Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
Information you will not read about in the press... by @adanielhill 1st hacker that served time in prision in #uruguay for a computer crime. https://my.darkweb.today/mydarkweb/
…
continue reading
1
The Digital Dissident: Alberto Daniel Hill and the Battle for Transparency in Uruguayan Cybersecurity
6:48
6:48
Play later
Play later
Lists
Like
Liked
6:48Introduction: The Whistleblower’s Paradox For most nations, the line between a state-sponsored cybersecurity expert and a state-prosecuted criminal is clear. In Uruguay, that line runs through one man: Alberto Daniel Hill. He is a figure first imprisoned by the state for ethically reporting a critical vulnerability, only to emerge as the nation’s m…
…
continue reading
1
Mexico’s Corruption, Violence, and Impunity Crisis
48:26
48:26
Play later
Play later
Lists
Like
Liked
48:26Context and the Surrounding Situation in Mexico Héctor López, an ethical hacker and cybersecurity educator based in Guanajuato, Mexico, joined the Twitter Space because he woke up very early with intense anxiety and insomnia (“bien ansioso”) over the catastrophic national security and political situation in Mexico. The immediate trigger for his dis…
…
continue reading
51
Anonymous and the Hydra: The Digital Vigilantes Fighting Child Exploitation—Methods, Morality, and 250 FBI Probes
16:51
16:51
Play later
Play later
Lists
Like
Liked
16:51An overview of #OpChildSafety, an ongoing hacktivist operation founded by the decentralized collective Anonymous, which focuses on digital vigilantism to protect minors from online child exploitation. This dedicated effort emerged as part of Anonymous' broader campaigns, gaining prominence between 2018 and 2024, motivated in part by perceived limit…
…
continue reading
51
The 764 Network: Decoding the Hydra of Online Extremism, Child Exploitation, and Real-World Murder
29:49
29:49
Play later
Play later
Lists
Like
Liked
29:49The sources provide a comprehensive overview of the 764 network, classified as a decentralized, international online group operating as a violent extremist organization primarily targeting minors for grooming, sextortion, and coercion into self-harm. Originating around 2021 as an offshoot of an earlier group called CVLT, the network employs sophist…
…
continue reading
An overview of #OpChildSafety, an ongoing hacktivist operation founded by the decentralized collective Anonymous, which focuses on digital vigilantism to protect minors from online child exploitation. This dedicated effort emerged as part of Anonymous' broader campaigns, gaining prominence between 2018 and 2024, motivated in part by perceived limit…
…
continue reading
1
The 764 Network: Threats, Tactics, and Response
6:12
6:12
Play later
Play later
Lists
Like
Liked
6:12A comprehensive overview of the 764 network, classified as a decentralized, international online group operating as a violent extremist organization primarily targeting minors for grooming, sextortion, and coercion into self-harm. Originating around 2021 as an offshoot of an earlier group called CVLT, the network employs sophisticated psychological…
…
continue reading
1
Crypto24 Ransomware: Stealth Attacks Blending Legitimate Tools
8:10
8:10
Play later
Play later
Lists
Like
Liked
8:10These sources provide a detailed comparative analysis of two significant ransomware threats: Crypto24 and LockBit. The first source offers a side-by-side comparison, establishing that LockBit operates as a massive Ransomware-as-a-Service (RaaS) model with highly variable tactics due to its use of affiliates, while the newer Crypto24 is characterize…
…
continue reading
1
The Crypto24 Playbook: An Analysis of the Banco Hipotecario del Uruguay Ransomware Campaign
47:39
47:39
Play later
Play later
Lists
Like
Liked
47:39The sources consist of an in-depth LinkedIn article detailing the Crypto24 ransomware attack on a bank and a LinkedIn error page that suggests alternative content to explore. The article, written by Michael Slowik, explains how the Crypto24 group successfully breached the bank by exploiting basic security vulnerabilities such as weak passwords and …
…
continue reading
1
Uruguay’s Digital Sovereignty Battle Combating Corporate Censorship with Labor Law and Algorithmic Transparency
5:33
5:33
Play later
Play later
Lists
Like
Liked
5:33A Regulatory Crossroads for Uruguay’s Digital Future Uruguay stands at a critical juncture in the formation of its digital policy, navigating a landscape defined by a stark “policy bifurcation.” This division is evident in the contrast between two distinct regulatory efforts: the swift, consensus-driven passage of a law governing the economic and l…
…
continue reading
1
John McAfee's Final Interview: On the Run, Crypto, and Psychedelics.
