Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.

Similar Podcasts

The Infinite Monkey Cage

The Infinite Monkey Cage
Brian Cox and Robin Ince host a witty, irreverent look at the world through scientists' eyes.

The Top Shelf

The Top Shelf
ThePrimeagen and teej_dv are on a quest to find the best possible technical speakers and ask the best possible questions we can find. You all know ThePrimeagen can't read, so this is a great format for him to really shine. Teej is here to make sure that Prime knows who the guest is and also to interrupt Prime wherever possible

24H24L

24H24L
Evento en línea, de 24 horas de duración que consiste en la emisión de 24 audios de diversas temáticas sobre GNU/Linux. Estos son los audios del evento en formato podcast.

Why do APTs use Ransomeware? [ML BSide]

February 14, 2022 0:17:04 16.39 MB Downloads: 0

Why APTs use Ransomeware? [ML BSide]Advertising Inquiries: https://redcircle.com/brands

Crypto AG – The Greatest Espionage Operation Ever, Part 1

February 07, 2022 27:10 26.08 MB Downloads: 0

General McArthur, Egpyt's Anwar Sadat, and Iran's Ayatollah Khomeini: These are just a few of the dozens, likely hundreds of targets of arguably the biggest, most ambitious hacking operation ever. A secret mission that lasted nearly a century, and influenced the course of so many of the most important events of history. The history you thought you knew.

Crypto AG - The Greatest Espionage Operation Ever, Part 1

February 07, 2022 0:27:10 26.08 MB Downloads: 0

Crypto AG - The Greatest Espionage Operation Ever, Part 1Advertising Inquiries: https://redcircle.com/brands

Why aren’t SMBs investing in Cyber Security? [ML B-Side]

January 31, 2022 22:51 21.94 MB Downloads: 0

Attacks against Small-to-Medium size businesses currently represent roughly 40% to 50% of all data breaches. Josh Ablett, founder and CISO of Adelia Risk, speaks with Nate Nelsn about the kind of security he usually finds in SMBs when he’s called in to make an initial security assessment - spoiler: not a pretty picture - the impact of data breaches on SMBs, and what role do insurance companies play in improving the state of security in that often overlooked segment of the industry.

Why aren't SMBs investing in Cyber Security? [ML B-Side]

January 31, 2022 0:22:51 21.94 MB Downloads: 0

Why aren't SMBs investing in Cyber Security? [ML B-Side]Advertising Inquiries: https://redcircle.com/brands

The Bloody Origins of Israel’s Cyber Security Industry

January 25, 2022 35:46 34.33 MB Downloads: 0

Israel is a small country - yet its cyber security industry is exceptionally successful. In this episode, we go back to the Yom Kippur War of 1973, to discover how a national trauma and an Intelligence failure paved the way for Israel to become a cyber security mini-empire.

The Bloody Origins of Israel's Cyber Security Industry

January 25, 2022 0:35:45 34.33 MB Downloads: 0

The Bloody Origins of Israel's Cyber Security IndustryAdvertising Inquiries: https://redcircle.com/brands

Hacker Highschool: Pete Herzog [ML BSide]

January 17, 2022 28:53 27.73 MB Downloads: 0

In the late ’80s to early 2000s, the NSA transitioned from being a hardware-first organization - that is, creating and operating physical spying devices - to software-first: excelling in hacking networks, tracking people online, etc. That transition was by no means easy: the NSA, by that point, was a huge organization - and big organizations are notorious for being very resistant to change. Jeff Man, our guest today, was one of the first people at the NSA to make the transition from hardware to software, and he shares with us his experiences from that period.

Hacker Highschool: Pete Herzog [ML BSide]

January 17, 2022 0:28:53 27.73 MB Downloads: 0

Hacker Highschool: Pete Herzog [ML BSide]Advertising Inquiries: https://redcircle.com/brands

The Mystery of Cicada 3301

January 10, 2022 35:00 33.59 MB Downloads: 0

"Hello. We are looking for highly intelligent individuals. To find them, we have devised a test." These words, found in a message posted on 4Chan in January 2012, started a global 'treasure hunt' - with thousands of puzzle-loving and curious individuals desperately competing with one another to be the first to crack the devilish puzzles created by the mysterious Cicada 3301. Who is Cicada, and what are their goals?

The Mystery of Cicada 3301

January 10, 2022 0:34:59 33.59 MB Downloads: 0

The Mystery of Cicada 3301Advertising Inquiries: https://redcircle.com/brands

How the Internet Changed the NSA [ML BSide]

January 03, 2022 36:13 34.76 MB Downloads: 0

In the late ’80s to early 2000s, the NSA transitioned from being a hardware-first organization - that is, creating and operating physical spying devices - to software-first: excelling in hacking networks, tracking people online, etc. That transition was by no means easy: the NSA, by that point, was a huge organization - and big organizations are notorious for being very resistant to change. Jeff Man, our guest today, was one of the first people at the NSA to make the transition from hardware to software, and he shares with us his experiences from that period.

How the Internet Changed the NSA

January 03, 2022 0:36:12 34.76 MB Downloads: 0

How the Internet Changed the NSAAdvertising Inquiries: https://redcircle.com/brands

Does Code === Free Speech?

December 27, 2021 30:36 29.38 MB Downloads: 0

When the FBI asked Apple, following the 2015 mass shooting in San Bernardino, to write code that would give the FBI access to a suspect's iPhone - Apple refused, arguing that forcing it to write code goes against the First Amendment. Apple's claim wasn't the first time that this highly controversial claim was invoked in judicial proceedings…

Is Code === Free Speech?

December 27, 2021 0:30:36 29.38 MB Downloads: 0

Is Code === Free Speech?Advertising Inquiries: https://redcircle.com/brands