Podcasts by Malicious Life
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
Further podcasts by Cybereason
Podcast on the topic Technologie
All episodes
Aaron Swartz from 2023-12-12T19:04:04.108630
Aaron Swartz
Advertising Inquiries: https://redcircle.com/brands Listen
MITRE Attack Flow [ML B-Sides] from 2023-12-12T19:04:04.103786
MITRE Attack Flow [ML B-Sides]
Advertising Inquiries: https://redcircle.com/brands Listen
Op. Sundevil And The Birth of the EFF from 2023-12-12T19:04:04.098991
Op. Sundevil And The Birth of the EFF
Advertising Inquiries: https://redcircle.com/brands Listen
How to Russia-Proof Your Democracy [ML BSide] from 2023-12-12T19:04:04.094686
How to Russia-Proof Your Democracy [ML BSide]
Advertising Inquiries: https://redcircle.com/brands Listen
Operation CuckooBees [ML B-Side] from 2023-12-12T19:04:04.089310
Operation CuckooBees [ML B-Side]
Advertising Inquiries: https://redcircle.com/brands Listen
What The LinkedIn Hack Taught Us About Storing Passwords from 2023-12-12T19:04:04.084332
What The LinkedIn Hack Taught Us About Storing Passwords
Advertising Inquiries: https://redcircle.com/brands Listen
Catching A Cybercriminal [ML B-Side] from 2023-12-12T19:04:04.078025
Catching A Cybercriminal [ML B-Side]
Advertising Inquiries: https://redcircle.com/brands Listen
Hackers vs. Spies: The Stratfor Leaks, Pt. 1 from 2023-12-12T19:04:04.073302
Hackers vs. Spies: The Stratfor Leaks, Pt. 1
Advertising Inquiries: https://redcircle.com/brands Listen
Hackers vs. Spies: The Stratfor Leaks, Pt. 2 from 2023-12-12T19:04:04.067513
Hackers vs. Spies: The Stratfor Leaks, Pt. 2
Advertising Inquiries: https://redcircle.com/brands Listen
Malicious LIVE: Celebrating 5 Years of Malicious Life from 2023-12-12T19:04:04.061158
Malicious LIVE: Celebrating 5 Years of Malicious Life
Advertising Inquiries: https://redcircle.com/brands Listen
The “Cypherpunks” Who Invented Private Digital Money from 2023-12-12T19:04:04.055652
The “Cypherpunks” Who Invented Private Digital Money
Advertising Inquiries: https://redcircle.com/brands Listen
Jacob Goldstein: The Future of BitCoin [ML BSide] from 2023-12-12T19:04:04.050277
Jacob Goldstein: The Future of BitCoin [ML BSide]
Advertising Inquiries: https://redcircle.com/brands Listen
Silk Road: The Amazon of drugs, Part 1 from 2023-12-12T19:04:04.044884
Silk Road: The Amazon of drugs, Part 1
Advertising Inquiries: https://redcircle.com/brands Listen
Kurtis Minder: Ransomware Negotiations [ML BSide] from 2023-12-12T19:04:04.040064
Kurtis Minder: Ransomware Negotiations [ML BSide]
Advertising Inquiries: https://redcircle.com/brands Listen
Silk Road, The Amazon of Drugs - Part 2 from 2023-12-12T19:04:04.034899
Silk Road, The Amazon of Drugs - Part 2
Advertising Inquiries: https://redcircle.com/brands Listen
Andrew Ginter: A 40-Years-Old Backdoor [ML-BSide] from 2023-12-12T19:04:04.025837
Andrew Ginter: A 40-Years-Old Backdoor [ML-BSide]
Advertising Inquiries: https://redcircle.com/brands Listen
“Designed by criminals, for criminals”: Operation Trojan Shield from 2023-12-12T19:04:04.020782
“Designed by criminals, for criminals”: Operation Trojan Shield
Advertising Inquiries: https://redcircle.com/brands Listen
"A CISO's Nightmare": Israel Baron on Railway Secuirty from 2023-12-12T19:04:04.015463
"A CISO's Nightmare": Israel Baron on Railway Secuirty
Advertising Inquiries: https://redcircle.com/brands Listen
Leo Kuvayev– The Czar of Spammers from 2023-12-12T19:04:04.009475
Criminals, particularly cyber criminals, aren’t “good” people; in most cases, they do have their own personal boundaries. Every once in a while, you encounter a criminal who’s different. Someone...
ListenSoftware Bill of Materials (SBOMs) [ML BSide] from 2023-12-12T19:04:04.002228
Software Bill of Materials (SBOMs) [ML BSide]
Advertising Inquiries: https://redcircle.com/brands Listen
Hacking Language Models from 2023-12-12T19:04:03.997162
Language models are everywhere today: they run in the background of Google Translate and other translation tools; they help operate voice assistants like Alexa or Siri; and most interestingly, t...
ListenHacking Multi-Factor Authentication from 2023-12-12T19:04:03.992241
Multi-Factor Authentication (MFA) is usually considered a better solution for authentication than just using passwords. But Roger Grimes, a veteran security professional, and a Data-Driven Defen...
Listen"King Kimble": Kim DotCom from 2023-12-12T19:04:03.987152
The US government says that Kim Schmitz, better know as Kim DotCom, is the leader of a file sharing crime ring. He sees himself as a an internet freedom fighter: a fugitive on the run from vindi...
ListenWhat’s it's Like to Fight LulzSec [ML B-Side] from 2023-12-12T19:04:03.982364
What’s it's Like to Fight LulzSec [ML B-Side]
Advertising Inquiries: https://redcircle.com/brands Listen
Hacking Stock Markets, Part 1 from 2023-12-12T19:04:03.977532
Hacking Stock Markets, Part 1
Advertising Inquiries: https://redcircle.com/brands Listen
Vishing: Voice Scams [ML BSide] from 2023-12-12T19:04:03.972865
Vishing: Voice Scams [ML BSide]
Advertising Inquiries: https://redcircle.com/brands Listen
Hacking Stock Markets, Part 2 from 2023-12-12T19:04:03.968031
Hacking Stock Markets, Part 2
Advertising Inquiries: https://redcircle.com/brands Listen
What Would Happen if CBS Got Hacked? [ML BSide] from 2023-12-12T19:04:03.963099
What Would Happen if CBS Got Hacked? [ML BSide]
Advertising Inquiries: https://redcircle.com/brands Listen
LabMD Vs. The FTC from 2023-12-12T19:04:03.957938
LabMD Vs. The FTC
Advertising Inquiries: https://redcircle.com/brands Listen
What can Chess grandmasters teach us about Cyber? [ML BSide] from 2023-12-12T19:04:03.952489
What can Chess grandmasters teach us about Cyber? [ML BSide]
Advertising Inquiries: https://redcircle.com/brands Listen
The Russian Business Network from 2023-12-12T19:04:03.947128
The Russian Business Network
Advertising Inquiries: https://redcircle.com/brands Listen
Jailbreaking Tractors [ML BSide] from 2023-12-12T19:04:03.942091
Jailbreaking Tractors [ML BSide]
Advertising Inquiries: https://redcircle.com/brands Listen
Norse Corp.: How To NOT build a cybersecurity startup from 2023-12-12T19:04:03.936682
Norse Corp.: How To NOT build a cybersecurity startup
Advertising Inquiries: https://redcircle.com/brands Listen
The Problem With Kernel-Mode Anti-Cheat Software from 2023-12-12T19:04:03.920907
The Problem With Kernel-Mode Anti-Cheat Software
Advertising Inquiries: https://redcircle.com/brands Listen
Thamar Reservoir from 2023-12-12T19:04:03.915742
Thamar Gindin is an Israeli scholar whose research focuses on the Persian language. For the past seven years (at least) Thamar has been a target for an endless stream of spear-phishing attempts ...