5:30
5:30
Play later
Play later
Lists
Like
Liked
5:30The source provides excerpts from a transcript of a video interview with John McAfee, the British-American computer programmer and founder of the McAfee software company. McAfee, who notes he and his wife Janice are on the run from US authorities, discusses his rejection of traditional finance and investment, favoring cryptocurrencies like Monero a…
…
continue reading
1
Briefing de Políticas: La Intersección de Vulnerabilidades Cibernéticas, Corrupción Sistémica y Poder del Crimen Organizado en México
59:07
59:07
Play later
Play later
Lists
Like
Liked
59:07Un Nuevo Paradigma de Amenaza Híbrida Este briefing tiene como propósito analizar la convergencia de tres fuerzas que están redefiniendo el panorama de la seguridad en México: la creciente sofisticación tecnológica del crimen organizado, la existencia de vulnerabilidades digitales críticas en la infraestructura nacional y una corrupción institucion…
…
continue reading
1
El Secuestro Digital del Banco Hipotecario: Crónica de un Ciberataque Anunciado
57:50
57:50
Play later
Play later
Lists
Like
Liked
57:50Cuando se Apagaron las Luces El 30 de septiembre de 2025, una sombra digital se cernió sobre Uruguay. El Banco Hipotecario (BHU), una entidad estatal clave para la vivienda y la economía del país, sufrió un apagón total en su red. Este evento no fue un “incidente informático” aislado, como insistieron las voces oficiales. Fue la materialización pre…
…
continue reading
1
The Sky is Leaking: A Case Study on Unencrypted Satellite Data
7:07
7:07
Play later
Play later
Lists
Like
Liked
7:07The source, a transcript from a YouTube video titled "HACKEAN A LA GUARDIA NACIONAL," discusses a critical cybersecurity vulnerability involving geo-stationary satellites where sensitive data is transmitted unencrypted. Researchers from the University of California San Diego and the University of Maryland demonstrated that with readily available eq…
…
continue reading
1
El Cielo Espía: Cómo una Antena Satelital Reveló Secretos a Plena Vista
6:32
6:32
Play later
Play later
Lists
Like
Liked
6:32En la azotea de una universidad, un grupo de “cerebritos”, como los llama su fuente, apuntó una antena hacia el cielo. No buscaban estrellas ni señales extraterrestres. Buscaban secretos. Y con un equipo de apenas 14,000 pesos mexicanos, encontraron más de los que jamás imaginaron, desvelando las comunicaciones internas de la Guardia Nacional de Mé…
…
continue reading
1
Huawei: La Historia del Gigante Tecnológico y la Operación Secreta que lo Acechó
7:32
7:32
Play later
Play later
Lists
Like
Liked
7:321. Introducción: Un Router Comprometido en Irán En 2010, un router Huawei recién instalado en la oficina de un político iraní se convirtió en la herramienta de vigilancia perfecta. Sin que nadie lo supiera, una falla de diseño permitía a un atacante eludir la contraseña con un simple comando, una “llave maestra” digital que abría la puerta a todos …
…
continue reading
1
The Dragon's Network: Huawei, the NSA, and the Secret War for Global Tech Supremacy
7:44
7:44
Play later
Play later
Lists
Like
Liked
7:44The source provides an overview of Operation Shotgiant, a sophisticated cyber-espionage effort by the National Security Agency (NSA) of the United States targeting the Chinese telecommunications giant, Huawei. The operation began with an effort to determine if Huawei was spying on behalf of the Chinese government, as well as to map the company's in…
…
continue reading
1
La Historia de Shady Rat: El Ciberataque que Redefinió el Espionaje Digital
7:17
7:17
Play later
Play later
Lists
Like
Liked
