Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
Similar Podcasts
The Infinite Monkey Cage
Brian Cox and Robin Ince host a witty, irreverent look at the world through scientists' eyes.
The Top Shelf
ThePrimeagen and teej_dv are on a quest to find the best possible technical speakers and ask the best possible questions we can find. You all know ThePrimeagen can't read, so this is a great format for him to really shine. Teej is here to make sure that Prime knows who the guest is and also to interrupt Prime wherever possible
24H24L
Evento en línea, de 24 horas de duración que consiste en la emisión de 24 audios de diversas temáticas sobre GNU/Linux. Estos son los audios del evento en formato podcast.
MDR Vs. The TrickBot Gang
MDR Vs. The TrickBot GangAdvertising Inquiries: https://redcircle.com/brands
Yahoo’s Ugly Death, Part 2
Between 2010 and 2014, Yahoo was hacked numerous times - each time setting a new 'world record' for the largest data breach in history. It also hid those breaches from it's investors, customers and the SEC.
Yahoo's Ugly Death, Part 2
Yahoo's Ugly Death, Part 2Advertising Inquiries: https://redcircle.com/brands
Yahoo’s Ugly Death, Part 1
When Marissa Mayer joined Yahoo as CEO, the company's stock rose 2% the day of the announcement. But the new CEO was basically initiated into her job by a major data breath - and the worst was yet to come.
Yahoo's Ugly Death, Part 1
Yahoo's Ugly Death, Part 1Advertising Inquiries: https://redcircle.com/brands
The Great Firewall of China, Pt. 2: Cisco’s Trial
Falun Gong is a religious movement heavily persecuted in China. In 2017, members of the movement sued Cisco Systems for aiding and abetting the Chinese government in this persecution - since Cisco helped China erect 'Golden Shield'": the massive Chinese IT infrastructure project which combined internet censorship and pervasive Chinese state cyberspying.
The Great Firewall of China, Pt. 2: Cisco's Trial
The Great Firewall of China, Pt. 2: Cisco's TrialAdvertising Inquiries: https://redcircle.com/brands
The Great Firewall of China – Part 1
The Great Firewall is just mind-bogglingly big, repressing freedom of speech and information for over 800 million Chinese internet users every year. The Great Firewall is so big that it’s worth asking: how did the Chinese manage to build it in the first place? 20 years ago, our info-sec technology was much less advanced than it is today. China was a second-rate technology power, not even comparable to their position today. Most of all: a firewall, like the one they proposed, had never existed before--or, for that matter, since. How, then, did they pull it off?
The Great Firewall of China - Part 1
The Great Firewall of China - Part 1Advertising Inquiries: https://redcircle.com/brands
Troy Hunt - Interview
Troy Hunt - InterviewAdvertising Inquiries: https://redcircle.com/brands
Multi-Stage Ransomware (Live!)
Ran & Israel Barak, Cybereason's CISO, discuss the latest development in ransomware evolution: multi-stage attacks in which the attackers infiltrate the target network, steal data and gather intelligence - before detonating the ransomware to cause maximal denial-of-service to the victim organization. What does this new tactic mean for the use of backups as a mean to mitigate the risk from ransomware? This episode was recorded live on July 29th, 2020.
Multi-Stage Ransomware (Live)
Multi-Stage Ransomware (Live)Advertising Inquiries: https://redcircle.com/brands
Protecting The “Panama Papers” Whistleblower
In 2015 Bastian Obermayer, an investigative journalist for the Süddeutsche Zeitung, received a message every journalist dreams of: the biggest leak in journalism history. But dealing with the massive 2.7 Terabyte data-dump, 11.5 million documents - while making sure his source's identity could not be uncovered, turned out to be a huge challenge.
Protecting The Panama Papers Whistleblower
Protecting The Panama Papers WhistleblowerAdvertising Inquiries: https://redcircle.com/brands
From Ransomware To Blackmail, With Assaf Dahan
Hackers keep modifying and improving their methods of operations. Assaf Dahan, Sr. Director and Head of Threat Research at Cybereason, tells us about the recent shift to Blackmail - as a way to pressure Ransomware victims to pay the ransom.