Podcasts by Malicious Life

Malicious Life

Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.

Further podcasts by Cybereason

Podcast on the topic Technologie

All episodes

Malicious Life
Aaron Swartz from 2023-12-12T19:04:04.108630

Aaron Swartz



Advertising Inquiries: https://redcircle.com/brands

Listen
Malicious Life
MITRE Attack Flow [ML B-Sides] from 2023-12-12T19:04:04.103786

MITRE Attack Flow [ML B-Sides]



Advertising Inquiries: https://redcircle.com/brands

Listen
Malicious Life
Op. Sundevil And The Birth of the EFF from 2023-12-12T19:04:04.098991

Op. Sundevil And The Birth of the EFF



Advertising Inquiries: https://redcircle.com/brands

Listen
Malicious Life
How to Russia-Proof Your Democracy [ML BSide] from 2023-12-12T19:04:04.094686

How to Russia-Proof Your Democracy [ML BSide]



Advertising Inquiries: https://redcircle.com/brands

Listen
Malicious Life
Operation CuckooBees [ML B-Side] from 2023-12-12T19:04:04.089310

Operation CuckooBees [ML B-Side]



Advertising Inquiries: https://redcircle.com/brands

Listen
Malicious Life
What The LinkedIn Hack Taught Us About Storing Passwords from 2023-12-12T19:04:04.084332

What The LinkedIn Hack Taught Us About Storing Passwords



Advertising Inquiries: https://redcircle.com/brands

Listen
Malicious Life
Catching A Cybercriminal [ML B-Side] from 2023-12-12T19:04:04.078025

Catching A Cybercriminal [ML B-Side]



Advertising Inquiries: https://redcircle.com/brands

Listen
Malicious Life
Hackers vs. Spies: The Stratfor Leaks, Pt. 1 from 2023-12-12T19:04:04.073302

Hackers vs. Spies: The Stratfor Leaks, Pt. 1



Advertising Inquiries: https://redcircle.com/brands

Listen
Malicious Life
Hackers vs. Spies: The Stratfor Leaks, Pt. 2 from 2023-12-12T19:04:04.067513

Hackers vs. Spies: The Stratfor Leaks, Pt. 2



Advertising Inquiries: https://redcircle.com/brands

Listen
Malicious Life
Malicious LIVE: Celebrating 5 Years of Malicious Life from 2023-12-12T19:04:04.061158

Malicious LIVE: Celebrating 5 Years of Malicious Life



Advertising Inquiries: https://redcircle.com/brands

Listen
Malicious Life
The “Cypherpunks” Who Invented Private Digital Money from 2023-12-12T19:04:04.055652

The “Cypherpunks” Who Invented Private Digital Money



Advertising Inquiries: https://redcircle.com/brands

Listen
Malicious Life
Jacob Goldstein: The Future of BitCoin [ML BSide] from 2023-12-12T19:04:04.050277

Jacob Goldstein: The Future of BitCoin [ML BSide]



Advertising Inquiries: https://redcircle.com/brands

Listen
Malicious Life
Silk Road: The Amazon of drugs, Part 1 from 2023-12-12T19:04:04.044884

Silk Road: The Amazon of drugs, Part 1



Advertising Inquiries: https://redcircle.com/brands

Listen
Malicious Life
Kurtis Minder: Ransomware Negotiations [ML BSide] from 2023-12-12T19:04:04.040064

Kurtis Minder: Ransomware Negotiations [ML BSide]



Advertising Inquiries: https://redcircle.com/brands

Listen
Malicious Life
Silk Road, The Amazon of Drugs - Part 2 from 2023-12-12T19:04:04.034899

Silk Road, The Amazon of Drugs - Part 2



Advertising Inquiries: https://redcircle.com/brands

Listen
Malicious Life
Andrew Ginter: A 40-Years-Old Backdoor [ML-BSide] from 2023-12-12T19:04:04.025837

Andrew Ginter: A 40-Years-Old Backdoor [ML-BSide]



Advertising Inquiries: https://redcircle.com/brands

Listen
Malicious Life
“Designed by criminals, for criminals”: Operation Trojan Shield from 2023-12-12T19:04:04.020782

“Designed by criminals, for criminals”: Operation Trojan Shield



Advertising Inquiries: https://redcircle.com/brands

Listen
Malicious Life
"A CISO's Nightmare": Israel Baron on Railway Secuirty from 2023-12-12T19:04:04.015463

"A CISO's Nightmare": Israel Baron on Railway Secuirty



Advertising Inquiries: https://redcircle.com/brands

Listen
Malicious Life
Leo Kuvayev– The Czar of Spammers from 2023-12-12T19:04:04.009475

Criminals, particularly cyber criminals, aren’t “good” people; in most cases, they do have their own personal boundaries. Every once in a while, you encounter a criminal who’s different. Someone...

Listen
Malicious Life
Software Bill of Materials (SBOMs) [ML BSide] from 2023-12-12T19:04:04.002228

Software Bill of Materials (SBOMs) [ML BSide]



Advertising Inquiries: https://redcircle.com/brands

Listen
Malicious Life
Hacking Language Models from 2023-12-12T19:04:03.997162

Language models are everywhere today: they run in the background of Google Translate and other translation tools; they help operate voice assistants like Alexa or Siri; and most interestingly, t...

Listen
Malicious Life
Hacking Multi-Factor Authentication from 2023-12-12T19:04:03.992241

Multi-Factor Authentication (MFA) is usually considered a better solution for authentication than just using passwords. But Roger Grimes, a veteran security professional, and a Data-Driven Defen...

Listen
Malicious Life
"King Kimble": Kim DotCom from 2023-12-12T19:04:03.987152

The US government says that Kim Schmitz, better know as Kim DotCom, is the leader of a file sharing crime ring. He sees himself as a an internet freedom fighter: a fugitive on the run from vindi...

Listen
Malicious Life
What’s it's Like to Fight LulzSec [ML B-Side] from 2023-12-12T19:04:03.982364

What’s it's Like to Fight LulzSec [ML B-Side]



Advertising Inquiries: https://redcircle.com/brands

Listen
Malicious Life
Hacking Stock Markets, Part 1 from 2023-12-12T19:04:03.977532

Hacking Stock Markets, Part 1



Advertising Inquiries: https://redcircle.com/brands

Listen
Malicious Life
Vishing: Voice Scams [ML BSide] from 2023-12-12T19:04:03.972865

Vishing: Voice Scams [ML BSide]



Advertising Inquiries: https://redcircle.com/brands

Listen
Malicious Life
Hacking Stock Markets, Part 2 from 2023-12-12T19:04:03.968031

Hacking Stock Markets, Part 2



Advertising Inquiries: https://redcircle.com/brands

Listen
Malicious Life
What Would Happen if CBS Got Hacked? [ML BSide] from 2023-12-12T19:04:03.963099

What Would Happen if CBS Got Hacked? [ML BSide]



Advertising Inquiries: https://redcircle.com/brands

Listen
Malicious Life
LabMD Vs. The FTC from 2023-12-12T19:04:03.957938

LabMD Vs. The FTC



Advertising Inquiries: https://redcircle.com/brands

Listen
Malicious Life
What can Chess grandmasters teach us about Cyber? [ML BSide] from 2023-12-12T19:04:03.952489