ListenFred Cohen: The Godfather of Computer Viruses [ML B-Side] from 2023-12-12T19:04:03.910903
Fred Cohen: The Godfather of Computer Viruses [ML B-Side]
Advertising Inquiries: https://redcircle.com/brands Listen
How Netflix Learned Cloud Security from 2023-12-12T19:04:03.905876
How Netflix Learned Cloud Security
Advertising Inquiries: https://redcircle.com/brands Listen
Cyberbunker, Part 1 from 2023-12-12T19:04:03.900792
Cyberbunker, Part 1
Advertising Inquiries: https://redcircle.com/brands Listen
Cyberbunker, Part 2 from 2023-12-12T19:04:03.895515
Cyberbunker, Part 2
Advertising Inquiries: https://redcircle.com/brands Listen
FBI vs. REvil [ML BSide] from 2023-12-12T19:04:03.889435
FBI vs. REvil [ML BSide]
Advertising Inquiries: https://redcircle.com/brands Listen
You Should Be Afraid of SIM Swaps from 2023-12-12T19:04:03.883595
You Should Be Afraid of SIM Swaps
Advertising Inquiries: https://redcircle.com/brands Listen
SIM Swapping Follow Up [ML B-Side] from 2023-12-12T19:04:03.878041
SIM Swapping Follow Up [ML B-Side]
Advertising Inquiries: https://redcircle.com/brands Listen
The (Other) Problem with NFTs from 2023-12-12T19:04:03.873556
Physical artworks in museums are usually well-guarded - but digital artworks are something else entirely: in 2021 alone, scammers successfully stole 100 million dollars worth of non-fungible tok...
ListenWhy Do NFTs Disappear? [ML BSide] from 2023-12-12T19:04:03.868262
What happens when an NFT marketplace goes under, and disappears? You would imagine that the users’ NFTs are perfectly safe: after all, the blockchain itself is still there, right? But that...
ListenOperation Ivy Bells from 2023-12-12T19:04:03.862875
In the early 1970's, US intelligance pointed at the possibility that the Russians have laid an underwater communication cable between two important naval bases in the Far East. The dangerous...
ListenRussian Propaganda, Explained [ML B-Side] from 2023-12-12T19:04:03.858336
You may have heard of the cyber operations performed by Russia. You definitely heard about the missiles being fired by Russia at Ukraine - but how about the propaganda being distributed through ...
ListenThe Lawerence Berkeley Hack, Part 1 from 2023-12-12T19:04:03.854183
Four decades ago, three quarters would’ve gone a lot further than they do today. With that kind of loose change you could’ve picked up some milk from the grocery store, or over half a gallon of ...
ListenThe Lawerence Berkeley Hack, Part 2 from 2023-12-12T19:04:03.849601
Oמ May 23rd, 1989, Karl Koch - a 23 years old West German hacker who worked for the KGB - took a drive, from which he would never return: Nine days later his charred remains were f...
ListenOlympic Destroyer from 2023-12-12T19:04:03.845544
In the midst of 35,000 exhilarated spectators eagerly chanting the time-honored countdown to kick off the 2018 Pyeongchang Winter Olympics, a sinister malware crept through the games' networ...
ListenHow Entire Countries Can Lose the Internet from 2023-12-12T19:04:03.841097
Disruptions to the world’s internet cables happen more often than you think: Whether it be ship anchors or animals or saboteurs, cut a few wires in the right places and at nearly the speed...
ListenThe Reason You Don’t Have Data Privacy from 2023-12-12T19:04:03.835705
We’ve all experienced the creepiness of modern data trafficking, but that kind of daily annoyance is the surface of a much bigger issue: Big Tech companies such as Amazon & Microsoft a...
ListenThe Economics Of Cybersecurity from 2023-12-12T19:04:03.818609
The numbers can’t be any clearer: a DDoS attack costs less than a hundred dollars, while the price tag for mitigating it might reach tens if not hundreds of thousands of dollars. A single ...
ListenAd Fraud, Part 1 from 2023-12-12T19:04:03.812789
Right now, a man named Aleksandr Zhukov is sitting in jail for one of the most financially ruinous schemes ever invented for the internet. Zhukov is guilty. He was caught and convicted under a m...
ListenAd Fraud, Part 2 from 2023-12-12T19:04:03.806485
In the last episode of our show, we heard the story of Methbot: an army of hundreds of thousands of bots, programmatically viewing thousands of advertisements on thousands of made-up websites in...
ListenSony BMG's Rootkit Fiasco from 2023-12-12T19:04:03.800097
"We made a mistake and Sony paid a terrible price.” A terrible price indeed: an arrogant and ill-advised decision to include a rootkit in its music CDs cost Sony BMG a lot of money - a...
ListenRoman Seleznev: Did the Punishment Fit the Crime? from 2023-12-12T19:04:03.794354
In 2019, Roman Seleznev, a 34 years-old Russian national, was sentenced to 27 years in prison: A sentence that’d make any criminal quiver. Seleznev's deeds had a horrendous effect on the 2.9...
ListenThe Voynich Manuscript from 2023-12-12T19:04:03.790512
The constant battle between those who wish to encrypt data and those who wish to break these ciphers has made modern encryption schemes extremely powerful. Subsequently, the tools and meth...
ListenWhy aren't there more bug bounty programs? from 2023-12-12T19:04:03.785033
On the face of it, there's an obvious economic incentive for both vendors and security researchers to collaborate on disclosing vulnerabilities safely and privately. Yet bug bounty pro...
ListenIs Generative AI Dangerous? from 2023-12-12T19:04:03.779364
Every so often, the entire landscape of cybersecurity shifts, all at once: The latest seismic shift in the field occurred just last year. So in this episode of Malicious Life we’re going to take...
ListenCan We Stop the AI Cyber Threat? from 2023-12-12T19:04:03.772383
Much of the cybersecurity software in use today utilizes AI, especially things like spam filters and network traffic monitors. But will all those tools be enough to stop the proliferation of mal...
ListenOperation Kudo from 2023-12-12T19:04:03.766465
In 1981, during the G7 Summit in Quebec, French president Francois Mitterand handen President Raegan a top secret collection of documents, called "Farewell Dossier." The information foun...
ListenSilent Firewalls: The Underrepresentation of Women in Cyber from 2023-12-12T19:04:03.761174
In the vast landscape of STEM, women constitute a mere 28% of the workforce. Yet, when we zoom into the realm of cybersecurity, the number dwindles even further to a startling 20 to 24 percent. ...
