Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
Similar Podcasts

24H24L
Evento en línea, de 24 horas de duración que consiste en la emisión de 24 audios de diversas temáticas sobre GNU/Linux. Estos son los audios del evento en formato podcast.

CppCast
Every two weeks, or so, we sit down with guests from the C++ community to discuss the latest news and what they have been up to. Find us at cppcast.com

The Infinite Monkey Cage
Brian Cox and Robin Ince host a witty, irreverent look at the world through scientists' eyes.
Colonial Pipeline & DarkSide: Assaf Dahan [B-Side]
On Friday, May 7th, 2021, Colonial Pipeline suffered a cyberattack that forced the company to shut down its operations. As a result, gasoline outages were reported in many East Coast states. The entity behind the attack is a criminal group known as DarkSide. Nate Nelson, our Sr. producer, spoke with Assaf Dahan - Head of Threat Research at Cybereason - about the Colonial Pipeline attack: how & why it happened, and its implications - both for the security of critical infrastructure in the US, and for the criminal underworld of Ransomware groups. That last one is particularly interesting, since it seems that the Colonial Pipeline attack has set off a somewhat unexpected trend on the dark web.
Colonial Pipeline & DarkSide: Assaf Dahan [B-Side]
Colonial Pipeline & DarkSide: Assaf Dahan [B-Side]Advertising Inquiries: https://redcircle.com/brands
RSA Breach, Part 2
In the wake of RSA's disclosure of the breach, the company cyber analysts chose not to boot the attackers of their network - but followed their activities closely, trying to figure out their identities and motives. For the first time since the actual breach, a decade ago, we'll get the (surprising) answers to those questions - and more.
RSA Breach, Part 2
RSA Breach, Part 2Advertising Inquiries: https://redcircle.com/brands
RSA Breach: The Untold Story, Part 1
In the early 2000s, Nortel was consciously, intentionally, aggressively positioning itself as a partner and a friend of China. At the same time, it was China's number one target for corporate espionage - and an early victim of its new 'Unrestricted Warfare' doctrine.
RSA Breach: The Untold Story, Part 1
RSA Breach: The Untold Story, Part 1Advertising Inquiries: https://redcircle.com/brands
China’s Unrestricted Warfare, Part 2
In the early 2000s, Nortel was consciously, intentionally, aggressively positioning itself as a partner and a friend of China. At the same time, it was China's number one target for corporate espionage - and an early victim of its new 'Unrestricted Warfare' doctrine.
China's Unrestricted Warfare, Part 2
China's Unrestricted Warfare, Part 2Advertising Inquiries: https://redcircle.com/brands
The History of Security BSides Conferences with Jack Daniel [ML B-Side]
Security BSides - or just 'BSides', for short' - is the first grassroots, DIY, open security conference in the world - with more than 650 events in more than 50 countries. Jack Daniel, one of BSides' founders, recalls how the conference started, and what do such 'community-oriented' events contribute that other events often cannot.
Creating a Grassroots Security Conference: Jack Daniel [ML B-Side]
Creating a Grassroots Security Conference: Jack Daniel [ML B-Side]Advertising Inquiries: https://redcircle.com/brands
China’s Unrestricted Warfare, Part 1
Back in the 1990s, Cyberwarfare was a word rarely used in the West - and definitely unheard of in China, which was just taking it's first steps in the Internet. Two Chinese military officers, veterans of the semi-conflict with Taiwan, helped shape the role of cyber in modern warfare in China and beyond.
China's Unrestricted Warfare, Part 1
China's Unrestricted Warfare, Part 1Advertising Inquiries: https://redcircle.com/brands
Can Nuclear Power Plants Be Hacked?
Andrew Ginter, VP of Industrial Security at Waterfall Security Solutions, speaks to Sr. Producer Nate Nelson about the cybersecurity of Nuclear facilities. How protected are modern nuclear power plants?
Can Nuclear Power Plants Be Hacked?
Can Nuclear Power Plants Be Hacked?Advertising Inquiries: https://redcircle.com/brands
Shutting Down The Internet in 30 Minutes: Chris Wysopal [ML B-Side]
Chris Wysopal, a cyber security pionneer and one of L0pht's founding members, talks about the group's 1998 testimony in the Senate, how they used shaming to force cooporations to fix their software, and the (not so fortunate) consequenses of the sale to @stake.