Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
Similar Podcasts

24H24L
Evento en línea, de 24 horas de duración que consiste en la emisión de 24 audios de diversas temáticas sobre GNU/Linux. Estos son los audios del evento en formato podcast.

CppCast
Every two weeks, or so, we sit down with guests from the C++ community to discuss the latest news and what they have been up to. Find us at cppcast.com

The Infinite Monkey Cage
Brian Cox and Robin Ince host a witty, irreverent look at the world through scientists' eyes.
Does Code === Free Speech?
When the FBI asked Apple, following the 2015 mass shooting in San Bernardino, to write code that would give the FBI access to a suspect's iPhone - Apple refused, arguing that forcing it to write code goes against the First Amendment. Apple's claim wasn't the first time that this highly controversial claim was invoked in judicial proceedings…
Is Code === Free Speech?
Is Code === Free Speech?Advertising Inquiries: https://redcircle.com/brands
A digital ‘vaccine’ for Log4Shell [ML BSide]
A digital 'vaccine' was released to address Log4Shell, which has been called 'the single biggest, most critical vulnerability ever.' Nate Nelson talks to Yonatan Striem-Amit, CTO & Co-Founder of Cybereason (our sponsor) about the vulnerability, and about Cybereason's unusual vaccine: software that uses the same vulnerability to close the breach.
A digital 'vaccine' for Log4Shell [ML BSide]
A digital 'vaccine' for Log4Shell [ML BSide]Advertising Inquiries: https://redcircle.com/brands
Shawn Carpenter: A Cyber Vigilante
In 2003, Shawn Carpenter - an employee of Sandia National Laboratory - was at a crossroads: should he ignore a Chinese attack against U.S. targets, as his superiors ordered him to do - or do what he thinks is right, and continue investigating the case on his own?
Shawn Carpenter: A Cyber Vigliante
Shawn Carpenter: A Cyber ViglianteAdvertising Inquiries: https://redcircle.com/brands
“Ransomware Attackers Don’t Take Holidays” [ML BSide]
Last month, in November of 2021, Cybereason - our show’s sponsor - released a special report titled: “Organizations at Risk: Ransomware Attackers Don’t Take Holidays”, focusing on the threat of ransomware attacks during weekends and holidays. Nate Nelson, our Sr. producer, talked with Ken Westin, Cybereason’s Director of Security Strategy, about why attackers love holidays and weekends, and why ransomware attacks during these times are so effective and dangerous.
Ransomware Attackers Don’t Take Holidays [ML B-Side]
Ransomware Attackers Don’t Take Holidays [ML B-Side]Advertising Inquiries: https://redcircle.com/brands
Tay: A Teenage Bot Gone Rogue
In March, 2016, Microsoft had something exciting to tell the world: the tech giant unveiled an AI chatbot with the personality of a teenager. Microsoft Tay - as it was nicknamed - could tweet, answer questions and even make its own memes. But within mere hours of going live, Tay began outputting racist, anti-Semitic and misogynist tweets.
Tay: A Teenage Bot Gone Rogue
Tay: A Teenage Bot Gone RogueAdvertising Inquiries: https://redcircle.com/brands
Wild West Hackin’ Fest [ML BSide]
The Wild West Hackin’ Fest is a unique security conference. Not only because it's held in South Dakota and not only because of the Wild West visual vibe - but also because of the emphasis it puts on diversity and lowering the entry barriers for people who wish to join the world of information security. Eliad Kimhy talks to John Stand, one of the conference's founders.
Wild West Hackin' Fest [ML BSide]
Wild West Hackin' Fest [ML BSide]Advertising Inquiries: https://redcircle.com/brands
Operation Flyhook, Part 2
To capture Alexey Ivanov and his business partner and bring them to justice, the FBI created an elaborate ruse: a fake company named 'Invita', complete with a fake website and a fake office building. Ray Pompon, a security professional, was brought in as an 'evil security consultant", to convince Alexey to demonstrate his hacking skills on a pre-arranged honeypot...Alexey came up with a 'brilliant' idea: hacking American corporations, and then blackmailing them - forcing them to hire his services as a 'security consultant.'
Operation Flyhook, Part 2
Operation Flyhook, Part 2Advertising Inquiries: https://redcircle.com/brands
IP Hijacking [ML BSide]
by China Telecom and routed through China. In 2017, traffic from Sweden and Norway to a large American news organization in Japan was hijacked - also to China - for about 6 weeks. What is IP Hijacking (a.k.a. BGP Hijacking), and what are its security implications? Nate Nelson talks to Dr. Yuval Shavitt, from from Tel Aviv University‘s Cyber Research Center.