What can Chess grandmasters teach us about Cyber? [ML BSide]



Advertising Inquiries: https://redcircle.com/brands

Listen
Malicious Life
The Russian Business Network from 2023-12-12T19:04:03.947128

The Russian Business Network



Advertising Inquiries: https://redcircle.com/brands

Listen
Malicious Life
Jailbreaking Tractors [ML BSide] from 2023-12-12T19:04:03.942091

Jailbreaking Tractors [ML BSide]



Advertising Inquiries: https://redcircle.com/brands

Listen
Malicious Life
Norse Corp.: How To NOT build a cybersecurity startup from 2023-12-12T19:04:03.936682

Norse Corp.: How To NOT build a cybersecurity startup



Advertising Inquiries: https://redcircle.com/brands

Listen
Malicious Life
The Problem With Kernel-Mode Anti-Cheat Software from 2023-12-12T19:04:03.920907

The Problem With Kernel-Mode Anti-Cheat Software



Advertising Inquiries: https://redcircle.com/brands

Listen
Malicious Life
Thamar Reservoir from 2023-12-12T19:04:03.915742

Thamar Gindin is an Israeli scholar whose research focuses on the Persian language. For the past seven years (at least) Thamar has been a target for an endless stream of spear-phishing attempts ...

Listen
Malicious Life
Fred Cohen: The Godfather of Computer Viruses [ML B-Side] from 2023-12-12T19:04:03.910903

Fred Cohen: The Godfather of Computer Viruses [ML B-Side]



Advertising Inquiries: https://redcircle.com/brands

Listen
Malicious Life
How Netflix Learned Cloud Security from 2023-12-12T19:04:03.905876

How Netflix Learned Cloud Security



Advertising Inquiries: https://redcircle.com/brands

Listen
Malicious Life
Cyberbunker, Part 1 from 2023-12-12T19:04:03.900792

Cyberbunker, Part 1



Advertising Inquiries: https://redcircle.com/brands

Listen
Malicious Life
Cyberbunker, Part 2 from 2023-12-12T19:04:03.895515

Cyberbunker, Part 2



Advertising Inquiries: https://redcircle.com/brands

Listen
Malicious Life
FBI vs. REvil [ML BSide] from 2023-12-12T19:04:03.889435

FBI vs. REvil [ML BSide]



Advertising Inquiries: https://redcircle.com/brands

Listen
Malicious Life
You Should Be Afraid of SIM Swaps from 2023-12-12T19:04:03.883595

 You Should Be Afraid of SIM Swaps



Advertising Inquiries: https://redcircle.com/brands

Listen
Malicious Life
SIM Swapping Follow Up [ML B-Side] from 2023-12-12T19:04:03.878041

SIM Swapping Follow Up [ML B-Side]



Advertising Inquiries: https://redcircle.com/brands

Listen
Malicious Life
The (Other) Problem with NFTs from 2023-12-12T19:04:03.873556

Physical artworks in museums are usually well-guarded - but digital artworks are something else entirely: in 2021 alone, scammers successfully stole 100 million dollars worth of non-fungible tok...

Listen
Malicious Life
Why Do NFTs Disappear? [ML BSide] from 2023-12-12T19:04:03.868262

What happens when an NFT marketplace goes under, and disappears? You would imagine that the users’ NFTs are perfectly safe: after all, the blockchain itself is still there, right? But that...

Listen
Malicious Life
Operation Ivy Bells from 2023-12-12T19:04:03.862875

In the early 1970's, US intelligance pointed at the possibility that the Russians have laid an underwater communication cable between two important naval bases in the Far East. The dangerous...

Listen
Malicious Life
Russian Propaganda, Explained [ML B-Side] from 2023-12-12T19:04:03.858336

You may have heard of the cyber operations performed by Russia. You definitely heard about the missiles being fired by Russia at Ukraine - but how about the propaganda being distributed through ...

Listen
Malicious Life
The Lawerence Berkeley Hack, Part 1 from 2023-12-12T19:04:03.854183

Four decades ago, three quarters would’ve gone a lot further than they do today. With that kind of loose change you could’ve picked up some milk from the grocery store, or over half a gallon of ...

Listen
Malicious Life
The Lawerence Berkeley Hack, Part 2 from 2023-12-12T19:04:03.849601

Oמ May 23rd, 1989, Karl Koch - a 23 years old West German hacker who worked for the KGB -  took a drive, from which he would never return: Nine days later his charred remains were f...

Listen
Malicious Life
Olympic Destroyer from 2023-12-12T19:04:03.845544

In the midst of 35,000 exhilarated spectators eagerly chanting the time-honored countdown to kick off the 2018 Pyeongchang Winter Olympics, a sinister malware crept through the games' networ...

Listen
Malicious Life
How Entire Countries Can Lose the Internet from 2023-12-12T19:04:03.841097

Disruptions to the world’s internet cables happen more often than you think: Whether it be ship anchors or animals or saboteurs, cut a few wires in the right places and at nearly the speed...

Listen
Malicious Life
The Reason You Don’t Have Data Privacy from 2023-12-12T19:04:03.835705

We’ve all experienced the creepiness of modern data trafficking, but that kind of daily annoyance is the surface of a much bigger issue: Big Tech companies such as Amazon & Microsoft a...

Listen
Malicious Life
The Economics Of Cybersecurity from 2023-12-12T19:04:03.818609

The numbers can’t be any clearer: a DDoS attack costs less than a hundred dollars, while the price tag for mitigating it might reach tens if not hundreds of thousands of dollars. A single ...

Listen
Malicious Life
Ad Fraud, Part 1 from 2023-12-12T19:04:03.812789

Right now, a man named Aleksandr Zhukov is sitting in jail for one of the most financially ruinous schemes ever invented for the internet. Zhukov is guilty. He was caught and convicted under a m...

Listen
Malicious Life
Ad Fraud, Part 2 from 2023-12-12T19:04:03.806485

In the last episode of our show, we heard the story of Methbot: an army of hundreds of thousands of bots, programmatically viewing thousands of advertisements on thousands of made-up websites in...

Listen
Malicious Life
Sony BMG's Rootkit Fiasco from 2023-12-12T19:04:03.800097

"We made a mistake and Sony paid a terrible price.” A terrible price indeed: an arrogant and ill-advised decision to include a rootkit in its music CDs cost Sony BMG a lot of money - a...

Listen
Malicious Life
Roman Seleznev: Did the Punishment Fit the Crime? from 2023-12-12T19:04:03.794354

In 2019, Roman Seleznev, a 34 years-old Russian national, was sentenced to 27 years in prison: A sentence that’d make any criminal quiver. Seleznev's deeds had a horrendous effect on the 2.9...

Listen
Malicious Life
The Voynich Manuscript from 2023-12-12T19:04:03.790512

The constant battle between those who wish to encrypt data and those who wish to break these ciphers has made modern encryption schemes extremely powerful. Subsequently, the tools and meth...

Listen
Malicious Life
Why aren't there more bug bounty programs? from 2023-12-12T19:04:03.785033

On the face of it, there's an obvious economic incentive for both vendors and security researchers to collaborate on disclosing vulnerabilities safely and privately. Yet bug bounty pro...

