Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.

Hacking Language Models

September 05, 2022 0:27:30 26.41 MB Downloads: 0

Language models are everywhere today: they run in the background of Google Translate and other translation tools; they help operate voice assistants like Alexa or Siri; and most interestingly, they are available via several experiential projects trying to emulate natural conversations, such as OpenAI’s GPT-3 and Google’s LaMDA. Can these models be hacked to gain access to the sensitive information they learned from their training data? Advertising Inquiries: https://redcircle.com/brands

Software Bill of Materials (SBOM) [ML B-side]

August 31, 2022 25:20 24.32 MB Downloads: 0

In May 2021, Following the Solarwinds and the Colonial Pipeline attacks, the Biden administration published a presidential Executive Order mandating the use of SBOMs - Software Bill of Materials - in all government agencies. What are SBOMs and how useful are they in cybersecurity? Nate Nelson talks to two experts: Allan Friedman (CISA) and Chris Blask (Cybeats).

Software Bill of Materials (SBOMs) [ML BSide]

August 31, 2022 0:25:20 24.32 MB Downloads: 0

Software Bill of Materials (SBOMs) [ML BSide]Advertising Inquiries: https://redcircle.com/brands

Leo Kuvayev– The Czar of Spammers

August 22, 2022 32:06 30.81 MB Downloads: 0

Criminals, particularly cyber criminals, aren’t “good” people; in most cases, they do have their own personal boundaries. Every once in a while, you encounter a criminal who’s different. Someone who seems not to have limits at all. A ruthless person, for whom the goal truly justifies the means. Leo Kuvayev is that kind of a person - and that made him so successful as a cyber-criminal. But even a genius criminal can go just one step too far.

Leo Kuvayev– The Czar of Spammers

August 22, 2022 0:32:05 30.81 MB Downloads: 0

Criminals, particularly cyber criminals, aren’t “good” people; in most cases, they do have their own personal boundaries. Every once in a while, you encounter a criminal who’s different. Someone who seems not to have limits at all. A ruthless person, for whom the goal truly justifies the means. Leo Kuvayev is that kind of a person - and that made him so successful as a cyber-criminal. But even a genius criminal can go just one step too far.Advertising Inquiries: https://redcircle.com/brands

“A CISO’s Nightmare”: Israel Baron on Railway Secuirty

August 15, 2022 26:26 25.38 MB Downloads: 0

Railway systems are a mess of old systems built on top of older systems, running ancient operating systems and exposing their most sensitive inner workings to communers via Wifi. Why are railway systems so difficult to defend, and what are the most probable attack vectors against them? Nate Nelson, our Sr. producer, speaks with Israel Baron, Israel Railway's first ever CISO.

"A CISO's Nightmare": Israel Baron on Railway Secuirty

August 14, 2022 0:26:26 25.38 MB Downloads: 0

"A CISO's Nightmare": Israel Baron on Railway SecuirtyAdvertising Inquiries: https://redcircle.com/brands

“Designed by criminals, for criminals”: Operation Trojan Shield

August 08, 2022 27:12 26.1 MB Downloads: 0

The Anom was the holy grail of dark, illegal communication: a mobile phone that could send encrypted messages, and even included a secret Kill-Switch to foil attempts by law enforcement agents to get to its contents. Thousands of criminals used the Anom, certain that they were completely safe from the police... They were wrong.

“Designed by criminals, for criminals”: Operation Trojan Shield

August 08, 2022 0:27:11 26.1 MB Downloads: 0

“Designed by criminals, for criminals”: Operation Trojan ShieldAdvertising Inquiries: https://redcircle.com/brands

Andrew Ginter: A 40-Years-Old Backdoor [ML B-Side]

August 01, 2022 29:18 28.12 MB Downloads: 0

Ken Thompson is a legendary computer scientist who also made a seminal contribution to computer security in 1983, when he described a nifty hack that could allow an attacker to plant an almost undetectable malicious code inside a C compiler. Surprisingly, it turns out a very similar hack was also used in the Solarwinds attack.

Andrew Ginter: A 40-Years-Old Backdoor [ML-BSide]

August 01, 2022 0:29:17 28.12 MB Downloads: 0

Andrew Ginter: A 40-Years-Old Backdoor [ML-BSide]Advertising Inquiries: https://redcircle.com/brands

Silk Road: The Amazon of drugs, Part 2

July 25, 2022 33:56 32.57 MB Downloads: 0

Silk Road’s success did more than bring the site more sellers and buyers, it also brought it more attention from law enforcement agencies as well as malicious hackers and other shady characters. Some of these shady characters, it turns out, were part of the task force aiming to shut down Silk Road...

Silk Road, The Amazon of Drugs - Part 2

July 21, 2022 0:33:55 32.57 MB Downloads: 0

Silk Road, The Amazon of Drugs - Part 2Advertising Inquiries: https://redcircle.com/brands

Kurtis Minder: Ransomware Negotiations [ML B-Side]

July 18, 2022 30:20 29.12 MB Downloads: 0

Your organization was hit by ransomware, and it is now time to reach out to the hackers and negotiate the terms of a deal that will bring back your data, and (hopefully) won’t leave the company’s coffers empty. But before you sit down in front of your computer and fire off a message to the hackers - stop. Are you sure that you know what you’re doing? Are you certain that you won’t screw up the negotiations and do more harm than good?

Kurtis Minder: Ransomware Negotiations [ML BSide]

July 18, 2022 0:30:20 29.12 MB Downloads: 0

Kurtis Minder: Ransomware Negotiations [ML BSide]Advertising Inquiries: https://redcircle.com/brands