ListenShould You Pay Ransomware Attackers? A Game Theory Approach from 2023-12-12T19:04:03.755602
The FBI explicitly advises companies against paying ransomware attackers - but itself payed 4.4 million dollars worth of Bitcoin after the Colonial Pipeline attack. So, should you listen to what...
ListenIs NSO Evil? Part 1 from 2023-12-12T19:04:03.748550
NSO Group, creator of the infamous Pegasus spyware, is widely regarded as a vile, immoral company: a sort of 21st century soldier of fortune, a mercenary in the service of corrupt and evil...
ListenIs NSO Evil? Part 2 from 2023-12-12T19:04:03.743429
By the time Forbidden Stories published its “Pegasus Project” in 2021, NSO was already knee deep in what was probably the worst PR disaster ever suffered by a cybersecurity company - a Listen
Volt Typhoon from 2023-12-12T19:04:03.737965
In August 2021, a port in Houston, Texas, was attacked. Over the following months, a series of attacks occurred in various locations, reminiscent of a serial killer's pattern. Targets includ...
ListenMoonlight Maze from 2023-12-12T19:04:03.732432
When investigators discovered in 1996 that US military networks were being extensively hacked, they didn't realize they were witnessing the birth of what would become Russia's form...
ListenOperation Sundevil and the Birth of the EFF from 2022-05-02T11:53:58
In May 1990, officials from several law enforcement agencies gathered in Phoenix, Arizona, to announce a nationwide crackdown on illegal computer activity. This massive operation, carried out by hu...
ListenMITRE Attack Flow [ML B-Side] from 2022-04-25T06:18:52
The MITRE Attack Flow Project is essentially a new way to visualize, analyze and share knowledge about sequences of adversary behavior. Ingrid Skoog, Ass. Director of R&D at the Center for Threat-I...
ListenThe Aaron Swartz Story from 2022-04-19T13:54:28
When 24-year-old Aaron Swartz was caught scraping millions of science articles off of JSTOR, he faced up to 35 years in prison plus a fine of up to 1 million dollars. Did Aaron's crime justify such...
ListenThe Russia-Ukraine Cyberwar [ML B-Side] from 2022-04-11T11:30:20
Before it invaded Ukraine, Russia was considered - and rightfully so - a cyber superpower. But a month and a half into the war, the lights in Ukraine are still on, as well as cellular communication...
ListenChris Roberts: Hackers on a Plane from 2022-04-05T12:53:31
When Chris Roberts landed at Syracuse, NY - two FBI agents were waiting to escort him off the airplane. Apparently, this wasn't the first time that the Gray Hat hacker was suspected of hacking into...
ListenDIE–A New Paradigm for Cybersecurity [ML B-Side] from 2022-03-28T12:47:16
It’s not every day that we have a guest who’s suggesting a new paradigm for cybersecurity. Sounil Yu, CISO and Head of Research at JupiterOne, talks about a new framework for designing secure syste...
ListenCyber PTSD from 2022-03-22T13:23
We usually count the damage from a cyberattack in Dollars and Euros, but the psychological damage to the victims is rarely discussed, if at all. So, what is the psychological and emotional toll fro...
ListenHow Resilient Is Our Banking System? [ML B-Side] from 2022-03-16T13:08:39
What is the most critical of all critical infrastructure? Is it Electricity? Water Supply? According to Jeff Engles, CEO of Conquest Cyber, it's our Banking and Finance systems. Jeff spoke with Nat...
ListenCrypto AG, Part 3: The Truth Is Revealed from 2022-03-08T11:35:18
By the 1970s, Crypto AG was a large and thriving company, employing over 400 people. This final episode of the series is going to explore how a spying operation affecting over 100 countries, for 70...
ListenQuantum Cyber Security [ML B-Side] from 2022-02-28T13:43:20
Quantum Computing is a fascinating and revolutionary technology that has been gaining significant ground in the past decade, with researchers from both academia and the commercial sector - such as ...
ListenCrypto AG, Part 2: The Death of Bo Jr. from 2022-02-21T14:20:53
How did Boris Hagelin succeed in selling compromised cipher machines to half the world, for more than 50 years? Some have speculated that it was some kind of backdoor. But, no - it was more clever ...
ListenWhy Do APTs Use Ransomware? [ML B-Side] from 2022-02-14T15:49:50
Assaf Dahan, Head of Threat Research with the Cybereason Nocturnus Team, discusses new discoveries about Iranian APTs Moses Staff and Phosphorus that blur the line between state-sponsored attacks a...
ListenCrypto AG–The Greatest Espionage Operation Ever, Part 1 from 2022-02-07T13:34:35
General McArthur, Egpyt's Anwar Sadat, and Iran's Ayatollah Khomeini: These are just a few of the dozens, likely hundreds of targets of arguably the biggest, most ambitious hacking operation ever. ...
ListenWhy aren’t SMBs investing in Cyber Security? [ML B-Side] from 2022-01-31T14:23:36
Attacks against Small-to-Medium size businesses currently represent roughly 40% to 50% of all data breaches. Josh Ablett, founder and CISO of Adelia Risk, speaks with Nate Nelsn about the kind of s...
ListenThe Bloody Origins of Israel’s Cyber Security Industry from 2022-01-25T14:11:01
Israel is a small country - yet its cyber security industry is exceptionally successful. In this episode, we go back to the Yom Kippur War of 1973, to discover how a national trauma and an Intellig...
ListenHacker Highschool: Pete Herzog [ML BSide] from 2022-01-17T15:18:29
Pete Hertzog is a security expert and an educator with a vision: he wants our kids to learn about cybersecurity, and not just about not talking to strangers online - he wants them to learn even mor...
ListenThe Mystery of Cicada 3301 from 2022-01-10T14:27:32
"Hello. We are looking for highly intelligent individuals. To find them, we have devised a test."These words, found in a message posted on 4Chan in January 2012, started a global'treasure hunt'- wi...
ListenHow the Internet Changed the NSA [ML BSide] from 2022-01-03T17:14:42
In the late ’80s to early 2000s, the NSA transitioned from being a hardware-first organization - that is, creating and operating physical spying devices - to software-first: excelling in hacking ne...
ListenDoes Code === Free Speech? from 2021-12-27T14:19:01
When the FBI asked Apple, following the 2015 mass shooting in San Bernardino, to write code that would give the FBI access to a suspect's iPhone - Apple refused, arguing that forcing it to write co...
ListenA digital‘vaccine’for Log4Shell [ML BSide] from 2021-12-20T13:14:26
A digital'vaccine'was released to address Log4Shell, which has been called'the single biggest, most critical vulnerability ever.'Nate Nelson talks to Yonatan Striem-Amit, CTO&Co-Founder of Cybereas...
ListenShawn Carpenter: A Cyber Vigilante from 2021-12-14T15:31:55
In 2003, Shawn Carpenter - an employee of Sandia National Laboratory - was at a crossroads: should he ignore a Chinese attack against U.S. targets, as his superiors ordered him to do - or do what h...
Listen“Ransomware Attackers Don’t Take Holidays”[ML BSide] from 2021-12-06T14:07:43
Last month, in November of 2021, Cybereason - our show’s sponsor - released a special report titled: “Organizations at Risk: Ransomware Attackers Don’t Take Holidays”, focusing on the threat of ran...
