Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
Similar Podcasts

24H24L
Evento en línea, de 24 horas de duración que consiste en la emisión de 24 audios de diversas temáticas sobre GNU/Linux. Estos son los audios del evento en formato podcast.

CppCast
Every two weeks, or so, we sit down with guests from the C++ community to discuss the latest news and what they have been up to. Find us at cppcast.com

The Infinite Monkey Cage
Brian Cox and Robin Ince host a witty, irreverent look at the world through scientists' eyes.
Shutting Down The Internet in 30 Minutes: Chris Wysopal (WeldPond) [ML B-Side]
Shutting Down The Internet in 30 Minutes: Chris Wysopal (WeldPond) [ML B-Side]Advertising Inquiries: https://redcircle.com/brands
‘L0pht’, Part 2 – The End
In the early days, the L0pht guys tinkered with what they already had laying around, or could find dumpster diving. But things change, of course. By the end of the ‘90s many of the L0pht hackers had quit their day jobs, incorporating under the name “L0pht Heavy Industries”, and moving into a nicer space, the “new L0pht.” Seven days after Y2K, they merged with @stake, an internet security startup. It was a signal that hacking wasn’t just for the kids anymore.
L0pht, Part 2
L0pht, Part 2Advertising Inquiries: https://redcircle.com/brands
The Story of ‘L0pht’, Part 1
'L0pht', or 'L0pht Heavy Indutries', was one of the most infuencial hacker collectives of the 90's: it's members were even invited to testify infront of the Congress on the current state of Internet security. In this episode, four L0pht's founding members - Count Zero, Weld Pond, Kingpin & Dildog - talk about the begining and influence of the L0pht on cyber security.
The Story of 'L0pht', Part 1
The Story of 'L0pht', Part 1Advertising Inquiries: https://redcircle.com/brands
The MS Exchange Hack [ML B-Side]
Israel Barack, Cybereason's CISO and an expert on cyber-warfare, on the recent MS Exchange hack that hit thousands of organizations worldwide: what happened, what were the vulenrabilites expolited in the attack - and what can we do to defend against such attacks in the future.
MS Exchange Hack [ML B-Side]
MS Exchange Hack [ML B-Side]Advertising Inquiries: https://redcircle.com/brands
NotPetya, Part 2
When the NotPetya pandemic hit, Cyber Analyst Amit Serper was sitting in his parents' living room, getting ready to go out with a few friends. He didn't have most of his tools with him, but he nonetheless took a swipe at the malware. An hour later, he held the precious vaccine.
NotPetya Part 2
When the NotPetya pandemic hit, Cyber Analyst Amit Serper was sitting in his parents' living room, getting ready to go out with a few friends. He didn't have most of his tools with him, but he nonetheless took a swipe at the malware. An hour later, he held the precious vaccine.Advertising Inquiries: https://redcircle.com/brands
NotPetya, Part 1
On June 28th, 2017, millions of Ukranians were celebrating 'Constitution Day.' Their national holiday turned into a nightmare, as tens of thousands of computers all over the country were infected by a mysterious malware. By that afternoon, the cyber-pandemic was already going global.
NotPetya Part 1
NotPetya Part 1Advertising Inquiries: https://redcircle.com/brands
Facial Recognition in Law Enforcement, Pt. 2
It seems likely that legislation alone won't be able to regulate the widespread use of facial recognition. Andrew Maximov, who uses AI to fight Belarus's dictatorship, shows us another way facical recognition can be used - this time for us, instead of against us.
Facial Recognition in Law Enforcment, Part 2
Facial Recognition in Law Enforcment, Part 2Advertising Inquiries: https://redcircle.com/brands
Should Law Enforcement Use Facial Recognition? Pt. 1
There are plenty of reasons why Police should use AI for facial recognition: after all, Humans are notoriously bad eye witnesses. However, placing AI in the hands of law enforcement does have its dangers - due to the limitations of the technology itself, and the biases of the officers who use it.
Should Law Enforcement Use Facial Recognition? Pt. 1
Should Law Enforcement Use Facial Recognition? Pt. 1Advertising Inquiries: https://redcircle.com/brands