7:17Introducción: Un Cebo en la RedEn diciembre de 2012, el investigador de ciberseguridad Kyle Wilhoit lanzó un experimento fascinante. Creó una planta de tratamiento de agua completamente virtual, con sistemas de control industrial, documentación detallada y hasta un sitio web. Aunque supuestamente estaba ubicada en Missouri, en realidad funcionaba d…
…
continue reading
1
Operation Shady Rat: China's Cyber Espionage Engine
7:44
7:44
Play later
Play later
Lists
Like
Liked
7:44The source provides an overview of Operation Shady Rat, a long-running, extensive campaign of cyber-espionage attributed to a unit of the Chinese military (Unit 61398) starting around 2006. This operation involved Advanced Persistent Threats (APTs) utilizing simple but effective spear-phishing emails to install malware (often referred to as a "rat"…
…
continue reading
1
De lo Falsificado a lo Digital: La Sorprendente Evolución del Imperio Criminal de Corea del Norte
8:08
8:08
Play later
Play later
Lists
Like
Liked
8:08Introducción: El Asalto de los $600 Millones En marzo de 2022, millones de jugadores del popular videojuego Axie Infinity comenzaron a experimentar algo extraño. Lo que al principio parecía una simple falla técnica —algunas funciones dejaron de responder— pronto se reveló como algo mucho más siniestro. El sistema no se podía arreglar porque no esta…
…
continue reading
1
From Super Dollars to Super Hackers: The Secret History of North Korea's Criminal Empire
7:34
7:34
Play later
Play later
Lists
Like
Liked
7:34The video transcript explores the phenomenon of highly effective North Korean state-sponsored hacking, contrasting this technological prowess with the nation's overall economic poverty and technological isolation enforced by its Juche ideology. It details how the government identifies and trains gifted math and science students to become hackers, o…
…
continue reading
1
La Guerra por la PS3: La Historia del Hackeo a PlayStation Network
7:10
7:10
Play later
Play later
Lists
Like
Liked
7:10Introducción: El Apagón que Conmocionó al Mundo de los Videojuegos El 20 de abril de 2011, el universo de los videojuegos se detuvo. Sin previo aviso, una fuerza misteriosa desconectó la PlayStation Network (PSN) de Sony, sumiendo a millones de jugadores en un silencio digital. Lo que comenzó como una simple interrupción del servicio se convirtió r…
…
continue reading
The source, an excerpt from a YouTube video transcript, offers a detailed account of the events surrounding the 2011 PlayStation Network (PSN) hack. It begins by introducing George "GeoHot" Hotz, a renowned hacker who first gained fame by jailbreaking the iPhone and later successfully hacked the PS3 console, challenging Sony's proprietary control o…
…
continue reading
The sources comprise a transcript of a YouTube video titled "Saving Samantha on Twitter Spaces" and a Spotify podcast listing for the same event, hosted by the "Cybermidnight Club – Hackers, Cyber Security and Cyber Crime." The primary source, the transcript, documents a live, often chaotic discussion among several individuals—Alberto, Sapit, Nana,…
…
continue reading
The provided texts offer two distinct perspectives on modern forms of influence and security, with the Darknet Diaries podcast excerpts exploring the history and function of PSYOP (Psychological Operations), or Military Information Support Operations (MISO). These audio transcripts explain how the US military uses non-lethal methods—including leafl…
…
continue reading
1
The Soul of the Machine: A Beginner’s Guide to “The Hacker’s Manifesto”
6:05
6:05
Play later
Play later
Lists
Like
Liked
6:051. Introduction: The Voice from the Wires It’s 1986. The headlines are stark and sensational: “Teenager arrested in computer crime scandal”, “Hacker arrested after bank tampering”. To the public, these are simple stories of digital delinquency. But from behind the keyboard, a different voice emerges—a passionate, defiant defense of an entire cultur…