Listen
Malicious Life
Is Generative AI Dangerous? from 2023-12-12T19:04:03.779364

Every so often, the entire landscape of cybersecurity shifts, all at once: The latest seismic shift in the field occurred just last year. So in this episode of Malicious Life we’re going to take...

Listen
Malicious Life
Can We Stop the AI Cyber Threat? from 2023-12-12T19:04:03.772383

Much of the cybersecurity software in use today utilizes AI, especially things like spam filters and network traffic monitors. But will all those tools be enough to stop the proliferation of mal...

Listen
Malicious Life
Operation Kudo from 2023-12-12T19:04:03.766465

In 1981, during the G7 Summit in Quebec, French president Francois Mitterand handen President Raegan a top secret collection of documents, called "Farewell Dossier." The information foun...

Listen
Malicious Life
Silent Firewalls: The Underrepresentation of Women in Cyber from 2023-12-12T19:04:03.761174

In the vast landscape of STEM, women constitute a mere 28% of the workforce. Yet, when we zoom into the realm of cybersecurity, the number dwindles even further to a startling 20 to 24 percent. ...

Listen
Malicious Life
Should You Pay Ransomware Attackers? A Game Theory Approach from 2023-12-12T19:04:03.755602

The FBI explicitly advises companies against paying ransomware attackers - but itself payed 4.4 million dollars worth of Bitcoin after the Colonial Pipeline attack. So, should you listen to what...

Listen
Malicious Life
Is NSO Evil? Part 1 from 2023-12-12T19:04:03.748550

NSO Group, creator of the infamous Pegasus spyware, is widely regarded as a vile, immoral company: a sort of 21st century soldier of fortune, a mercenary in the service of corrupt and evil...

Listen
Malicious Life
Is NSO Evil? Part 2 from 2023-12-12T19:04:03.743429

By the time Forbidden Stories published its “Pegasus Project” in 2021, NSO was already knee deep in what was probably the worst PR disaster ever suffered by a cybersecurity company - a Listen

Malicious Life
Volt Typhoon from 2023-12-12T19:04:03.737965

In August 2021, a port in Houston, Texas, was attacked. Over the following months, a series of attacks occurred in various locations, reminiscent of a serial killer's pattern. Targets includ...

Listen
Malicious Life
Moonlight Maze from 2023-12-12T19:04:03.732432

When investigators discovered in 1996 that US military networks were being extensively hacked, they didn't realize they were witnessing the birth of what would become Russia's form...

Listen
Malicious Life
Operation Sundevil and the Birth of the EFF from 2022-05-02T11:53:58

In May 1990, officials from several law enforcement agencies gathered in Phoenix, Arizona, to announce a nationwide crackdown on illegal computer activity. This massive operation, carried out by hu...

Listen
Malicious Life
MITRE Attack Flow [ML B-Side] from 2022-04-25T06:18:52

The MITRE Attack Flow Project is essentially a new way to visualize, analyze and share knowledge about sequences of adversary behavior. Ingrid Skoog, Ass. Director of R&D at the Center for Threat-I...

Listen
Malicious Life
The Aaron Swartz Story from 2022-04-19T13:54:28

When 24-year-old Aaron Swartz was caught scraping millions of science articles off of JSTOR, he faced up to 35 years in prison plus a fine of up to 1 million dollars. Did Aaron's crime justify such...

Listen
Malicious Life
The Russia-Ukraine Cyberwar [ML B-Side] from 2022-04-11T11:30:20

Before it invaded Ukraine, Russia was considered - and rightfully so - a cyber superpower. But a month and a half into the war, the lights in Ukraine are still on, as well as cellular communication...

Listen
Malicious Life
Chris Roberts: Hackers on a Plane from 2022-04-05T12:53:31

When Chris Roberts landed at Syracuse, NY - two FBI agents were waiting to escort him off the airplane. Apparently, this wasn't the first time that the Gray Hat hacker was suspected of hacking into...

Listen
Malicious Life
DIE–A New Paradigm for Cybersecurity [ML B-Side] from 2022-03-28T12:47:16

It’s not every day that we have a guest who’s suggesting a new paradigm for cybersecurity. Sounil Yu, CISO and Head of Research at JupiterOne, talks about a new framework for designing secure syste...

Listen
Malicious Life
Cyber PTSD from 2022-03-22T13:23

We usually count the damage from a cyberattack in Dollars and Euros, but the psychological damage to the victims is rarely discussed, if at all. So, what is the psychological and emotional toll fro...

Listen
Malicious Life
How Resilient Is Our Banking System? [ML B-Side] from 2022-03-16T13:08:39

What is the most critical of all critical infrastructure? Is it Electricity? Water Supply? According to Jeff Engles, CEO of Conquest Cyber, it's our Banking and Finance systems. Jeff spoke with Nat...

Listen
Malicious Life
Crypto AG, Part 3: The Truth Is Revealed from 2022-03-08T11:35:18

By the 1970s, Crypto AG was a large and thriving company, employing over 400 people. This final episode of the series is going to explore how a spying operation affecting over 100 countries, for 70...

Listen
Malicious Life
Quantum Cyber Security [ML B-Side] from 2022-02-28T13:43:20

Quantum Computing is a fascinating and revolutionary technology that has been gaining significant ground in the past decade, with researchers from both academia and the commercial sector - such as ...

Listen
Malicious Life
Crypto AG, Part 2: The Death of Bo Jr. from 2022-02-21T14:20:53

How did Boris Hagelin succeed in selling compromised cipher machines to half the world, for more than 50 years? Some have speculated that it was some kind of backdoor. But, no - it was more clever ...

Listen
Malicious Life
Why Do APTs Use Ransomware? [ML B-Side] from 2022-02-14T15:49:50

Assaf Dahan, Head of Threat Research with the Cybereason Nocturnus Team, discusses new discoveries about Iranian APTs Moses Staff and Phosphorus that blur the line between state-sponsored attacks a...

Listen
Malicious Life
Crypto AG–The Greatest Espionage Operation Ever, Part 1 from 2022-02-07T13:34:35

General McArthur, Egpyt's Anwar Sadat, and Iran's Ayatollah Khomeini: These are just a few of the dozens, likely hundreds of targets of arguably the biggest, most ambitious hacking operation ever. ...

Listen
Malicious Life
Why aren’t SMBs investing in Cyber Security? [ML B-Side] from 2022-01-31T14:23:36

Attacks against Small-to-Medium size businesses currently represent roughly 40% to 50% of all data breaches. Josh Ablett, founder and CISO of Adelia Risk, speaks with Nate Nelsn about the kind of s...

Listen
Malicious Life
The Bloody Origins of Israel’s Cyber Security Industry from 2022-01-25T14:11:01

Israel is a small country - yet its cyber security industry is exceptionally successful. In this episode, we go back to the Yom Kippur War of 1973, to discover how a national trauma and an Intellig...

Listen
Malicious Life
Hacker Highschool: Pete Herzog [ML BSide] from 2022-01-17T15:18:29

Pete Hertzog is a security expert and an educator with a vision: he wants our kids to learn about cybersecurity, and not just about not talking to strangers online - he wants them to learn even mor...

