Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.

Similar Podcasts

The Infinite Monkey Cage

The Infinite Monkey Cage
Brian Cox and Robin Ince host a witty, irreverent look at the world through scientists' eyes.

The Top Shelf

The Top Shelf
ThePrimeagen and teej_dv are on a quest to find the best possible technical speakers and ask the best possible questions we can find. You all know ThePrimeagen can't read, so this is a great format for him to really shine. Teej is here to make sure that Prime knows who the guest is and also to interrupt Prime wherever possible

24H24L

24H24L
Evento en línea, de 24 horas de duración que consiste en la emisión de 24 audios de diversas temáticas sobre GNU/Linux. Estos son los audios del evento en formato podcast.

How To Defend A Bank, Pt. II: Right of Bang

February 27, 2020 0:25:47 24.75 MB Downloads: 0

How To Defend A Bank, Pt. II: Right of BangAdvertising Inquiries: https://redcircle.com/brands

How To Defend A Bank, Part 1: Fusion Centers

February 13, 2020 27:04 25.97 MB Downloads: 0

Banks & other financial institutions face a variety of security threats: from state-sponsored cyber-attacks, to smaller acts of fraud, to thousands of random malware attacks from the web. To survive in this hostile landscape, these organizations turned to the military for inspiration.

How To Defend A Bank, Part 1: Fusion Centers

February 13, 2020 0:27:03 25.97 MB Downloads: 0

How To Defend A Bank, Part 1: Fusion CentersAdvertising Inquiries: https://redcircle.com/brands

Triton, Part 2: The World’s Most Dangerous Malware

January 30, 2020 38:48 37.25 MB Downloads: 0

Petro Rabigh were facing lots of problems in defending their systems. But they did get lucky in one sense: their hackers were unprepared when their plan went awry. Who were the hackers that infiltrated the Saudi petrochemical plant, and what can this breach teach us?

Triton, Part 2: The World’s Most Dangerous Malware

January 29, 2020 0:38:48 37.25 MB Downloads: 0

Triton, Part 2: The World’s Most Dangerous MalwareAdvertising Inquiries: https://redcircle.com/brands

Triton: A Malware Designed To Kill Humans, Part 1

January 16, 2020 36:22 34.9 MB Downloads: 0

Industrial Security requires a different skill set--really, an entirely different mindset than working in IT does. In this episode we dive into the story of one of the most dangerous malware ever to be discovered in the wild: Triton/Trisis.

Triton Part 1

January 16, 2020 0:36:21 34.9 MB Downloads: 0

Triton Part 1Advertising Inquiries: https://redcircle.com/brands

Dead Drops

January 14, 2020 0:38:46 37.22 MB Downloads: 0

Dead DropsAdvertising Inquiries: https://redcircle.com/brands

Deep Fakes, Part 2: Man Vs. Machine

January 02, 2020 37:36 36.09 MB Downloads: 0

Deep Fakes are set to revolutionize content creation, but alongside this technology's benefits, it also has the potential two sow havoc, fear, and distrust via Social Networks. Just this week, Facebook disclosed a network of fake users it found, whose profile images were all deep faked. So, how can we identify deep fakes - even before they go online?

Deep Fakes, Part 2: Man Vs. Machine

January 02, 2020 0:37:35 36.09 MB Downloads: 0

Deep Fakes are set to revolutionize content creation, but alongside this technology's benefits, it also has the potential two sow havoc, fear, and distrust via Social Networks. Just this week, Facebook disclosed a network of fake users it found, whose profile images were all deep faked. So, how can we identify deep fakes - even before they go online? Advertising Inquiries: https://redcircle.com/brands

GAN and Deep Fakes, Part 1

December 19, 2019 43:28 41.72 MB Downloads: 0

Over the past two years, the internet has been inundated with celebrity Deep Fake videos of all kinds: Obama, Putin, and Trump deliver speeches they never gave, Gal Gadot "stars” in a porn video, and professional comedians such as Bill Hader eerily turn into the people they impersonate, like Tom Cruise and Arnold Schwarzenegger. What all of these videos have in common is that they were mostly created by amateur developers or small startups with tight budgets - but their quality is surprisingly good, and in some cases as good as what the biggest movie studios were able to produce with huge budgets just a few years ago. So what happened in the last five years, that turned special effects from being the exclusive domain of industry experts - into something a 14-year-old can create more or less at the touch of a button? Like the top end of a floating glacier, Deep Fakes are by and large only the visible product of a fascinating - and much deeper - technological revolution in the field of artificial intelligence. As we shall soon see, this revolution has the potential to put some very powerful tools in the hands of both attackers and defenders in the world of cyber-security.

GAN and Deep Fakes, Part 1

December 19, 2019 0:43:27 41.72 MB Downloads: 0

Over the past two years, the internet has been inundated with celebrity Deep Fake videos of all kinds: Obama, Putin, and Trump deliver speeches they never gave, Gal Gadot "stars” in a porn video, and professional comedians such as Bill Hader eerily turn into the people they impersonate, like Tom Cruise and Arnold Schwarzenegger. What all of these videos have in common is that they were mostly created by amateur developers or small startups with tight budgets - but their quality is surprisingly good, and in some cases as good as what the biggest movie studios were able to produce with huge budgets just a few years ago. So what happened in the last five years, that turned special effects from being the exclusive domain of industry experts - into something a 14-year-old can create more or less at the touch of a button? Like the top end of a floating glacier, Deep Fakes are by and large only the visible product of a fascinating - and much deeper - technological revolution in the field of artificial intelligence. As we shall soon see, this revolution has the potential to put some very powerful tools in the hands of both attackers and defenders in the world of cyber-security. Advertising Inquiries: https://redcircle.com/brands

Sam Curry: The 2020 Crystal Ball

December 10, 2019 15:32 14.9 MB Downloads: 0

Sam Curry is Cybereason's Chief Security Officer and an award-winning cyber security visionary. Sam & Ran discuss Sam's upcoming webinar, in which he will present his insights into what 2020 will bring for the security industry: the rise of 5G cellular networks, The US Presidential Elections, the 2020 Tokyo Olympics and more.

Sam Curry: The 2020 Crystal Ball

December 10, 2019 0:15:31 14.9 MB Downloads: 0

Sam Curry: The 2020 Crystal BallAdvertising Inquiries: https://redcircle.com/brands

Human Side Channels

December 05, 2019 33:39 32.29 MB Downloads: 0

Even the best hackers are human, and humans are inescapably unique. Forensic Linguistics, Behavioral Signatures and Cultural Captchas can help defenders identify and (maybe) catch even the best of hackers.