastercard transactions. This defect created an immense arbitrage opportunity by incorrectly converting US Dollar pur…
…
continue reading

1
Analysis of Deep Fake Scams and Evolving Cybersecurity Threats
6:31
6:31
Play later
Play later
Lists
Like
Liked
6:31The source provides an audio transcript of a discussion focused on the prevalence and complexity of deepfake cryptocurrency scams, particularly those impersonating figures like Elon Musk. The conversation details a speaker's personal experience being relentlessly targeted by scammers, initially a woman from Nigeria who then transformed into various…
…
continue reading

151
GURI Dos Historias, Una Brecha. Por Alberto Daniel Hill.
6:44
6:44
Play later
Play later
Lists
Like
Liked
6:44La Plataforma GURI (Gestión Unificada de Registros e Información) es descrita en las fuentes como el sistema nervioso central para la educación primaria en Uruguay y es administrada bajo la Dirección General de Educación Inicial y Primaria (DGEIP/CEIP). Sus funciones principales son multifacéticas, abarcando roles esenciales de gestión de datos, ap…
…
continue reading

1
Crisis de Datos en URUGUAY: El Hackeo GURI, por Alberto Daniel Hill
6:24
6:24
Play later
Play later
Lists
Like
Liked
6:24Crisis de Datos en URUGUAY: El Hackeo GURI, por Alberto Daniel Hill Alberto Daniel Hill es identificado en los documentos como un experto en seguridad que contribuyó a las narrativas críticas y de análisis técnico en redes sociales (publicaciones en X), particularmente en relación con el incidente de ciberseguridad que afectó al Banco Hipotecario d…
…
continue reading

151
Un pantallazo: el hackeo al sistema GURI de la ANEP
5:26
5:26
Play later
Play later
Lists
Like
Liked
5:26Alberto Daniel Hill es identificado en los documentos como un experto en seguridad que contribuyó a las narrativas críticas y de análisis técnico en redes sociales (publicaciones en X), particularmente en relación con el incidente de ciberseguridad que afectó al Banco Hipotecario del Uruguay (BHU). Este incidente ocurrió de forma concurrente con el…
…
continue reading

151
En profundidad: El hackeo al sistema GURI de la ANEP
21:49
21:49
Play later
Play later
Lists
Like
Liked
21:49Alberto Daniel Hill es identificado en los documentos como un experto en seguridad que contribuyó a las narrativas críticas y de análisis técnico en redes sociales (publicaciones en X), particularmente en relación con el incidente de ciberseguridad que afectó al Banco Hipotecario del Uruguay (BHU). Este incidente ocurrió de forma concurrente con el…
…
continue reading