…
continue reading
1
The Unsafe Space: A Story of a Conversation Gone Wrong. Social media, social audio, twitter, x
14:04
14:04
Play later
Play later
Lists
Like
Liked
14:04Introduction: The Promise of a Safe Place Online On the internet, a “safe space” is a powerful idea. It’s meant to be a community where people can share difficult, painful experiences—especially when they feel wronged by powerful systems like governments, corporations, or universities—and be met with support and understanding. It’s a place built on…
…
continue reading
1
The Uruguayan Cyber-Dilemma: A Deep Dive into National Strategy, Legal Enforcement, and the Transparency Deficit (2024–2025)
5:41
5:41
Play later
Play later
Lists
Like
Liked
5:41The Uruguayan Cyber-Dilemma—A Critical AnalysisPresenter: Alberto Daniel Hill (Ethical Hacker, Forensic Expert, and Defender of Knowledge)Part 1 of 4: The Personal Cost of Transparency and the True Ethos of HackingI stand before you today not just as an expert in forensic science and ethical hacking, but as someone who has experienced firsthand the…
…
continue reading
1
Analysis of Twitter Space: “Ecos del Pasado en la Era Digital”
34:40
34:40
Play later
Play later
Lists
Like
Liked
34:40The source text is comprised of excerpts from a long-form, multi-topic audio discussion, which covers a wide array of subjects including personal relationships and intimacy, as indicated by early commentary on communication and sexual expression. A significant portion of the conversation focuses on geo-political and social issues, such as the perce…
…
continue reading
1
The takedown of the ‘Dictadores’ syndicate was not the story of a lone hacker in a basement. It was the dismantling of a structured, professional criminal organization
6:44
6:44
Play later
Play later
Lists
Like
Liked
6:44The takedown of the ‘Dictadores’ syndicate was not the story of a lone hacker in a basement. It was the dismantling of a structured, professional criminal organization Introduction: Two Hackers, Two Different Worlds In Argentina, law enforcement dismantles a sophisticated syndicate with direct ties to narco-traffickers, a group that built custom so…
…
continue reading
1
Análisis de la Regulación de Plataformas Digitales en Uruguay
20:58
20:58
Play later
Play later
Lists
Like
Liked
20:58Análisis de la Regulación de Plataformas Digitales en UruguayResumen EjecutivoEl panorama regulatorio de las grandes plataformas digitales en Uruguay se caracteriza por una marcada bifurcación de políticas, avanzando en dos vías paralelas y distintas. La primera vía, la Regulación Laboral (Ley 20.396), ya ha sido promulgada y reglamentada. Esta ley…
…
continue reading
1
Análisis de la Regulación de Plataformas Digitales en Uruguay
6:08
6:08
Play later
Play later
Lists
Like
Liked
6:08La regulación de las plataformas digitales en Uruguay se desarrolla a través de dos trayectorias legislativas distintas y paralelas. Este camino legislativo, impulsado por el Poder Ejecutivo, se centra en establecer protecciones mínimas para los trabajadores de la economía gig, específicamente en los servicios de transporte urbano y entrega. Estado…
…
continue reading
1
Uruguay's Dual Digital Platform Regulation: Labor and Democratic Governance
5:33
5:33
Play later
Play later
Lists
Like
Liked
5:33The source provides an extensive analysis of Uruguay's efforts to regulate large digital platforms, identifying two distinct legislative tracks that characterize the nation's digital governance landscape. The first track successfully established Law 20.396, which focuses on labor regulation by setting minimum protections for gig economy workers and…
…
continue reading
1
Hactivism, Detention, and Digital Justice: Unpacking a Latin American Cybercrime Saga