ListenTay: A Teenage Bot Gone Rogue from 2021-11-30T16:51:34
In March, 2016, Microsoft had something exciting to tell the world: the tech giant unveiled an AI chatbot with the personality of a teenager. Microsoft Tay - as it was nicknamed - could tweet, answ...
ListenTay: A Teenage Bot Gone Rogue from 2021-11-30T16:51:34
In March, 2016, Microsoft had something exciting to tell the world: the tech giant unveiled an AI chatbot with the personality of a teenager. Microsoft Tay - as it was nicknamed - could tweet, answ...
ListenWild West Hackin’Fest [ML BSide] from 2021-11-23T01:57:48
The Wild West Hackin’ Fest is a unique security conference. Not only because it's held in South Dakota and not only because of the Wild West visual vibe - but also because of the emphasis it puts o...
ListenOperation Flyhook, Part 2 from 2021-11-15T15:00:11
To capture Alexey Ivanov and his business partner and bring them to justice, the FBI created an elaborate ruse: a fake company named'Invita', complete with a fake website and a fake office building...
ListenIP Hijacking [ML BSide] from 2021-11-09T14:30:26
by China Telecom and routed through China. In 2017, traffic from Sweden and Norway to a large American news organization in Japan was hijacked - also to China - for about 6 weeks. What is IP Hijac...
ListenOperation Flyhook, Part 1 from 2021-11-01T15:02:41
Alexey Ivanov was exactly the kind of person to benefit from the early-2000's dot-com boom: He was bright, talented, and knew his stuff. His only problem was the fact that he was born in Chelyabins...
ListenIn Defense Of The NSA [ML B-Side] from 2021-10-26T08:50:56
The NSA is one of the world's most formidable and powerful intelligence agencies. Some people fear that the National Security Agency’s advanced capabilities would one day be directed inwards, inste...
ListenMarcus Hutchins: A Controversial Hero from 2021-10-18T14:31:40
In May 2017, Marcus Hutchins - AKA MalwareTech - became a hero for stopping WannaCry, a particularly nasty ransomware that spread quickly all over the world. Yet his fame also brought to light his ...
ListenOperation GhostShell [ML B-Side] from 2021-10-11T07:42:01
In July, 2021, Nocturnus - Cybereason’s Threat Research and Intelligence team - was called to investigate an espionage campaign targeting Aerospace and Telecommunications companies, mainly in the M...
ListenSmart TVs: A New Battlefield from 2021-10-04T13:45:53
Smart Homes are slowly but surely becoming a part of our everyday lives, and so far it seems that Smart TVs - equipped with microphones, cameras, and an internet connection - are the weakest link. ...
ListenThe MITRE ATT&CK Framework [ML B-Side] from 2021-09-27T07:10:25
In some ways, cyber security is like Art - and that’s not a good thing… MITRE’s ATT&CK framework tries to make sense of the collective knowledge of the security community, and share that knowledge ...
ListenShould The U.S. Ban Chinese and Russian Technology? from 2021-09-20T09:10:35
Every year, seemingly, there’s a new story of some software - like'Tik Tok'or'FaceApp'- from a hostile country that may or may not be a security threat to us in the west. So what should be done in ...
ListenJack Rhysider, Darknet Diaries [ML B-Side] from 2021-09-13T13:32:33
Darknet Diaries, Jack Rhysider's show, is the most popular cyber security podcast - and one of the most successful tech podcasts in the US in general. Eliad Kimhy spoke with Jack about the origins ...
ListenThe Tesla Hack from 2021-09-06T13:17:25
It's every company's nightmare: a mysterious stranger approached an employee of Tesla's Gigafactory in Nevada, and offered him 1 million dollars to do a very simple job - insert a malware-laden USB...
ListenUnderstanding China [ML B-Side] from 2021-08-30T13:05:55
Lt. Colonel (Ret.) Bill Hagestad talks to Nate Nelson about how China's culture and troubled history of western colonializationinfluence its goverment views and actions regarding the global interne...
ListenJohn McAfee from 2021-08-23T15:15:03
What do you get when you take a hypersexual, drug enthusiast gun-toting paranoid - and add some serious amounts of money to the mix? You get a life so bizarre, so unbelievably extreme, that people ...
ListenRSA Breach FollowUp: Are We Doing Security Right? [ML B-Side] from 2021-08-16T13:13:05
Nate Nelson talks to Art Coviello, Former CEO of RSA Security, and Malcolm Harkins, Vice President&Chief Security Officer at Intel, about the current cyber security landscape - 10 years after the R...
ListenDeadRinger [ML B-Side] from 2021-08-10T13:55:04
Nate Nelson talks to Assaf Dahan, Sr. Director and Head of Threat Research at Cybereason’s Nocturnus team about a recent attack they uncovered, on multiple major Telecommunication companies.
ListenThe Jester from 2021-08-03T14:16:32
The Jester is a patriotic, pro-American Hacktivist that since 2010 has waged a personal cyberwar against an array of targets he considers to be “the bad guys.” But detractors have insinuated that s...
ListenThe State of Credit Card Security [ML B-Side] from 2021-07-26T09:33:12
In 2005, when Albert Gonzalez was hacking his way into the networks of many retail chains in the US, credit cards were still very insecure: magnetic stripes and signed receipts did little to stop s...
ListenAlbert Gonzalez, Part 3 from 2021-07-20T08:08:35
In early 2007, a Secret Service agent operating out of San Diego takes a flight halfway across the world. He’s going to meet with Europe’s most prolific stolen card salesman. It is this meeting tha...
ListenDerbyCon–Dave Kennedy [ML B-Side] from 2021-07-13T13:09:22
DerbyCon was all about making the community - a family. Dave Kennedy, one of the founders of DerbyCon, talks about the unique vibe of the conference, his fear of clowns, and why he'll never - NEVE...
ListenAlbert Gonzalez, Part 2 from 2021-07-07T07:04:42
Working with the Secret Service, Albert Gonzalez was outstanding. He was such a good employee, in fact, that they had him do seminars, and speak at government conferences. At one point he met perso...
ListenJeff Moss: DEF CON [ML B-Side] from 2021-06-28T10:52:14
Jeff Moss, founder of the DEF CON Hacker convention (and also the BlackHat convention), talks to Eliad about the origins of DEF CON, its"interesting"relationship with law enforcement agencies, and ...
ListenAlbert Gonzalez, Part 1 from 2021-06-21T08:23:38
It was as a teenager that Albert Gonzalez--one of the few greatest cybercriminals in history--developed the obsession that would go on to ruin his life. Gonzalez and some of his friends would go o...
ListenThe History of THOTCON Hacking Conference [Malicious B-Side] from 2021-06-15T07:55:05
THOTCON is not your ordinary, run-of-the-mill security conference - and it's even obvious from the moment you browse their website. How did a local, small-scale event in Chicago, grow to become a m...
ListenThe History of THOTCON Hacking Conference [Malicious B-Side] from 2021-06-15T07:55:05
THOTCON is not your ordinary, run-of-the-mill security conference - and it's even obvious from the moment you browse their website. How did a local, small-scale event in Chicago, grow to become a m...
