Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
Similar Podcasts
The Infinite Monkey Cage
Brian Cox and Robin Ince host a witty, irreverent look at the world through scientists' eyes.
The Top Shelf
ThePrimeagen and teej_dv are on a quest to find the best possible technical speakers and ask the best possible questions we can find. You all know ThePrimeagen can't read, so this is a great format for him to really shine. Teej is here to make sure that Prime knows who the guest is and also to interrupt Prime wherever possible
24H24L
Evento en línea, de 24 horas de duración que consiste en la emisión de 24 audios de diversas temáticas sobre GNU/Linux. Estos son los audios del evento en formato podcast.
A digital ‘vaccine’ for Log4Shell [ML BSide]
A digital 'vaccine' was released to address Log4Shell, which has been called 'the single biggest, most critical vulnerability ever.' Nate Nelson talks to Yonatan Striem-Amit, CTO & Co-Founder of Cybereason (our sponsor) about the vulnerability, and about Cybereason's unusual vaccine: software that uses the same vulnerability to close the breach.
A digital 'vaccine' for Log4Shell [ML BSide]
A digital 'vaccine' for Log4Shell [ML BSide]Advertising Inquiries: https://redcircle.com/brands
Shawn Carpenter: A Cyber Vigilante
In 2003, Shawn Carpenter - an employee of Sandia National Laboratory - was at a crossroads: should he ignore a Chinese attack against U.S. targets, as his superiors ordered him to do - or do what he thinks is right, and continue investigating the case on his own?
Shawn Carpenter: A Cyber Vigliante
Shawn Carpenter: A Cyber ViglianteAdvertising Inquiries: https://redcircle.com/brands
“Ransomware Attackers Don’t Take Holidays” [ML BSide]
Last month, in November of 2021, Cybereason - our show’s sponsor - released a special report titled: “Organizations at Risk: Ransomware Attackers Don’t Take Holidays”, focusing on the threat of ransomware attacks during weekends and holidays. Nate Nelson, our Sr. producer, talked with Ken Westin, Cybereason’s Director of Security Strategy, about why attackers love holidays and weekends, and why ransomware attacks during these times are so effective and dangerous.
Ransomware Attackers Don’t Take Holidays [ML B-Side]
Ransomware Attackers Don’t Take Holidays [ML B-Side]Advertising Inquiries: https://redcircle.com/brands
Tay: A Teenage Bot Gone Rogue
In March, 2016, Microsoft had something exciting to tell the world: the tech giant unveiled an AI chatbot with the personality of a teenager. Microsoft Tay - as it was nicknamed - could tweet, answer questions and even make its own memes. But within mere hours of going live, Tay began outputting racist, anti-Semitic and misogynist tweets.
Tay: A Teenage Bot Gone Rogue
Tay: A Teenage Bot Gone RogueAdvertising Inquiries: https://redcircle.com/brands
Wild West Hackin’ Fest [ML BSide]
The Wild West Hackin’ Fest is a unique security conference. Not only because it's held in South Dakota and not only because of the Wild West visual vibe - but also because of the emphasis it puts on diversity and lowering the entry barriers for people who wish to join the world of information security. Eliad Kimhy talks to John Stand, one of the conference's founders.
Wild West Hackin' Fest [ML BSide]
Wild West Hackin' Fest [ML BSide]Advertising Inquiries: https://redcircle.com/brands
Operation Flyhook, Part 2
To capture Alexey Ivanov and his business partner and bring them to justice, the FBI created an elaborate ruse: a fake company named 'Invita', complete with a fake website and a fake office building. Ray Pompon, a security professional, was brought in as an 'evil security consultant", to convince Alexey to demonstrate his hacking skills on a pre-arranged honeypot...Alexey came up with a 'brilliant' idea: hacking American corporations, and then blackmailing them - forcing them to hire his services as a 'security consultant.'
Operation Flyhook, Part 2
Operation Flyhook, Part 2Advertising Inquiries: https://redcircle.com/brands
IP Hijacking [ML BSide]
by China Telecom and routed through China. In 2017, traffic from Sweden and Norway to a large American news organization in Japan was hijacked - also to China - for about 6 weeks. What is IP Hijacking (a.k.a. BGP Hijacking), and what are its security implications? Nate Nelson talks to Dr. Yuval Shavitt, from from Tel Aviv University‘s Cyber Research Center.
IP Hijacking [ML BSide]
IP Hijacking [ML BSide]Advertising Inquiries: https://redcircle.com/brands
Operation Flyhook, Part 1
Alexey Ivanov was exactly the kind of person to benefit from the early-2000's dot-com boom: He was bright, talented, and knew his stuff. His only problem was the fact that he was born in Chelyabinsk, a sleepy Russian town in the middle of nowhere…when he sent his resume to American companies, nobody was willing to bet on him. Alexey came up with a 'brilliant' idea: hacking American corporations, and then blackmailing them - forcing them to hire his services as a 'security consultant.'