Listen
Malicious Life
The Mystery of Cicada 3301 from 2022-01-10T14:27:32

"Hello. We are looking for highly intelligent individuals. To find them, we have devised a test."These words, found in a message posted on 4Chan in January 2012, started a global'treasure hunt'- wi...

Listen
Malicious Life
How the Internet Changed the NSA [ML BSide] from 2022-01-03T17:14:42

In the late ’80s to early 2000s, the NSA transitioned from being a hardware-first organization - that is, creating and operating physical spying devices - to software-first: excelling in hacking ne...

Listen
Malicious Life
Does Code === Free Speech? from 2021-12-27T14:19:01

When the FBI asked Apple, following the 2015 mass shooting in San Bernardino, to write code that would give the FBI access to a suspect's iPhone - Apple refused, arguing that forcing it to write co...

Listen
Malicious Life
A digital‘vaccine’for Log4Shell [ML BSide] from 2021-12-20T13:14:26

A digital'vaccine'was released to address Log4Shell, which has been called'the single biggest, most critical vulnerability ever.'Nate Nelson talks to Yonatan Striem-Amit, CTO&Co-Founder of Cybereas...

Listen
Malicious Life
Shawn Carpenter: A Cyber Vigilante from 2021-12-14T15:31:55

In 2003, Shawn Carpenter - an employee of Sandia National Laboratory - was at a crossroads: should he ignore a Chinese attack against U.S. targets, as his superiors ordered him to do - or do what h...

Listen
Malicious Life
“Ransomware Attackers Don’t Take Holidays”[ML BSide] from 2021-12-06T14:07:43

Last month, in November of 2021, Cybereason - our show’s sponsor - released a special report titled: “Organizations at Risk: Ransomware Attackers Don’t Take Holidays”, focusing on the threat of ran...

Listen
Malicious Life
Tay: A Teenage Bot Gone Rogue from 2021-11-30T16:51:34

In March, 2016, Microsoft had something exciting to tell the world: the tech giant unveiled an AI chatbot with the personality of a teenager. Microsoft Tay - as it was nicknamed - could tweet, answ...

Listen
Malicious Life
Tay: A Teenage Bot Gone Rogue from 2021-11-30T16:51:34

In March, 2016, Microsoft had something exciting to tell the world: the tech giant unveiled an AI chatbot with the personality of a teenager. Microsoft Tay - as it was nicknamed - could tweet, answ...

Listen
Malicious Life
Wild West Hackin’Fest [ML BSide] from 2021-11-23T01:57:48

The Wild West Hackin’ Fest is a unique security conference. Not only because it's held in South Dakota and not only because of the Wild West visual vibe - but also because of the emphasis it puts o...

Listen
Malicious Life
Operation Flyhook, Part 2 from 2021-11-15T15:00:11

To capture Alexey Ivanov and his business partner and bring them to justice, the FBI created an elaborate ruse: a fake company named'Invita', complete with a fake website and a fake office building...

Listen
Malicious Life
IP Hijacking [ML BSide] from 2021-11-09T14:30:26

by China Telecom and routed through China. In 2017, traffic from Sweden and Norway to a large American news organization in Japan was hijacked - also to China - for about 6 weeks. What is IP Hijac...

Listen
Malicious Life
Operation Flyhook, Part 1 from 2021-11-01T15:02:41

Alexey Ivanov was exactly the kind of person to benefit from the early-2000's dot-com boom: He was bright, talented, and knew his stuff. His only problem was the fact that he was born in Chelyabins...

Listen
Malicious Life
In Defense Of The NSA [ML B-Side] from 2021-10-26T08:50:56

The NSA is one of the world's most formidable and powerful intelligence agencies. Some people fear that the National Security Agency’s advanced capabilities would one day be directed inwards, inste...

Listen
Malicious Life
Marcus Hutchins: A Controversial Hero from 2021-10-18T14:31:40

In May 2017, Marcus Hutchins - AKA MalwareTech - became a hero for stopping WannaCry, a particularly nasty ransomware that spread quickly all over the world. Yet his fame also brought to light his ...

Listen
Malicious Life
Operation GhostShell [ML B-Side] from 2021-10-11T07:42:01

In July, 2021, Nocturnus - Cybereason’s Threat Research and Intelligence team - was called to investigate an espionage campaign targeting Aerospace and Telecommunications companies, mainly in the M...

Listen
Malicious Life
Smart TVs: A New Battlefield from 2021-10-04T13:45:53

Smart Homes are slowly but surely becoming a part of our everyday lives, and so far it seems that Smart TVs - equipped with microphones, cameras, and an internet connection - are the weakest link. ...

Listen
Malicious Life
The MITRE ATT&CK Framework [ML B-Side] from 2021-09-27T07:10:25

In some ways, cyber security is like Art - and that’s not a good thing… MITRE’s ATT&CK framework tries to make sense of the collective knowledge of the security community, and share that knowledge ...

Listen
Malicious Life
Should The U.S. Ban Chinese and Russian Technology? from 2021-09-20T09:10:35

Every year, seemingly, there’s a new story of some software - like'Tik Tok'or'FaceApp'- from a hostile country that may or may not be a security threat to us in the west. So what should be done in ...

Listen
Malicious Life
Jack Rhysider, Darknet Diaries [ML B-Side] from 2021-09-13T13:32:33

Darknet Diaries, Jack Rhysider's show, is the most popular cyber security podcast - and one of the most successful tech podcasts in the US in general. Eliad Kimhy spoke with Jack about the origins ...

Listen
Malicious Life
The Tesla Hack from 2021-09-06T13:17:25

It's every company's nightmare: a mysterious stranger approached an employee of Tesla's Gigafactory in Nevada, and offered him 1 million dollars to do a very simple job - insert a malware-laden USB...

Listen
Malicious Life
Understanding China [ML B-Side] from 2021-08-30T13:05:55

Lt. Colonel (Ret.) Bill Hagestad talks to Nate Nelson about how China's culture and troubled history of western colonializationinfluence its goverment views and actions regarding the global interne...

Listen
Malicious Life
John McAfee from 2021-08-23T15:15:03

What do you get when you take a hypersexual, drug enthusiast gun-toting paranoid - and add some serious amounts of money to the mix? You get a life so bizarre, so unbelievably extreme, that people ...

Listen
Malicious Life
RSA Breach FollowUp: Are We Doing Security Right? [ML B-Side] from 2021-08-16T13:13:05

Nate Nelson talks to Art Coviello, Former CEO of RSA Security, and Malcolm Harkins, Vice President&Chief Security Officer at Intel, about the current cyber security landscape - 10 years after the R...

Listen
Malicious Life
DeadRinger [ML B-Side] from 2021-08-10T13:55:04

Nate Nelson talks to Assaf Dahan, Sr. Director and Head of Threat Research at Cybereason’s Nocturnus team about a recent attack they uncovered, on multiple major Telecommunication companies.

Listen
Malicious Life
The Jester from 2021-08-03T14:16:32

The Jester is a patriotic, pro-American Hacktivist that since 2010 has waged a personal cyberwar against an array of targets he considers to be “the bad guys.” But detractors have insinuated that s...