35:42
35:42
Play later
Play later
Lists
Like
Liked
35:42These sources consist of transcripts from YouTube videos by the channel “CYBERMIDNIGHT CLUB,” primarily focusing on interviews and statements from a hacker known as Gob or Gob Etherium. The central topic is the arrest and imprisonment of Gob’s 18-year-old friend, Vlady, who is accused of various cybercrimes in Uruguay, including the defacement of t…
…
continue reading
1
Red Flag Forensics: How to Spot Stalkers, Scammers, and Cannibals on Dating Apps
33:45
33:45
Play later
Play later
Lists
Like
Liked
33:45A Beginner's Guide to Spotting Red Flags in Online DatingIntroduction: Trusting Your Gut in the Digital Dating World Online dating offers exciting possibilities, but your safety must be your first priority. This guide is not meant to scare you; it is meant to equip you. It will teach you to recognize the warning signs and manipulative tactics used …
…
continue reading
1
The Parmaster: Underground: Hacking, Madness, and Obsession on the Electronic Frontier
6:51
6:51
Play later
Play later
Lists
Like
Liked
6:51The provided excerpts, primarily sourced from Suelette Dreyfus and Julian Assange's work "Underground," examine the early culture, motives, and legal challenges faced by the international computer underground, particularly focusing on Australian hackers. They illustrate that early hacking communities formed on BBSes (Bulletin Board Systems), where …
…
continue reading
1
Putin’s Bears: World’s Most Dangerous Hackers
44:25
44:25
Play later
Play later
Lists
Like
Liked
44:25Case Study: Russian State-Sponsored Cyber Operations and their Geopolitical ImpactIntroduction: The Threat Doctrine of the "Bears" Russian state-sponsored cyber units, colloquially known as the "Bears," operate as direct instruments of national policy. Their actions extend far beyond traditional espionage, representing a strategic capability for de…
…
continue reading
De la Crisis al Ciberdelito: La Historia del Hacking en Argentina1. Introducción: El Nacimiento de una Cultura Única La cultura hacker en Argentina no surgió en un laboratorio tecnológico ni en un próspero entorno corporativo. Fue forjada en el crisol de una de las peores crisis socioeconómicas de su historia. La debacle de 2001 dio origen a una me…
…
continue reading
1
Estudio de Caso: Anatomía de una Estafa Cripto con Deepfakes de Elon Musk
6:04
6:04
Play later
Play later
Lists
Like
Liked
6:04Estudio de Caso: Anatomía de una Estafa Cripto con Deepfakes de Elon Musk1.0 Introducción: El Advenimiento de las Estafas Potenciadas por IA Las estafas en línea han evolucionado significativamente desde sus primeras iteraciones. Tácticas que alguna vez fueron prevalentes, como el conocido engaño del "Príncipe Nigeriano", han dado paso a operacione…
…
continue reading
La Trampa de Tinder The sources present a composite study of the dangers of online dating and the emergence of an unconventional media platform dedicated to cybersecurity and digital advocacy. One set of transcripts details several chilling dating app accounts, ranging from stories of near-abduction and ambushes in isolated locations to three separ…
…
continue reading
Un Análisis Exhaustivo de la Catástrofe Cibernética del Gobierno Uruguayo: Fallos Sistémicos, el Compromiso Fatal de 30.000 Certificados PKI de Identidad Nacional, y la Peligrosa Brecha entre la Ambición Digital y la Ineptitud Operacional.Fallo Sistémico (Systemic Failure): Se reporta un "fallo sistémico en la protección de la infraestructura críti…
…
continue reading
1
Uruguay's Digital Breach: A Crisis of Trust and Security
7:12
7:12
Play later
Play later
Lists
Like
Liked