ListenChina’s Unrestricted Warfare, Part 3 from 2021-06-08T08:27:38
For more than a decade, China orchestrated a sophisticated espionage campaign against Nortel Networks, using Huawei, Chinese civilians working in Canada, and even organized crime gangs to steal imp...
ListenColonial Pipeline&DarkSide: Assaf Dahan [B-Side] from 2021-06-01T13:57:01
On Friday, May 7th, 2021, Colonial Pipeline suffered a cyberattack that forced the company to shut down its operations. As a result, gasoline outages were reported in many East Coast states. The e...
ListenRSA Breach, Part 2 from 2021-05-24T13:31:19
In the wake of RSA's disclosure of the breach, the company cyber analysts chose not to boot the attackers of their network - but followed their activities closely, trying to figure out their identi...
ListenRSA Breach: The Untold Story, Part 1 from 2021-05-20T11:07:01
In the early 2000s, Nortel was consciously, intentionally, aggressively positioning itself as a partner and a friend of China. At the same time, it was China's number one target for corporate espio...
ListenChina’s Unrestricted Warfare, Part 2 from 2021-05-11T11:29
In the early 2000s, Nortel was consciously, intentionally, aggressively positioning itself as a partner and a friend of China. At the same time, it was China's number one target for corporate espio...
ListenThe History of Security BSides Conferences with Jack Daniel [ML B-Side] from 2021-05-04T10:07:52
Security BSides - or just'BSides', for short'- is the first grassroots, DIY, open security conference in the world - with more than 650 events in more than 50 countries. Jack Daniel, one of BSides'...
ListenThe History of Security BSides Conferences with Jack Daniel [ML B-Side] from 2021-05-04T10:07:52
Security BSides - or just 'BSides', for short' - is the first grassroots, DIY, open security conference in the world - with more than 650 events in more than 50 countries. Jack Daniel, one of BSide...
ListenChina’s Unrestricted Warfare, Part 1 from 2021-04-27T09:53:43
Back in the 1990s, Cyberwarfare was a word rarely used in the West - and definitely unheard of in China, which was just taking it's first steps in the Internet. Two Chinese military officers, veter...
ListenCan Nuclear Power Plants Be Hacked? from 2021-04-19T12:38
Andrew Ginter, VP of Industrial Security at Waterfall Security Solutions, speaks to Sr. Producer Nate Nelson about the cybersecurity of Nuclear facilities. How protected are modern nuclear power pl...
ListenShutting Down The Internet in 30 Minutes: Chris Wysopal [ML B-Side] from 2021-04-12T07:46:29
Chris Wysopal, a cyber security pionneer and one of L0pht's founding members, talks about the group's 1998 testimony in the Senate, how they used shaming to force cooporations to fix their software...
Listen‘L0pht’, Part 2–The End from 2021-04-05T13:32:37
In the early days, the L0pht guys tinkered with what they already had laying around, or could find dumpster diving. But things change, of course. By the end of the ‘90s many of the L0pht hackers ha...
ListenThe Story of‘L0pht’, Part 1 from 2021-03-30T09:40:55
'L0pht', or'L0pht Heavy Indutries', was one of the most infuencial hacker collectives of the 90's: it's members were even invited to testify infront of the Congress on the current state of Internet...
ListenThe MS Exchange Hack [ML B-Side] from 2021-03-22T07:29:51
Israel Barack, Cybereason's CISO and an expert on cyber-warfare, on the recent MS Exchange hack that hit thousands of organizations worldwide: what happened, what were the vulenrabilites expolited...
ListenNotPetya, Part 2 from 2021-03-15T16:52:35
When the NotPetya pandemic hit, CyberAnalyst Amit Serper was sitting in his parents'living room, getting ready to go out with a few friends. He didn't have most of his tools with him, but he noneth...
ListenNotPetya, Part 1 from 2021-03-01T08:11:27
On June 28th, 2017, millions of Ukranians were celebrating'Constitution Day.'Their national holiday turned into a nightmare, as tens of thousands of computers all over the country were infected by...
ListenFacial Recognition in Law Enforcement, Pt. 2 from 2021-02-16T09:00:29
It seems likely that legislation alone won't be able to regulate the widespread use of facial recognition. Andrew Maximov, who uses AI to fight Belarus's dictatorship, shows us another way facical ...
ListenShould Law Enforcement Use Facial Recognition? Pt. 1 from 2021-02-03T12:31:41
There are plenty of reasons why Police should use AI for facial recognition: after all, Humans are notoriously bad eye witnesses. However, placing AI in the hands of law enforcement does have its d...
ListenClearview AI from 2021-01-21T13:50:46
Clearview AI scrapes billions of images off social media and the open web, applies facial recognition algorithms on them - and sells that data to law enforcement agencies all over the world. But wh...
ListenBreaking Into Secure Buildings from 2021-01-07T12:37:22
FC, aka'Freaky Clown', is an expert in"Physical assessments"- otherwise known as breaking into ultra-secure office buildings. FC shares some of his (incredible) adventures, as well as some tips and...
ListenSpecial: The SolarWinds Hack from 2020-12-28T14:05:05
Ran talks to Israel Barak, Cybereason's CISO and a Cyber-defense and Warfare expert, about the recent SolarWinds hack that impacted upto 18,000(!) enterprise organizations in the US. What is a Supp...
Listen100th Episode Special from 2020-12-21T13:14:08
For our 100th episode, we bring you three stories that tie in to previous episodes of the show: Shadow Inc. (Election Hacking), J&K (Max Headroom) and T-Shirt-Gate (Yahoo's Ugly Death). Enjoy :-)
ListenJan Sloot’s Incredible Data Compression System from 2020-12-07T10:01:31
In the mid-90's, a Dutch TV repairman claimed he invented a revolutionary data compression technology that could compress a full-length movie into just 8KB.
ListenOp. GUNMAN&The World’s First Keylogger from 2020-11-22T09:51:35
In 1983, the US got word that an ally's embassy - probably France's - was bugged by the Soviets. This reports triggered Operation GUNMAN: a complete removal&de-bugging of *all* electronic devices i...
ListenElection Hacking, Part 2 from 2020-11-03T04:42:33
Georgia's elections infrastructure had been hacked multiple times since 2014 - both by Russian Intelligence and local White Hat hackers. The upcoming elections are plagued with uncertainty - and un...
ListenElection Hacking, Part 1 from 2020-10-22T17:21:04
Today we’re talking about just one state. One which, depending on which way it leans, might bring the entire electoral college with it. One which, as of this writing, is absolutely, positively, nec...
ListenMDR Vs. The TrickBot Gang from 2020-10-12T14:21:03
About a year ago, Cybereason's Managed Detection and Response team (aka MDR) stumbled upon a attack involving Russian cybercriminals, POS devices and an entire new family of previously undiscovered...
ListenYahoo’s Ugly Death, Part 2 from 2020-09-25T06:47:27
Between 2010 and 2014, Yahoo was hacked numerous times - each time setting a new'world record'for the largest data breach in history. It also hid those breaches from it's investors, customers and t...
ListenYahoo’s Ugly Death, Part 1 from 2020-09-11T07:20:44
When Marissa Mayer joined Yahoo as CEO, the company's stock rose 2% the day of the announcement. But the new CEO was basically initiated into her job by a major data breath - and the worst was yet ...