Listen
Malicious Life
The State of Credit Card Security [ML B-Side] from 2021-07-26T09:33:12

In 2005, when Albert Gonzalez was hacking his way into the networks of many retail chains in the US, credit cards were still very insecure: magnetic stripes and signed receipts did little to stop s...

Listen
Malicious Life
Albert Gonzalez, Part 3 from 2021-07-20T08:08:35

In early 2007, a Secret Service agent operating out of San Diego takes a flight halfway across the world. He’s going to meet with Europe’s most prolific stolen card salesman. It is this meeting tha...

Listen
Malicious Life
DerbyCon–Dave Kennedy [ML B-Side] from 2021-07-13T13:09:22

DerbyCon was all about making the community - a family. Dave Kennedy, one of the founders of DerbyCon, talks about the unique vibe of the conference, his fear of clowns, and why he'll never - NEVE...

Listen
Malicious Life
Albert Gonzalez, Part 2 from 2021-07-07T07:04:42

Working with the Secret Service, Albert Gonzalez was outstanding. He was such a good employee, in fact, that they had him do seminars, and speak at government conferences. At one point he met perso...

Listen
Malicious Life
Jeff Moss: DEF CON [ML B-Side] from 2021-06-28T10:52:14

Jeff Moss, founder of the DEF CON Hacker convention (and also the BlackHat convention), talks to Eliad about the origins of DEF CON, its"interesting"relationship with law enforcement agencies, and ...

Listen
Malicious Life
Albert Gonzalez, Part 1 from 2021-06-21T08:23:38

It was as a teenager that Albert Gonzalez--one of the few greatest cybercriminals in history--developed the obsession that would go on to ruin his life. Gonzalez and some of his friends would go o...

Listen
Malicious Life
The History of THOTCON Hacking Conference [Malicious B-Side] from 2021-06-15T07:55:05

THOTCON is not your ordinary, run-of-the-mill security conference - and it's even obvious from the moment you browse their website. How did a local, small-scale event in Chicago, grow to become a m...

Listen
Malicious Life
The History of THOTCON Hacking Conference [Malicious B-Side] from 2021-06-15T07:55:05

THOTCON is not your ordinary, run-of-the-mill security conference - and it's even obvious from the moment you browse their website. How did a local, small-scale event in Chicago, grow to become a m...

Listen
Malicious Life
China’s Unrestricted Warfare, Part 3 from 2021-06-08T08:27:38

For more than a decade, China orchestrated a sophisticated espionage campaign against Nortel Networks, using Huawei, Chinese civilians working in Canada, and even organized crime gangs to steal imp...

Listen
Malicious Life
Colonial Pipeline&DarkSide: Assaf Dahan [B-Side] from 2021-06-01T13:57:01

On Friday, May 7th, 2021, Colonial Pipeline suffered a cyberattack that forced the company to shut down its operations. As a result, gasoline outages were reported in many East Coast states. The e...

Listen
Malicious Life
RSA Breach, Part 2 from 2021-05-24T13:31:19

In the wake of RSA's disclosure of the breach, the company cyber analysts chose not to boot the attackers of their network - but followed their activities closely, trying to figure out their identi...

Listen
Malicious Life
RSA Breach: The Untold Story, Part 1 from 2021-05-20T11:07:01

In the early 2000s, Nortel was consciously, intentionally, aggressively positioning itself as a partner and a friend of China. At the same time, it was China's number one target for corporate espio...

Listen
Malicious Life
China’s Unrestricted Warfare, Part 2 from 2021-05-11T11:29

In the early 2000s, Nortel was consciously, intentionally, aggressively positioning itself as a partner and a friend of China. At the same time, it was China's number one target for corporate espio...

Listen
Malicious Life
The History of Security BSides Conferences with Jack Daniel [ML B-Side] from 2021-05-04T10:07:52

Security BSides - or just'BSides', for short'- is the first grassroots, DIY, open security conference in the world - with more than 650 events in more than 50 countries. Jack Daniel, one of BSides'...

Listen
Malicious Life
The History of Security BSides Conferences with Jack Daniel [ML B-Side] from 2021-05-04T10:07:52

Security BSides - or just 'BSides', for short' - is the first grassroots, DIY, open security conference in the world - with more than 650 events in more than 50 countries. Jack Daniel, one of BSide...

Listen
Malicious Life
China’s Unrestricted Warfare, Part 1 from 2021-04-27T09:53:43

Back in the 1990s, Cyberwarfare was a word rarely used in the West - and definitely unheard of in China, which was just taking it's first steps in the Internet. Two Chinese military officers, veter...

Listen
Malicious Life
Can Nuclear Power Plants Be Hacked? from 2021-04-19T12:38

Andrew Ginter, VP of Industrial Security at Waterfall Security Solutions, speaks to Sr. Producer Nate Nelson about the cybersecurity of Nuclear facilities. How protected are modern nuclear power pl...

Listen
Malicious Life
Shutting Down The Internet in 30 Minutes: Chris Wysopal [ML B-Side] from 2021-04-12T07:46:29

Chris Wysopal, a cyber security pionneer and one of L0pht's founding members, talks about the group's 1998 testimony in the Senate, how they used shaming to force cooporations to fix their software...

Listen
Malicious Life
‘L0pht’, Part 2–The End from 2021-04-05T13:32:37

In the early days, the L0pht guys tinkered with what they already had laying around, or could find dumpster diving. But things change, of course. By the end of the ‘90s many of the L0pht hackers ha...

Listen
Malicious Life
The Story of‘L0pht’, Part 1 from 2021-03-30T09:40:55

'L0pht', or'L0pht Heavy Indutries', was one of the most infuencial hacker collectives of the 90's: it's members were even invited to testify infront of the Congress on the current state of Internet...

Listen
Malicious Life
The MS Exchange Hack [ML B-Side] from 2021-03-22T07:29:51

Israel Barack, Cybereason's CISO and an expert on cyber-warfare, on the recent MS Exchange hack that hit thousands of organizations worldwide: what happened, what were the vulenrabilites expolited...

Listen
Malicious Life
NotPetya, Part 2 from 2021-03-15T16:52:35

When the NotPetya pandemic hit, CyberAnalyst Amit Serper was sitting in his parents'living room, getting ready to go out with a few friends. He didn't have most of his tools with him, but he noneth...

Listen
Malicious Life
NotPetya, Part 1 from 2021-03-01T08:11:27

On June 28th, 2017, millions of Ukranians were celebrating'Constitution Day.'Their national holiday turned into a nightmare, as tens of thousands of computers all over the country were infected by...

Listen
Malicious Life
Facial Recognition in Law Enforcement, Pt. 2 from 2021-02-16T09:00:29

It seems likely that legislation alone won't be able to regulate the widespread use of facial recognition. Andrew Maximov, who uses AI to fight Belarus's dictatorship, shows us another way facical ...

Listen
Malicious Life
Should Law Enforcement Use Facial Recognition? Pt. 1 from 2021-02-03T12:31:41

There are plenty of reasons why Police should use AI for facial recognition: after all, Humans are notoriously bad eye witnesses. However, placing AI in the hands of law enforcement does have its d...

