1. EachPod

Cybermidnight Club– Hackers, Cyber Security and Cyber Crime - Podcast

Cybermidnight Club– Hackers, Cyber Security and Cyber Crime

Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast.

In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that are central to our present digital age.

True Crime
Update frequency
every day
Average duration
53 minutes
Episodes
615
Years Active
2019 - 2025
Share to:
Dexer's Anonymous: A Hacktivist's Atonement.

Dexer's Anonymous: A Hacktivist's Atonement.

Alberto Daniel Hill introduces and reflects on a publication titled "My Life in Anonymous: An Atonement" by a former hacktivist known as Dexer. The discussion traces Dexer's decade-long journey from …

00:28:54  |   Sat 30 Aug 2025
Versión en español: Misterios Cibernéticos Mexicanos: De Grinberg a los Hackeos del Cartel

Versión en español: Misterios Cibernéticos Mexicanos: De Grinberg a los Hackeos del Cartel

Los textos proporcionados describen el podcast Cyber Midnight Club, presentado por el experto uruguayo en ciberseguridad Alberto Daniel Hill, que explora temas como la piratería, el cibercrimen y la …

00:17:04  |   Sat 30 Aug 2025
Mexican Cyber Mysteries: From Grinberg to Cartel Hacks

Mexican Cyber Mysteries: From Grinberg to Cartel Hacks

This briefing synthesizes information from "Cyber Midnight Club: Mexico's Digital Underbelly" and "Héctor López & Alberto Daniel Hill: Cybersecurity Collaboration" with the podcast "Jacobo Grinberg, …

00:42:44  |   Fri 29 Aug 2025
Uruguay's Cybersecurity Landscape: An Expert Analysis.

Uruguay's Cybersecurity Landscape: An Expert Analysis.

As your thought partner, I can help you quickly understand and analyze the provided information to formulate strategic recommendations for senior leadership. I will provide clear, concise, and well-s…

00:52:16  |   Thu 28 Aug 2025
The Global Cyber Threat Landscape 2024-2025.

The Global Cyber Threat Landscape 2024-2025.

The provided report offers an extensive overview of the global cyber threat landscape for 2024-2025, emphasizing the professionalization of cybercrime and its increasing entanglement with geopolitica…

00:06:31  |   Wed 27 Aug 2025
A Reunion After 18 Months: Cybersecurity and Human Connections on TWITTER SPACES.

A Reunion After 18 Months: Cybersecurity and Human Connections on TWITTER SPACES.

The provided sources offer a multifaceted conversation exploring challenges in the digital age, particularly concerning online platforms and free speech. They highlight personal struggles and emotion…

00:05:47  |   Wed 27 Aug 2025
Narco-Influencers: Mexico's Corrupted Landscape.

Narco-Influencers: Mexico's Corrupted Landscape.

Estos materiales exploran la creciente influencia de los narcos en la cultura digital mexicana, un fenómeno que se manifiesta a través de los "narcoinfluencers". Los textos describen cómo los cártele…

00:19:33  |   Tue 26 Aug 2025
ESPAÑOL: Narco-Influencers: El Paisaje Corrupto de México.

ESPAÑOL: Narco-Influencers: El Paisaje Corrupto de México.

La creciente influencia de los narcos en la cultura digital mexicana, un fenómeno que se extiende desde los tradicionales narcocorridos hasta las sofisticadas estrategias en redes sociales. El texto …

00:19:33  |   Tue 26 Aug 2025
ESPAÑOL: La brecha digital de Uruguay: una crisis de confianza y seguridad.

ESPAÑOL: La brecha digital de Uruguay: una crisis de confianza y seguridad.

