Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.

Similar Podcasts

24H24L

24H24L
Evento en línea, de 24 horas de duración que consiste en la emisión de 24 audios de diversas temáticas sobre GNU/Linux. Estos son los audios del evento en formato podcast.

CppCast

CppCast
Every two weeks, or so, we sit down with guests from the C++ community to discuss the latest news and what they have been up to. Find us at cppcast.com

The Infinite Monkey Cage

The Infinite Monkey Cage
Brian Cox and Robin Ince host a witty, irreverent look at the world through scientists' eyes.

Crypto AG, Part 2: The Death of Bo Jr.

February 21, 2022 0:36:10 34.73 MB Downloads: 0

Crypto AG, Part 2: The Death of Bo Jr.Advertising Inquiries: https://redcircle.com/brands

Why Do APTs Use Ransomware? [ML B-Side]

February 14, 2022 17:05 16.39 MB Downloads: 0

Assaf Dahan, Head of Threat Research with the Cybereason Nocturnus Team, discusses new discoveries about Iranian APTs Moses Staff and Phosphorus that blur the line between state-sponsored attacks and criminal activity.

Why do APTs use Ransomeware? [ML BSide]

February 14, 2022 0:17:04 16.39 MB Downloads: 0

Why APTs use Ransomeware? [ML BSide]Advertising Inquiries: https://redcircle.com/brands

Crypto AG – The Greatest Espionage Operation Ever, Part 1

February 07, 2022 27:10 26.08 MB Downloads: 0

General McArthur, Egpyt's Anwar Sadat, and Iran's Ayatollah Khomeini: These are just a few of the dozens, likely hundreds of targets of arguably the biggest, most ambitious hacking operation ever. A secret mission that lasted nearly a century, and influenced the course of so many of the most important events of history. The history you thought you knew.

Crypto AG - The Greatest Espionage Operation Ever, Part 1

February 07, 2022 0:27:10 26.08 MB Downloads: 0

Crypto AG - The Greatest Espionage Operation Ever, Part 1Advertising Inquiries: https://redcircle.com/brands

Why aren’t SMBs investing in Cyber Security? [ML B-Side]

January 31, 2022 22:51 21.94 MB Downloads: 0

Attacks against Small-to-Medium size businesses currently represent roughly 40% to 50% of all data breaches. Josh Ablett, founder and CISO of Adelia Risk, speaks with Nate Nelsn about the kind of security he usually finds in SMBs when he’s called in to make an initial security assessment - spoiler: not a pretty picture - the impact of data breaches on SMBs, and what role do insurance companies play in improving the state of security in that often overlooked segment of the industry.

Why aren't SMBs investing in Cyber Security? [ML B-Side]

January 31, 2022 0:22:51 21.94 MB Downloads: 0

Why aren't SMBs investing in Cyber Security? [ML B-Side]Advertising Inquiries: https://redcircle.com/brands

The Bloody Origins of Israel’s Cyber Security Industry

January 25, 2022 35:46 34.33 MB Downloads: 0

Israel is a small country - yet its cyber security industry is exceptionally successful. In this episode, we go back to the Yom Kippur War of 1973, to discover how a national trauma and an Intelligence failure paved the way for Israel to become a cyber security mini-empire.

The Bloody Origins of Israel's Cyber Security Industry

January 25, 2022 0:35:45 34.33 MB Downloads: 0

The Bloody Origins of Israel's Cyber Security IndustryAdvertising Inquiries: https://redcircle.com/brands

Hacker Highschool: Pete Herzog [ML BSide]

January 17, 2022 28:53 27.73 MB Downloads: 0

In the late ’80s to early 2000s, the NSA transitioned from being a hardware-first organization - that is, creating and operating physical spying devices - to software-first: excelling in hacking networks, tracking people online, etc. That transition was by no means easy: the NSA, by that point, was a huge organization - and big organizations are notorious for being very resistant to change. Jeff Man, our guest today, was one of the first people at the NSA to make the transition from hardware to software, and he shares with us his experiences from that period.

Hacker Highschool: Pete Herzog [ML BSide]

January 17, 2022 0:28:53 27.73 MB Downloads: 0

Hacker Highschool: Pete Herzog [ML BSide]Advertising Inquiries: https://redcircle.com/brands

The Mystery of Cicada 3301

January 10, 2022 35:00 33.59 MB Downloads: 0

"Hello. We are looking for highly intelligent individuals. To find them, we have devised a test." These words, found in a message posted on 4Chan in January 2012, started a global 'treasure hunt' - with thousands of puzzle-loving and curious individuals desperately competing with one another to be the first to crack the devilish puzzles created by the mysterious Cicada 3301. Who is Cicada, and what are their goals?

The Mystery of Cicada 3301

January 10, 2022 0:34:59 33.59 MB Downloads: 0

The Mystery of Cicada 3301Advertising Inquiries: https://redcircle.com/brands

How the Internet Changed the NSA [ML BSide]

January 03, 2022 36:13 34.76 MB Downloads: 0

In the late ’80s to early 2000s, the NSA transitioned from being a hardware-first organization - that is, creating and operating physical spying devices - to software-first: excelling in hacking networks, tracking people online, etc. That transition was by no means easy: the NSA, by that point, was a huge organization - and big organizations are notorious for being very resistant to change. Jeff Man, our guest today, was one of the first people at the NSA to make the transition from hardware to software, and he shares with us his experiences from that period.

How the Internet Changed the NSA

January 03, 2022 0:36:12 34.76 MB Downloads: 0

How the Internet Changed the NSAAdvertising Inquiries: https://redcircle.com/brands