Listen
Malicious Life
Clearview AI from 2021-01-21T13:50:46

Clearview AI scrapes billions of images off social media and the open web, applies facial recognition algorithms on them - and sells that data to law enforcement agencies all over the world. But wh...

Listen
Malicious Life
Breaking Into Secure Buildings from 2021-01-07T12:37:22

FC, aka'Freaky Clown', is an expert in"Physical assessments"- otherwise known as breaking into ultra-secure office buildings. FC shares some of his (incredible) adventures, as well as some tips and...

Listen
Malicious Life
Special: The SolarWinds Hack from 2020-12-28T14:05:05

Ran talks to Israel Barak, Cybereason's CISO and a Cyber-defense and Warfare expert, about the recent SolarWinds hack that impacted upto 18,000(!) enterprise organizations in the US. What is a Supp...

Listen
Malicious Life
100th Episode Special from 2020-12-21T13:14:08

For our 100th episode, we bring you three stories that tie in to previous episodes of the show: Shadow Inc. (Election Hacking), J&K (Max Headroom) and T-Shirt-Gate (Yahoo's Ugly Death). Enjoy :-)

Listen
Malicious Life
Jan Sloot’s Incredible Data Compression System from 2020-12-07T10:01:31

In the mid-90's, a Dutch TV repairman claimed he invented a revolutionary data compression technology that could compress a full-length movie into just 8KB.

Listen
Malicious Life
Op. GUNMAN&The World’s First Keylogger from 2020-11-22T09:51:35

In 1983, the US got word that an ally's embassy - probably France's - was bugged by the Soviets. This reports triggered Operation GUNMAN: a complete removal&de-bugging of *all* electronic devices i...

Listen
Malicious Life
Election Hacking, Part 2 from 2020-11-03T04:42:33

Georgia's elections infrastructure had been hacked multiple times since 2014 - both by Russian Intelligence and local White Hat hackers. The upcoming elections are plagued with uncertainty - and un...

Listen
Malicious Life
Election Hacking, Part 1 from 2020-10-22T17:21:04

Today we’re talking about just one state. One which, depending on which way it leans, might bring the entire electoral college with it. One which, as of this writing, is absolutely, positively, nec...

Listen
Malicious Life
MDR Vs. The TrickBot Gang from 2020-10-12T14:21:03

About a year ago, Cybereason's Managed Detection and Response team (aka MDR) stumbled upon a attack involving Russian cybercriminals, POS devices and an entire new family of previously undiscovered...

Listen
Malicious Life
Yahoo’s Ugly Death, Part 2 from 2020-09-25T06:47:27

Between 2010 and 2014, Yahoo was hacked numerous times - each time setting a new'world record'for the largest data breach in history. It also hid those breaches from it's investors, customers and t...

Listen
Malicious Life
Yahoo’s Ugly Death, Part 1 from 2020-09-11T07:20:44

When Marissa Mayer joined Yahoo as CEO, the company's stock rose 2% the day of the announcement. But the new CEO was basically initiated into her job by a major data breath - and the worst was yet ...

Listen
Malicious Life
The Great Firewall of China, Pt. 2: Cisco’s Trial from 2020-08-27T12:47:10

Falun Gong is a religious movement heavily persecuted in China. In 2017, members of the movement sued Cisco Systems for aiding and abetting the Chinese government in this persecution - since Cisco ...

Listen
Malicious Life
The Great Firewall of China–Part 1 from 2020-08-14T08:03:24

The Great Firewall is just mind-bogglingly big, repressing freedom of speech and information for over 800 million Chinese internet users every year. The Great Firewall is so big that it’s worth ask...

Listen
Malicious Life
Multi-Stage Ransomware (Live!) from 2020-08-02T13:32:48

Ran&Israel Barak, Cybereason's CISO, discuss the latest development in ransomware evolution: multi-stage attacks in which the attackers infiltrate the target network, steal data and gather intellig...

Listen
Malicious Life
Protecting The“Panama Papers”Whistleblower from 2020-07-16T10:30:19

In 2015 Bastian Obermayer, an investigative journalist for the Süddeutsche Zeitung, received a message every journalist dreams of: the biggest leak in journalism history. But dealing with the massi...

Listen
Malicious Life
From Ransomware To Blackmail, With Assaf Dahan from 2020-07-07T13:08:19

Hackers keep modifying and improving their methods of operations. Assaf Dahan, Sr. Director and Head of Threat Research at Cybereason, tells us about the recent shift to Blackmail - as a way to pre...

Listen
Malicious Life
SegWit2x, Part 3 from 2020-07-03T06:02

On August 1st, 2017, Bitcoin forked. But it wasn't the SegWit2x fork everyone was talking about - It was a different fork, supported by a coalition of miners who, in doing what they were doing, wer...

Listen
Malicious Life
SegWit2x, Part 2 from 2020-06-19T04:21:55

SegWit2x was proposed as a solution to Bitcoin's network problems - but some people in the anti-2x movement claimed that it is nothing less than a cyber-attack: a 51% attack on Bitcoin, to be preci...

Listen
Malicious Life
Hacking Fortnite Accounts (CPRadio) from 2020-06-11T11:31:33

A black market economy has developed around Fortnite's in-game currency. Cyber criminals are hacking user accounts, juicing credit cards, and selling virtual currency for real-life dollars and cent...

Listen
Malicious Life
SegWit2x, or–The Year Bitcoiners Will Never Forget, Part 1 from 2020-06-04T09:09:20

In 2017, Bitcoin was winning. Money, attention, success poured out of every seam. It appeared that a golden age had dawned. But just under the surface, the network was teetering on the verge of col...

Listen
Malicious Life
No Honor Among Thieves from 2020-05-22T05:13:05

Amit Serper was doing a routine inspection on a client's network, when he came across a suspicious-looking pen-testing tool, exhibiting RAT-like behavior. We'll follow Amit's investigation, and in ...

Listen
Malicious Life
Cybersecurity during a crisis: how remote work has impacted security–With Sam Curry from 2020-05-14T12:59:44

The COVID19 pandemic forced organizations to transition to a work-from-home model - and many of them were unprepared for such a radical departure from the ‘normal’ security perimeter. Sam Curry, Cy...

Listen
Malicious Life
The Problem With Passwords from 2020-05-08T05:13:36

At the end of our last episode, it kind of seemed like Huawei--the Chinese telecommunications company accused of aiding in state cyberspying--was completely innocent. They were being accused of cri...

Listen
Malicious Life
The Huawei Ban, Part 2 from 2020-04-23T12:05:12

At the end of our last episode, it kind of seemed like Huawei--the Chinese telecommunications company accused of aiding in state cyberspying--was completely innocent. They were being accused of cri...

Listen
Malicious Life
The Huawei Ban, Part 1 from 2020-04-09T08:32:02

Over the past 20 years, western governments have accused Huawei of everything from IP theft to financial fraud to cyber spying. Often, these claims are made either with no evidence, or only circums...

Listen
Malicious Life
The Max Headroom Signal Hijack from 2020-03-24T08:19:26

On November 22nd, 1987, a hacker took over the signals of two Chicago-area TV stations and broadcast two bizarre and somewhat vulgar messages. In this episode we explore this notorious hack, and it...