ListenThe Great Firewall of China, Pt. 2: Cisco’s Trial from 2020-08-27T12:47:10
Falun Gong is a religious movement heavily persecuted in China. In 2017, members of the movement sued Cisco Systems for aiding and abetting the Chinese government in this persecution - since Cisco ...
ListenThe Great Firewall of China–Part 1 from 2020-08-14T08:03:24
The Great Firewall is just mind-bogglingly big, repressing freedom of speech and information for over 800 million Chinese internet users every year. The Great Firewall is so big that it’s worth ask...
ListenMulti-Stage Ransomware (Live!) from 2020-08-02T13:32:48
Ran&Israel Barak, Cybereason's CISO, discuss the latest development in ransomware evolution: multi-stage attacks in which the attackers infiltrate the target network, steal data and gather intellig...
ListenProtecting The“Panama Papers”Whistleblower from 2020-07-16T10:30:19
In 2015 Bastian Obermayer, an investigative journalist for the Süddeutsche Zeitung, received a message every journalist dreams of: the biggest leak in journalism history. But dealing with the massi...
ListenFrom Ransomware To Blackmail, With Assaf Dahan from 2020-07-07T13:08:19
Hackers keep modifying and improving their methods of operations. Assaf Dahan, Sr. Director and Head of Threat Research at Cybereason, tells us about the recent shift to Blackmail - as a way to pre...
ListenSegWit2x, Part 3 from 2020-07-03T06:02
On August 1st, 2017, Bitcoin forked. But it wasn't the SegWit2x fork everyone was talking about - It was a different fork, supported by a coalition of miners who, in doing what they were doing, wer...
ListenSegWit2x, Part 2 from 2020-06-19T04:21:55
SegWit2x was proposed as a solution to Bitcoin's network problems - but some people in the anti-2x movement claimed that it is nothing less than a cyber-attack: a 51% attack on Bitcoin, to be preci...
ListenHacking Fortnite Accounts (CPRadio) from 2020-06-11T11:31:33
A black market economy has developed around Fortnite's in-game currency. Cyber criminals are hacking user accounts, juicing credit cards, and selling virtual currency for real-life dollars and cent...
ListenSegWit2x, or–The Year Bitcoiners Will Never Forget, Part 1 from 2020-06-04T09:09:20
In 2017, Bitcoin was winning. Money, attention, success poured out of every seam. It appeared that a golden age had dawned. But just under the surface, the network was teetering on the verge of col...
ListenNo Honor Among Thieves from 2020-05-22T05:13:05
Amit Serper was doing a routine inspection on a client's network, when he came across a suspicious-looking pen-testing tool, exhibiting RAT-like behavior. We'll follow Amit's investigation, and in ...
ListenCybersecurity during a crisis: how remote work has impacted security–With Sam Curry from 2020-05-14T12:59:44
The COVID19 pandemic forced organizations to transition to a work-from-home model - and many of them were unprepared for such a radical departure from the ‘normal’ security perimeter. Sam Curry, Cy...
ListenThe Problem With Passwords from 2020-05-08T05:13:36
At the end of our last episode, it kind of seemed like Huawei--the Chinese telecommunications company accused of aiding in state cyberspying--was completely innocent. They were being accused of cri...
ListenThe Huawei Ban, Part 2 from 2020-04-23T12:05:12
At the end of our last episode, it kind of seemed like Huawei--the Chinese telecommunications company accused of aiding in state cyberspying--was completely innocent. They were being accused of cri...
ListenThe Huawei Ban, Part 1 from 2020-04-09T08:32:02
Over the past 20 years, western governments have accused Huawei of everything from IP theft to financial fraud to cyber spying. Often, these claims are made either with no evidence, or only circums...
ListenThe Max Headroom Signal Hijack from 2020-03-24T08:19:26
On November 22nd, 1987, a hacker took over the signals of two Chicago-area TV stations and broadcast two bizarre and somewhat vulgar messages. In this episode we explore this notorious hack, and it...
ListenToTok, Part 3: Becoming a Spyware Superpower from 2020-03-15T10:18:19
The fact that ToTok came out of the United Arab Emirates is no surprise: in recent years, the UAE has deployed some of the most sophisticated mobile device exploits ever seen. But they got a lot of...
ListenToTok, Part 2: The Masterminds of Mobile Malware from 2020-03-10T08:53:29
The corporate structure supporting ToTok involved at least half a dozen real companies, shell companies and intelligence groups, with the individuals who actually operated the app being hidden behi...
ListenToTok, Part 1: How to Convince Someone to Download Spyware from 2020-03-05T08:49:42
Only a few months after its release, ToTok - an ordinary messaging app, with no exceptional features - had over five million downloads, and held the number 4 position in Apple's App Store global c...
ListenHow To Defend A Bank, Part 2: Right Of Bang from 2020-02-27T09:33:08
As much as we can imagine what it’s like to be a defender in a cyber-conflict, we don’t really know what it is - unless we’re in the shoes the time of it happening. That's what simulations are for.
ListenHow To Defend A Bank, Part 1: Fusion Centers from 2020-02-13T09:08:45
Banks&other financial institutions face a variety of security threats: from state-sponsored cyber-attacks, to smaller acts of fraud, to thousands of random malware attacks from the web. To survive ...
ListenTriton, Part 2: The World’s Most Dangerous Malware from 2020-01-30T07:31:38
Petro Rabigh were facing lots of problems in defending their systems. But they did get lucky in one sense: their hackers were unprepared when their plan went awry. Who were the hackers that infiltr...
ListenTriton: A Malware Designed To Kill Humans, Part 1 from 2020-01-16T11:50:18
Industrial Security requires a different skill set--really, an entirely different mindset than working in IT does. In this episode we dive into the story of one of the most dangerous malware ever t...
ListenDeep Fakes, Part 2: Man Vs. Machine from 2020-01-02T09:07:55
Deep Fakes are set to revolutionize content creation, but alongside this technology's benefits, it also has the potential two sow havoc, fear, and distrust via Social Networks. Just this week, Face...
ListenGAN and Deep Fakes, Part 1 from 2019-12-19T15:33:37
Over the past two years, the internet has been inundated with celebrity Deep Fake videos of all kinds: Obama, Putin, and Trump deliver speeches they never gave, Gal Gadot"stars” in a porn video, an...
ListenSam Curry: The 2020 Crystal Ball from 2019-12-10T15:17:17
Sam Curry is Cybereason's Chief Security Officer and an award-winning cyber security visionary. Sam&Ran discuss Sam's upcoming webinar, in which he will present his insights into what 2020 will bri...
ListenHuman Side Channels from 2019-12-05T15:44:01
Even the best hackers are human, and humans are inescapably unique. Forensic Linguistics, Behavioral Signatures and Cultural Captchas can help defenders identify and (maybe) catch even the best of ...
ListenWhat’s the problem with Cyber Insurance? from 2019-11-21T12:12:23
Thousands of companies are losing millions of dollars to cyber attacks. An insurance seems an ideal solution to their woes - yet this kind of insurance is much less common today, than it should be....
ListenGozi B-Side: Amit Serper&Sam Curry from 2019-11-19T08:20:56
Nate Nelson speaks with Amit Serper&Sam Curry, notable veteran in Cyber Security, about Malware-As-A-Service, bullet-proof hosting, avoiding the lure of the'dark side'and more.