Este informe analiza extensas violaciones de datos que afectan a las entidades gubernamentales uruguayas, revelando una disparidad significativa entre la reputación de liderazgo digital de la nación …

00:23:10  |   Tue 26 Aug 2025
Uruguay's Digital Breach: A Crisis of Trust and Security

Uruguay's Digital Breach: A Crisis of Trust and Security

This report analyzes extensive data breaches affecting Uruguayan government entities, revealing a significant disparity between the nation's reputation for digital leadership and its actual cybersecu…

00:46:30  |   Mon 25 Aug 2025
X Corp.'s Content Moderation Practices and Challenges.

X Corp.'s Content Moderation Practices and Challenges.

This research offers an expert analysis of X's (formerly Twitter's) account suspension and moderation practices, highlighting a significant disconnect between its stated commitment to "free speech" a…

00:47:23  |   Mon 25 Aug 2025
Image-Based Sexual Abuse: Global Analysis and Legal Responses.

Image-Based Sexual Abuse: Global Analysis and Legal Responses.

This comprehensive document analyzes image-based sexual abuse (IBSA), moving beyond the misnomer of "revenge porn" to define it as the non-consensual distribution of intimate images (NDII), often dri…

00:52:39  |   Sun 24 Aug 2025
Book overview: The Satoshi Variant: An Accidental Genesis Block.

Book overview: The Satoshi Variant: An Accidental Genesis Block.

This is an overview of a fictional narrative about a woman named Ana, a "Digital Thanatologist" who specializes in decommissioning AI, and her unexpected relationship with an entity calling himself S…

00:07:21  |   Sun 24 Aug 2025
Email Spoofing: Deception, Detection, and Defense.

Email Spoofing: Deception, Detection, and Defense.

The provided text examines the fundamental vulnerability of email spoofing, stemming from the original design of the Simple Mail Transfer Protocol (SMTP) which separates the sender's transport addres…

00:38:46  |   Sun 24 Aug 2025
The Controversial World of Jonathan Scott's Cybersecurity Claims

The Controversial World of Jonathan Scott's Cybersecurity Claims

The provided text analyzes Jonathan Scott, also known as @jonathandata1, a figure in cybersecurity known for his polarizing claims. Scott presents himself as an expert in mobile malware and digital f…

00:33:16  |   Sat 23 Aug 2025
An Alberto Birthday Roast and Celebration

An Alberto Birthday Roast and Celebration

The provided text captures an audio space conversation celebrating Alberto's birthday, with various participants sharing personal anecdotes and well-wishes. The discussion covers a wide range of topi…

00:25:51  |   Sat 23 Aug 2025
Underground: Hacking, Madness, and Obsession on the Electronic Frontier.

Underground: Hacking, Madness, and Obsession on the Electronic Frontier.

The provided sources analyze the extraordinary activity of Alberto Daniel Hill (adanielhill) on X Spaces, highlighting his unprecedented hosting frequency and engagement. Since 2021, he has hosted ne…

00:36:32  |   Sat 23 Aug 2025
Free Vlady: Cybersecurity and the Law in Uruguay.

Free Vlady: Cybersecurity and the Law in Uruguay.

These sources consist of transcripts from YouTube videos by the channel "CYBERMIDNIGHT CLUB," primarily focusing on interviews and statements from a hacker known as Gob or Gob Etherium. The central t…

00:35:42  |   Sat 23 Aug 2025
Anonymous: Legion of Hacktivists.

Anonymous: Legion of Hacktivists.

The provided text explores the origins and evolution of the hacker collective Anonymous, tracing its roots from humorous pranks within MIT's Model Railroad Club to the unfiltered environment of 4chan…

00:08:09  |   Fri 22 Aug 2025
Cartel Surveillance: FBI Informants Targeted in Mexico City.

Cartel Surveillance: FBI Informants Targeted in Mexico City.

Cartel Surveillance: FBI Informants Targeted in Mexico City2 sources

The sources explore two distinct facets of digital activity: cybersecurity and its misuse. One source focuses on "Spydirbyte," a se…

00:45:44  |   Fri 22 Aug 2025
Disclaimer: The podcast and artwork embedded on this page are the property of Alberto Daniel Hill. This content is not affiliated with or endorsed by eachpod.com.