7:12Analysis of Systemic Cybersecurity Failures in the Uruguayan GovernmentExecutive Summary This briefing analyzes a series of large-scale data breaches targeting Uruguayan government entities, which starkly contradict the nation's reputation as a digital leader in Latin America. Key findings reveal a systemic failure to protect citizen data and criti…
…
continue reading
Anonymous: We Are Legion. Expect Us. Dive into the chaotic world of Anonymous, the decentralized computer hacker group and serious political movement that became known as the "final boss of the internet". Anonymous is a collective of nameless, faceless folks who have achieved significant geopolitical impact worldwide. They are characterized as the …
…
continue reading
1
The Strategic Paradox: Inside Peru's Escalating Cyber Crisis—From Hacktivism to RaaS Extortion
6:56
6:56
Play later
Play later
Lists
Like
Liked
6:56Title: The Strategic Paradox: Inside Peru's Escalating Cyber Crisis—From Hacktivism to RaaS Extortion Description: In this episode, we dive deep into the dramatic escalation of cyber threats gripping Peru, a nation where rapid digital integration has consistently outpaced the development of national institutional capacity and legal enforcement, cre…
…
continue reading
The Prophet and the Storm Cybersecurity expert Alberto Daniel Hill delivers an unflinching analysis of the moment Uruguay’s celebrated reputation as a digital pioneer collapsed, arguing that the catastrophic 2025 BHU ransomware attack was not an isolated event, but the inevitable payment for years of accumulated "national cyber debt". This episode …
…
continue reading
The BHU Data Breach: How Uruguay’s Digital Star Fell Victim to the Crypto24 Ransomware and 95% Weak Passwords In September 2025, the state-owned Banco Hipotecario del Uruguay (BHU) suffered a catastrophic systems failure. While the institution quickly minimized the event as a manageable "incidente informático" or "problema técnico", cybersecurity e…
…
continue reading
Truth Inside BHU Cyberattack In this explosive episode, cybersecurity expert and renowned critic Alberto Daniel Hill rips apart the official narrative surrounding the catastrophic double-extortion ransomware attack on the Banco Hipotecario del Uruguay (BHU) that began in late September 2025. When the state-owned bank shut down its systems, official…
…
continue reading
1
700 Gigabytes and a Guy Fawkes Mask: How Uruguay's Cyber Silence Led to the BHU Catastrophe
14:28
14:28
Play later
Play later
Lists
Like
Liked
14:28Hipotceario del Uruguay (BHU), where authorities characterized a massive 700GB data theft and extortion bythe group Crypto24 The source provides a forensic and geopolitical analysis of two major cyber incidents in Uruguay, contrasting the official institutional narratives with the detailed technical perspectives of security expert Alberto Hill. The…
…
continue reading
1
INFORME: Análisis Estratégico del Incidente de Ciberseguridad ANEP GURI (Octubre de 2025)
21:49
21:49
Play later
Play later
Lists
Like
Liked
21:49Preparado para: Supervisión del Sector Público e Iniciativas de Ciberresiliencia Analista: Alberto Daniel Hill (Analista de Ciberseguridad y Defensor de la Ciberjusticia) Fecha: Octubre de 2025 (Revisión Post-Incidente) El incidente de ciberseguridad dirigido a la Plataforma GURI (Gestión Unificada de Registros e Información) en octubre de 2025 rep…
…
continue reading
1
Caso Banco Hipotecario del Uruuguay - Analizando la narrativa oficial
6:17
6:17
Play later
Play later
Lists
Like
Liked
6:171. Introducción: Contexto de la Crisis y la Declaración Oficial El 30 de septiembre de 2025, el Banco Hipotecario del Uruguay (BHU) fue el epicentro de un ciberataque de alto perfil que culminó con el apagón total de su red el 1 de octubre, paralizando operaciones y exponiendo una cantidad masiva de datos sensibles. Casi dos semanas después, en med…
…
continue reading