Listen
Malicious Life
ToTok, Part 3: Becoming a Spyware Superpower from 2020-03-15T10:18:19

The fact that ToTok came out of the United Arab Emirates is no surprise: in recent years, the UAE has deployed some of the most sophisticated mobile device exploits ever seen. But they got a lot of...

Listen
Malicious Life
ToTok, Part 2: The Masterminds of Mobile Malware from 2020-03-10T08:53:29

The corporate structure supporting ToTok involved at least half a dozen real companies, shell companies and intelligence groups, with the individuals who actually operated the app being hidden behi...

Listen
Malicious Life
ToTok, Part 1: How to Convince Someone to Download Spyware from 2020-03-05T08:49:42

Only a few months after its release, ToTok - an ordinary messaging app, with no exceptional features - had over five million downloads, and held the number 4 position in Apple's App Store global c...

Listen
Malicious Life
How To Defend A Bank, Part 2: Right Of Bang from 2020-02-27T09:33:08

As much as we can imagine what it’s like to be a defender in a cyber-conflict, we don’t really know what it is - unless we’re in the shoes the time of it happening. That's what simulations are for.

Listen
Malicious Life
How To Defend A Bank, Part 1: Fusion Centers from 2020-02-13T09:08:45

Banks&other financial institutions face a variety of security threats: from state-sponsored cyber-attacks, to smaller acts of fraud, to thousands of random malware attacks from the web. To survive ...

Listen
Malicious Life
Triton, Part 2: The World’s Most Dangerous Malware from 2020-01-30T07:31:38

Petro Rabigh were facing lots of problems in defending their systems. But they did get lucky in one sense: their hackers were unprepared when their plan went awry. Who were the hackers that infiltr...

Listen
Malicious Life
Triton: A Malware Designed To Kill Humans, Part 1 from 2020-01-16T11:50:18

Industrial Security requires a different skill set--really, an entirely different mindset than working in IT does. In this episode we dive into the story of one of the most dangerous malware ever t...

Listen
Malicious Life
Deep Fakes, Part 2: Man Vs. Machine from 2020-01-02T09:07:55

Deep Fakes are set to revolutionize content creation, but alongside this technology's benefits, it also has the potential two sow havoc, fear, and distrust via Social Networks. Just this week, Face...

Listen
Malicious Life
GAN and Deep Fakes, Part 1 from 2019-12-19T15:33:37

Over the past two years, the internet has been inundated with celebrity Deep Fake videos of all kinds: Obama, Putin, and Trump deliver speeches they never gave, Gal Gadot"stars” in a porn video, an...

Listen
Malicious Life
Sam Curry: The 2020 Crystal Ball from 2019-12-10T15:17:17

Sam Curry is Cybereason's Chief Security Officer and an award-winning cyber security visionary. Sam&Ran discuss Sam's upcoming webinar, in which he will present his insights into what 2020 will bri...

Listen
Malicious Life
Human Side Channels from 2019-12-05T15:44:01

Even the best hackers are human, and humans are inescapably unique. Forensic Linguistics, Behavioral Signatures and Cultural Captchas can help defenders identify and (maybe) catch even the best of ...

Listen
Malicious Life
What’s the problem with Cyber Insurance? from 2019-11-21T12:12:23

Thousands of companies are losing millions of dollars to cyber attacks. An insurance seems an ideal solution to their woes - yet this kind of insurance is much less common today, than it should be....

Listen
Malicious Life
Gozi B-Side: Amit Serper&Sam Curry from 2019-11-19T08:20:56

Nate Nelson speaks with Amit Serper&Sam Curry, notable veteran in Cyber Security, about Malware-As-A-Service, bullet-proof hosting, avoiding the lure of the'dark side'and more.

Listen
Malicious Life
Gozi, Part 2 from 2019-11-14T15:07:09

In 2010, Nikita Kuzmin returned to the malware scene with Gozi 2.0, an improved version of the successful banking Trojan. How did Gozi 2.0 fair against Zeus&the new generation of Trojans, and what ...

Listen
Malicious Life
B-Side: Lodrina Cherne On Stalkerware from 2019-11-08T08:06:36

In this out-of-band episode, we're bringing you the full interview with Lodrina Cherne, a Digital Forensics Expert, on Spyware : what is it, how it works, who sells it, and how you can avoid it you...

Listen
Malicious Life
Gozi, Part 1: The Rise of Malware-as-a-Service from 2019-10-31T09:19:08

Nikita Kuzmin could have been a whiz programmer or a CEO of a successful startup. But as a teen in Moscow, he fell in with the wrong crowd, and his entrepreneurial skills found a different path: Go...

Listen
Malicious Life
How is Spyware Legal? from 2019-10-17T07:53:44

Today's Cyber Stalkers have free access to almost government-grade spyware software with which they can terrorize their victims. Who's enabling the commercial spyware market?

Listen
Malicious Life
Listeners Survey Special from 2019-10-10T10:24:16

Ran and Eliad Kimhi, one of the show's top producers, discuss the recent Listener's Survey results: what do like and dislike about the show, ideas you gave us for future improvements - and what do ...

Listen
Malicious Life
Operation Aurora, Part 2 from 2019-09-26T14:01:43

Google, it turned out, was only one of 35 major US corporations hit in Aurora. Was is an espionage campaign, or could it be that it all began with one top ranking Chinese official who googled his o...

Listen
Malicious Life
Operation Aurora, Part 1 from 2019-09-12T07:23

In January 2010, Google revealed in its blog that it was hacked. This attack, since known as Operation Aurora, is attributed to China. In this series of episodes, we'll expose the complicated and o...

Listen
Malicious Life
Responding to a Cyber Attack with Missiles from 2019-08-29T07:54:45

Is the use of deadly force a legitimate – and practical – response to cyber attacks? what lessons did Israel learn from the Yom Kippur War of 1973 about the best way to manage it’s offensive cyber ...

Listen
Malicious Life
Are Ad Blockers Malicious? from 2019-08-15T06:04:43

Ad Blockers, such as AdBlock Plus, provide an important service to users who find web ads annoying, creepy and sometimes even dangerous. In recent years, how ever, the business models adopted by so...

Listen
Malicious Life
Conficker from 2019-07-18T07:21:24

Can a malware be *too* successful? This is the story of Conficker, one of the most advanced worms in history - and how its success led to its ultimate failure.

Listen
Malicious Life
Operation SoftCell from 2019-07-04T10:07:51

A rare, inside look, at how Cybereason's researchers were able to uncover one of the largest Cyber Espionage campaigns ever discovered, against multiple Telecommunications companies around the world.

Listen
Malicious Life
‘Pa Bell’Vs. Youth International Party Line from 2019-06-13T17:21:03

The YIPL phreaking magazine was the spiritual predecessor to the better-known'2600'zine, and it was founded by a ideological party determined to bring down the largest monopoly in US history: Bell ...

Listen
Malicious Life
The U.S vs. Gary McKinnon from 2019-05-27T10:06:44

After the Challenger Disaster of 1986, NASA had a hard time convincing the public that the Galileo spacecraft, fueled by radioactive Plutonium, is safe to launch. The WANK worm, it turns out, was a...