ListenGozi, Part 2 from 2019-11-14T15:07:09
In 2010, Nikita Kuzmin returned to the malware scene with Gozi 2.0, an improved version of the successful banking Trojan. How did Gozi 2.0 fair against Zeus&the new generation of Trojans, and what ...
ListenB-Side: Lodrina Cherne On Stalkerware from 2019-11-08T08:06:36
In this out-of-band episode, we're bringing you the full interview with Lodrina Cherne, a Digital Forensics Expert, on Spyware : what is it, how it works, who sells it, and how you can avoid it you...
ListenGozi, Part 1: The Rise of Malware-as-a-Service from 2019-10-31T09:19:08
Nikita Kuzmin could have been a whiz programmer or a CEO of a successful startup. But as a teen in Moscow, he fell in with the wrong crowd, and his entrepreneurial skills found a different path: Go...
ListenHow is Spyware Legal? from 2019-10-17T07:53:44
Today's Cyber Stalkers have free access to almost government-grade spyware software with which they can terrorize their victims. Who's enabling the commercial spyware market?
ListenListeners Survey Special from 2019-10-10T10:24:16
Ran and Eliad Kimhi, one of the show's top producers, discuss the recent Listener's Survey results: what do like and dislike about the show, ideas you gave us for future improvements - and what do ...
ListenOperation Aurora, Part 2 from 2019-09-26T14:01:43
Google, it turned out, was only one of 35 major US corporations hit in Aurora. Was is an espionage campaign, or could it be that it all began with one top ranking Chinese official who googled his o...
ListenOperation Aurora, Part 1 from 2019-09-12T07:23
In January 2010, Google revealed in its blog that it was hacked. This attack, since known as Operation Aurora, is attributed to China. In this series of episodes, we'll expose the complicated and o...
ListenResponding to a Cyber Attack with Missiles from 2019-08-29T07:54:45
Is the use of deadly force a legitimate – and practical – response to cyber attacks? what lessons did Israel learn from the Yom Kippur War of 1973 about the best way to manage it’s offensive cyber ...
ListenAre Ad Blockers Malicious? from 2019-08-15T06:04:43
Ad Blockers, such as AdBlock Plus, provide an important service to users who find web ads annoying, creepy and sometimes even dangerous. In recent years, how ever, the business models adopted by so...
ListenOperation SoftCell from 2019-07-04T10:07:51
A rare, inside look, at how Cybereason's researchers were able to uncover one of the largest Cyber Espionage campaigns ever discovered, against multiple Telecommunications companies around the world.
Listen‘Pa Bell’Vs. Youth International Party Line from 2019-06-13T17:21:03
The YIPL phreaking magazine was the spiritual predecessor to the better-known'2600'zine, and it was founded by a ideological party determined to bring down the largest monopoly in US history: Bell ...
ListenThe U.S vs. Gary McKinnon from 2019-05-27T10:06:44
After the Challenger Disaster of 1986, NASA had a hard time convincing the public that the Galileo spacecraft, fueled by radioactive Plutonium, is safe to launch. The WANK worm, it turns out, was a...
ListenThe WANK Worm, Part 2 from 2019-05-10T06:03:26
After the Challenger Disaster of 1986, NASA had a hard time convincing the public that the Galileo spacecraft, fueled by radioactive Plutonium, is safe to launch. The WANK worm, it turns out, was a...
ListenThe WANK Worm, Part 1 from 2019-04-25T06:45:53
On October 16th, 1989, NASA's scientists went into work preparing to launch a spacecraft that very day. But when they sat down to their computers, they were met with an unexpected greeting: “Your ...
ListenThe Equifax Data Breach Pt. II: The Bits Hit The Fan from 2019-04-11T08:58:39
After its momentous breach, Equifax's CEO Richard Smith said: “Equifax will not be defined by this incident, but rather by how we respond.”Well, he was spot on, but not in a good way.
ListenThe Equifax Data Breach Pt. I: A Big Data Bubble from 2019-03-27T07:22:37
In their 120 year history, Equifax never sold anything, or provided any service to ordinary folks - except collect DATA. In 2017, that huge data repository, a 1000 times larger then the Library of ...
ListenDeCSS: Hackers Vs Hollywood from 2019-03-13T11:05:09
Twenty years ago, a 15-years old Norwegian kid was put on trial for breaking the DVD Copy Prevention system. His case spawned a whole new"artistic"movement...
ListenMarconi&The Maskelyne Affair from 2019-02-21T14:30:30
Guglielmo Marconi--the beloved, hated, disputed inventor of radio--gets trolled by a mustached magician in the world’s first ever, wireless, grey hat hack.
ListenThe Fall Of Mt. Gox–Part 2 from 2019-02-06T15:36:24
In its prime, Mt. Gox was essentially the place where Bitcoin happened. But for two years, Mt. Gox was imploding from the inside - while soaring to unprecedented success on the outside.
ListenThe Fall Of Mt. Gox–Part 1 from 2019-01-22T10:50:34
In its prime, Mt. Gox was essentially the place where Bitcoin happened. But for two years, Mt. Gox was imploding from the inside - while soaring to unprecedented success on the outside.
ListenDave Kennedy: The Psychological Principles of Social Engineering from 2018-12-25T08:48:46
Today on Malicious Life, tens of thousands of people get robbed. Then a community gets together to ask: should we take our money back, or let the hacker walk with it?
ListenThe Ethereum DAO Hack from 2018-12-13T12:12:06
Today on Malicious Life, tens of thousands of people get robbed. Then a community gets together to ask: should we take our money back, or let the hacker walk with it?
ListenThe Jerusalem Virus, Part 2 from 2018-11-26T11:14:17
How did the Jerusalem virus trigger the birth of the entire Anti Virus industry in Israel? A high-stakes wager on Live TV, and more.
ListenThe Jerusalem Virus, Part 1 from 2018-11-15T08:40:33
Although scary, the Jerusalem virus, discovered in Israel in 1987, was in fact a rather simple virus. How, then, did the virus trigger the birth of an entire national industry?
ListenGene Spafford on the Morris Worm&Cyber-security in the 1980’s from 2018-10-31T13:19:52
Eugene Spafford (aka Spaf), a professor of computer science at Purdue University, was the first researcher to publish a detailed analysis of the infamous Morris Worm. Gene talks to Ran about this i...
ListenChina Vs. Github from 2018-10-16T14:15:30
It’s a weapon that harnessed the strength of millions of computers at once: a cannon so powerful it could break through any wall, take down any website. It is “the Great Cannon”.
ListenThe Ashley Madison Hack, Part 2 from 2018-10-04T13:54:24
On the second installment of our Ashely Madison hack retelling, we look at the fallout of one of the hack, and the people who’ve suffered from it.
ListenThe Ashley Madison Hack, Part 1 from 2018-09-19T04:46:38
When Ashley Madison got hacked, it made international headlines. Why? Because it wasn’t just a major event. It demonstrated how there’s information even more sensitive, even more significant than y...
ListenInterview Special: Graham Cluley from 2018-09-05T14:52:37
As we prepare to release an awesome 2-part story in two weeks, we decided to give you a chance to go back to some old favorites and check out some of the behind-the-scenes interviews of Malicious L...
