Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
Similar Podcasts

24H24L
Evento en línea, de 24 horas de duración que consiste en la emisión de 24 audios de diversas temáticas sobre GNU/Linux. Estos son los audios del evento en formato podcast.

CppCast
Every two weeks, or so, we sit down with guests from the C++ community to discuss the latest news and what they have been up to. Find us at cppcast.com

The Infinite Monkey Cage
Brian Cox and Robin Ince host a witty, irreverent look at the world through scientists' eyes.
Crypto AG, Part 2: The Death of Bo Jr.
Crypto AG, Part 2: The Death of Bo Jr.Advertising Inquiries: https://redcircle.com/brands
Why Do APTs Use Ransomware? [ML B-Side]
Assaf Dahan, Head of Threat Research with the Cybereason Nocturnus Team, discusses new discoveries about Iranian APTs Moses Staff and Phosphorus that blur the line between state-sponsored attacks and criminal activity.
Why do APTs use Ransomeware? [ML BSide]
Why APTs use Ransomeware? [ML BSide]Advertising Inquiries: https://redcircle.com/brands
Crypto AG – The Greatest Espionage Operation Ever, Part 1
General McArthur, Egpyt's Anwar Sadat, and Iran's Ayatollah Khomeini: These are just a few of the dozens, likely hundreds of targets of arguably the biggest, most ambitious hacking operation ever. A secret mission that lasted nearly a century, and influenced the course of so many of the most important events of history. The history you thought you knew.
Crypto AG - The Greatest Espionage Operation Ever, Part 1
Crypto AG - The Greatest Espionage Operation Ever, Part 1Advertising Inquiries: https://redcircle.com/brands
Why aren’t SMBs investing in Cyber Security? [ML B-Side]
Attacks against Small-to-Medium size businesses currently represent roughly 40% to 50% of all data breaches. Josh Ablett, founder and CISO of Adelia Risk, speaks with Nate Nelsn about the kind of security he usually finds in SMBs when he’s called in to make an initial security assessment - spoiler: not a pretty picture - the impact of data breaches on SMBs, and what role do insurance companies play in improving the state of security in that often overlooked segment of the industry.
Why aren't SMBs investing in Cyber Security? [ML B-Side]
Why aren't SMBs investing in Cyber Security? [ML B-Side]Advertising Inquiries: https://redcircle.com/brands
The Bloody Origins of Israel’s Cyber Security Industry
Israel is a small country - yet its cyber security industry is exceptionally successful. In this episode, we go back to the Yom Kippur War of 1973, to discover how a national trauma and an Intelligence failure paved the way for Israel to become a cyber security mini-empire.
The Bloody Origins of Israel's Cyber Security Industry
The Bloody Origins of Israel's Cyber Security IndustryAdvertising Inquiries: https://redcircle.com/brands
Hacker Highschool: Pete Herzog [ML BSide]
In the late ’80s to early 2000s, the NSA transitioned from being a hardware-first organization - that is, creating and operating physical spying devices - to software-first: excelling in hacking networks, tracking people online, etc. That transition was by no means easy: the NSA, by that point, was a huge organization - and big organizations are notorious for being very resistant to change. Jeff Man, our guest today, was one of the first people at the NSA to make the transition from hardware to software, and he shares with us his experiences from that period.
Hacker Highschool: Pete Herzog [ML BSide]
Hacker Highschool: Pete Herzog [ML BSide]Advertising Inquiries: https://redcircle.com/brands
The Mystery of Cicada 3301
"Hello. We are looking for highly intelligent individuals. To find them, we have devised a test." These words, found in a message posted on 4Chan in January 2012, started a global 'treasure hunt' - with thousands of puzzle-loving and curious individuals desperately competing with one another to be the first to crack the devilish puzzles created by the mysterious Cicada 3301. Who is Cicada, and what are their goals?
The Mystery of Cicada 3301
The Mystery of Cicada 3301Advertising Inquiries: https://redcircle.com/brands
How the Internet Changed the NSA [ML BSide]
In the late ’80s to early 2000s, the NSA transitioned from being a hardware-first organization - that is, creating and operating physical spying devices - to software-first: excelling in hacking networks, tracking people online, etc. That transition was by no means easy: the NSA, by that point, was a huge organization - and big organizations are notorious for being very resistant to change. Jeff Man, our guest today, was one of the first people at the NSA to make the transition from hardware to software, and he shares with us his experiences from that period.
How the Internet Changed the NSA
How the Internet Changed the NSAAdvertising Inquiries: https://redcircle.com/brands