Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
Similar Podcasts
The Infinite Monkey Cage
Brian Cox and Robin Ince host a witty, irreverent look at the world through scientists' eyes.
The Top Shelf
ThePrimeagen and teej_dv are on a quest to find the best possible technical speakers and ask the best possible questions we can find. You all know ThePrimeagen can't read, so this is a great format for him to really shine. Teej is here to make sure that Prime knows who the guest is and also to interrupt Prime wherever possible
24H24L
Evento en línea, de 24 horas de duración que consiste en la emisión de 24 audios de diversas temáticas sobre GNU/Linux. Estos son los audios del evento en formato podcast.
Breaking Into Secure Buildings
FC, aka 'Freaky Clown', is an expert in "Physical assessments" - otherwise known as breaking into ultra-secure office buildings. FC shares some of his (incredible) adventures, as well as some tips and tricks on how to protect your organization's HQ from hackers such as himself.
Breaking Into Buildings
Breaking Into Buildings Advertising Inquiries: https://redcircle.com/brands
Special: The SolarWinds Hack
Ran talks to Israel Barak, Cybereason's CISO and a Cyber-defense and Warfare expert, about the recent SolarWinds hack that impacted upto 18,000(!) enterprise organizations in the US. What is a Supply Chain Attack, how can organizations defend against it - and what does all this have to do with Evolution and Natural Selection?...
Special: The Solarwinds Hack
Special: The Solarwinds HackAdvertising Inquiries: https://redcircle.com/brands
100th Episode Special
For our 100th episode, we bring you three stories that tie in to previous episodes of the show: Shadow Inc. (Election Hacking), J&K (Max Headroom) and T-Shirt-Gate (Yahoo's Ugly Death). Enjoy :-)
100th Episode Special
Best Stories You MissedAdvertising Inquiries: https://redcircle.com/brands
Jan Sloot’s Incredible Data Compression System
In the mid-90's, a Dutch TV repairman claimed he invented a revolutionary data compression technology that could compress a full-length movie into just 8KB.
Jan Sloot's Incredible Digital Coding System
Jan Sloot's Incredible Digital Coding SystemAdvertising Inquiries: https://redcircle.com/brands
Op. GUNMAN & The World’s First Keylogger
In 1983, the US got word that an ally's embassy - probably France's - was bugged by the Soviets. This reports triggered Operation GUNMAN: a complete removal & de-bugging of *all* electronic devices in the US embassy in the USSR. This secretive operation resulted in a surprising discovery - and made the NSA what it is today.
Op. GUNMAN & The World's First Keylogger
Op. GUNMAN & The World's First KeyloggerAdvertising Inquiries: https://redcircle.com/brands
Election Hacking, Part 2
Georgia's elections infrastructure had been hacked multiple times since 2014 - both by Russian Intelligence and local White Hat hackers. The upcoming elections are plagued with uncertainty - and uncertainty and democracy go together like wet hands and electrical outlets.
Election Hacking, Part 2
Election Hacking, Part 2Advertising Inquiries: https://redcircle.com/brands
Election Hacking, Part 1
Today we’re talking about just one state. One which, depending on which way it leans, might bring the entire electoral college with it. One which, as of this writing, is absolutely, positively, neck and neck. Dead heat. A few votes one way or the other could swing it. In other words: this is the kind of state that cannot afford to be hacked. But might be.
Election Hacking, Part 1
Election Hacking, Part 1Advertising Inquiries: https://redcircle.com/brands
MDR Vs. The TrickBot Gang
About a year ago, Cybereason's Managed Detection and Response team (aka MDR) stumbled upon a attack involving Russian cybercriminals, POS devices and an entire new family of previously undiscovered malware.