ListenThe Target Hack from 2018-08-23T06:49:57
If movies have taught me anything, it’s that if you want to rob a bank, you dress as the cleaning crew. The people behind the Target hack must have seen one action film too many, because when they ...
ListenWoW: Corrupted Blood from 2018-07-25T06:17:47
How does the outbreak of a “plague” inside a video game- a bug, essentially- affect real-life disease research?
ListenThe Stuxnet Virus Pt. 3 from 2018-07-12T16:41:19
Stuxnet was a devastating weapon, but who wielded it? That is the question we try to answer with the final installment of our Stuxnet series. In this episode, we explore other, similar battles of t...
ListenThe Stuxnet Virus Pt. 2 from 2018-07-12T15:39:43
Stuxnet was a weapon, a kind of a smart bomb- perhaps one of the smartest bombs ever created. A bomb that couldn’t rely on operators, cameras, and laser targeting, instead it had to “think” its way...
ListenThe Stuxnet Virus Pt. 1 from 2018-07-12T14:38:13
Where armies once fought with bullets and bombs, they now engage in clandestine, invisible warfare. In 2010 a virus was discovered that would change the world’s perception of cyber warfare forever....
ListenShamoon–The Biggest Hack In History from 2018-06-29T08:34:10
The Shammon Virus. There is a single company, run by a royal family, which employs the majority of the Saudi working population. It’s worth more than Apple, Google, and Amazon…by a lot. The Saudi A...
ListenThe Melissa Virus from 2018-06-14T08:29:07
Not all malware is created equal. Some malware will attempt to erase your files, demand ransom, or steal your information. Others will do no such thing- and still end up being worse. Don’t believe ...
ListenThe Morris Worm Pt. 2 from 2018-05-16T06:07:57
In an attempt to halt the Morris worm’s path of destruction, a systems administrator at Harvard shut down the university router through which Andy Sudduth’s message would be sent to the internet. ...
ListenThe Morris Worm Pt. 1 from 2018-05-02T11:40:16
We’ve introduced you to some of the seminal malware attacks that have shaped cybersecurity history. Perhaps no other incident in history, though, has had the effect on how we think about computer s...
ListenThe Half Life 2 Hack from 2018-04-18T13:31:05
How far should a die-hard fan go, in order to bring closer to them the thing that they love? In one of the most interesting, yet relatively unknown cybersecurity stories, a young hacker attempts to...
ListenThe Legalities of the Cyber War from 2018-04-04T06:52:39
Catching a criminal is by no means easy, but there’s something we take for granted in any crime: that the criminal has a face and a name, that they used a specific weapon on a specific target, and ...
ListenFancy Bear, Cozy Bear from 2018-03-21T06:52:24
When representatives from the Democratic National Committee reached out to a silicon valley cybersecurity company, to investigate a potential breach in their computer system, it’s hard to imagine w...
ListenCyber Terrorism from 2018-02-21T13:11:41
What governments and powerful organizations regularly use, others will find ways to use as well. Cyber activity fits so incredibly well with terrorism. Actors can remain hidden, or reveal themselve...
ListenSuper Spies from 2018-02-07T12:16:07
The NSA has many means at its disposal. But how does it use these means, and for what goals? Discover the (literally) secret history of the NSA’s cyber activity. Travel with us to Russia and back, ...
ListenThe Trojan Horse Affair from 2018-01-24T06:01:24
The early 2000s were an interesting time in Information Security. This is roughly the period when malware transitioned from viruses written by teenagers for fun, to cybercrime tools in the hands of...
ListenFriend or Foe from 2018-01-10T06:08:57
The largest hack in U.S military history may have been conducted by… The NSA. In 1997, a wargame conducted by the NSA showed just how unprepared we were for a potential cybernetic strike- in 4 days...
ListenAmit Serper Interview- Holiday Special Episode from 2017-12-27T06:45:50
It’s the holidays and everyone’s on vacation – but the Internet never rests and neither do the bad guys in cybersecurity. So, for this holiday special, we figured we’ll air an interesting interview...
ListenWeapons of Mass Disruption from 2017-11-29T14:09:26
The threat of fire and fury stands at the center of all modern conflicts- nuclear bombs that can eradicate life in seconds are the ultimate weapon of war, as they pose a huge threat to centers of p...
ListenThe Soldiers of North Korea from 2017-11-15T05:01:25
Guerrilla warfare has been around for as long as conventional warfare has. The idea that a small force, through cunning and brazen action, could overtake a larger force is an old one. From pirates ...
ListenThe Propaganda from 2017-11-01T06:07:28
Governments around the world have been making devious use of the internet as a platform to spread, not malware, but propaganda. As in all wars, propaganda is a huge part of the modern cyber war. Jo...
ListenThe Whistleblowers from 2017-10-17T06:26:12
WikiLeaks has ushered in a new age in whistle blowing: Modern leakers such as Chelsea Manning – who’s story is the focus of our current episode – expose huge amounts of confidential information. Bu...
ListenStuxnet, part 3 from 2017-10-02T06:30:07
Stuxnet was a devastating weapon, but who wielded it? That is the question we try to answer with the final installment of our Stuxnet series. In this episode, we explore other, similar battles of t...
ListenStuxnet, part 2 from 2017-09-18T06:33:52
Stuxnet was a weapon, a kind of a smart bomb- perhaps one of the smartest bombs ever created. A bomb that couldn’t rely on operators, cameras, and laser targeting, instead it had to “think” its way...
ListenStuxnet, part 1 from 2017-08-30T09:30:56
Where armies once fought with bullets and bombs, they now engage in clandestine, invisible warfare. In 2010 a virus was discovered that would change the world’s perception of cyber warfare forever....
ListenHell to Pay from 2017-08-21T08:02:44
A global FBI manhunt for the world’s most wanted cyber criminal ends in the capture of a massive criminal network, but with the escape of the man himself. Security experts who operate within the gr...
ListenThe Roots of Evil from 2017-08-07T07:32:57
WannaCry’s widespread cyber attack on more than 200,000 computers all over the world made headlines – but only a few people remember a similar attack, named The AIDS Trojan, almost 30 years earlier...
ListenBig Cannons from 2017-07-24T08:31:02
2016 is known throughout the circles of information security as “The Year of The DDoS Attacks”, and rightfully so: 5 large scale DDoS attacks – ‘Distributed Denial Of Service’ – shocked the technol...
ListenSpam Empire from 2017-07-06T11:08:30
In this episode of Malicious Life, we take a look at one of the oldest forms of criminal activity on the web- the spam empires of the 90’s and 2000’s. Find out how these multi-million dollar indust...
ListenThe Dark Avenger from 2017-06-30T06:38:38
In 1989, a message was found in a virus: “Eddie Lives…Somewhere in Time!”. ‘Eddie’ was a particularly nasty virus, and its discovery led a young Bulgarian security researcher down a rabbit hole, on...
ListenGhost In The Machine from 2017-06-28T07:01:06
Cybercrime is one of the most notable threats we face as computer users, nowadays. But it wasn’t always so. Those of us who’ve been in the field long enough may remember a time when computer viruse...
Listen