Listen
Malicious Life
The WANK Worm, Part 2 from 2019-05-10T06:03:26

After the Challenger Disaster of 1986, NASA had a hard time convincing the public that the Galileo spacecraft, fueled by radioactive Plutonium, is safe to launch. The WANK worm, it turns out, was a...

Listen
Malicious Life
The WANK Worm, Part 1 from 2019-04-25T06:45:53

On October 16th, 1989, NASA's scientists went into work preparing to launch a spacecraft that very day. But when they sat down to their computers, they were met with an unexpected greeting: “Your ...

Listen
Malicious Life
The Equifax Data Breach Pt. II: The Bits Hit The Fan from 2019-04-11T08:58:39

After its momentous breach, Equifax's CEO Richard Smith said: “Equifax will not be defined by this incident, but rather by how we respond.”Well, he was spot on, but not in a good way.

Listen
Malicious Life
The Equifax Data Breach Pt. I: A Big Data Bubble from 2019-03-27T07:22:37

In their 120 year history, Equifax never sold anything, or provided any service to ordinary folks - except collect DATA. In 2017, that huge data repository, a 1000 times larger then the Library of ...

Listen
Malicious Life
DeCSS: Hackers Vs Hollywood from 2019-03-13T11:05:09

Twenty years ago, a 15-years old Norwegian kid was put on trial for breaking the DVD Copy Prevention system. His case spawned a whole new"artistic"movement...

Listen
Malicious Life
Marconi&The Maskelyne Affair from 2019-02-21T14:30:30

Guglielmo Marconi--the beloved, hated, disputed inventor of radio--gets trolled by a mustached magician in the world’s first ever, wireless, grey hat hack.

Listen
Malicious Life
The Fall Of Mt. Gox–Part 2 from 2019-02-06T15:36:24

In its prime, Mt. Gox was essentially the place where Bitcoin happened. But for two years, Mt. Gox was imploding from the inside - while soaring to unprecedented success on the outside. 

Listen
Malicious Life
The Fall Of Mt. Gox–Part 1 from 2019-01-22T10:50:34

In its prime, Mt. Gox was essentially the place where Bitcoin happened. But for two years, Mt. Gox was imploding from the inside - while soaring to unprecedented success on the outside. 

Listen
Malicious Life
Dave Kennedy: The Psychological Principles of Social Engineering from 2018-12-25T08:48:46

Today on Malicious Life, tens of thousands of people get robbed.  Then a community gets together to ask: should we take our money back, or let the hacker walk with it?

Listen
Malicious Life
The Ethereum DAO Hack from 2018-12-13T12:12:06

Today on Malicious Life, tens of thousands of people get robbed.  Then a community gets together to ask: should we take our money back, or let the hacker walk with it?

Listen
Malicious Life
The Jerusalem Virus, Part 2 from 2018-11-26T11:14:17

How did the Jerusalem virus trigger the birth of the entire Anti Virus industry in Israel? A high-stakes wager on Live TV, and more.

Listen
Malicious Life
The Jerusalem Virus, Part 1 from 2018-11-15T08:40:33

Although scary, the Jerusalem virus, discovered in Israel in 1987, was in fact a rather simple virus. How, then, did the virus trigger the birth of an entire national industry?

Listen
Malicious Life
Gene Spafford on the Morris Worm&Cyber-security in the 1980’s from 2018-10-31T13:19:52

Eugene Spafford (aka Spaf), a professor of computer science at Purdue University, was the first researcher to publish a detailed analysis of the infamous Morris Worm. Gene talks to Ran about this i...

Listen
Malicious Life
China Vs. Github from 2018-10-16T14:15:30

It’s a weapon that harnessed the strength of millions of computers at once: a cannon so powerful it could break through any wall, take down any website. It is “the Great Cannon”.

Listen
Malicious Life
The Ashley Madison Hack, Part 2 from 2018-10-04T13:54:24

On the second installment of our Ashely Madison hack retelling, we look at the fallout of one of the hack, and the people who’ve suffered from it.

Listen
Malicious Life
The Ashley Madison Hack, Part 1 from 2018-09-19T04:46:38

When Ashley Madison got hacked, it made international headlines. Why? Because it wasn’t just a major event. It demonstrated how there’s information even more sensitive, even more significant than y...

Listen
Malicious Life
Interview Special: Graham Cluley from 2018-09-05T14:52:37

As we prepare to release an awesome 2-part story in two weeks, we decided to give you a chance to go back to some old favorites and check out some of the behind-the-scenes interviews of Malicious L...

Listen
Malicious Life
The Target Hack from 2018-08-23T06:49:57

If movies have taught me anything, it’s that if you want to rob a bank, you dress as the cleaning crew. The people behind the Target hack must have seen one action film too many, because when they ...

Listen
Malicious Life
WoW: Corrupted Blood from 2018-07-25T06:17:47

How does the outbreak of a “plague” inside a video game- a bug, essentially- affect real-life disease research?

Listen
Malicious Life
The Stuxnet Virus Pt. 3 from 2018-07-12T16:41:19

Stuxnet was a devastating weapon, but who wielded it? That is the question we try to answer with the final installment of our Stuxnet series. In this episode, we explore other, similar battles of t...

Listen
Malicious Life
The Stuxnet Virus Pt. 2 from 2018-07-12T15:39:43

Stuxnet was a weapon, a kind of a smart bomb- perhaps one of the smartest bombs ever created. A bomb that couldn’t rely on operators, cameras, and laser targeting, instead it had to “think” its way...

Listen
Malicious Life
The Stuxnet Virus Pt. 1 from 2018-07-12T14:38:13

Where armies once fought with bullets and bombs, they now engage in clandestine, invisible warfare. In 2010 a virus was discovered that would change the world’s perception of cyber warfare forever....

Listen
Malicious Life
Shamoon–The Biggest Hack In History from 2018-06-29T08:34:10

The Shammon Virus. There is a single company, run by a royal family, which employs the majority of the Saudi working population. It’s worth more than Apple, Google, and Amazon…by a lot. The Saudi A...

Listen
Malicious Life
The Melissa Virus from 2018-06-14T08:29:07

Not all malware is created equal. Some malware will attempt to erase your files, demand ransom, or steal your information. Others will do no such thing- and still end up being worse. Don’t believe ...

Listen
Malicious Life
GhostNet from 2018-05-30T06:51:18

A young woman is arrested by the Chinese government while trying to cross the border to Tibet. Her interrogator, a Chinese spy, pulls out a dossier full of information regarding her activity online...

Listen
Malicious Life
The Morris Worm Pt. 2 from 2018-05-16T06:07:57

In an attempt to halt the Morris worm’s path of destruction, a systems administrator at Harvard shut down the university router through which Andy Sudduth’s message would be sent to the internet.  ...

Listen
Malicious Life
The Morris Worm Pt. 1 from 2018-05-02T11:40:16

We’ve introduced you to some of the seminal malware attacks that have shaped cybersecurity history. Perhaps no other incident in history, though, has had the effect on how we think about computer s...

Listen
Malicious Life
The Half Life 2 Hack from 2018-04-18T13:31:05

How far should a die-hard fan go, in order to bring closer to them the thing that they love? In one of the most interesting, yet relatively unknown cybersecurity stories, a young hacker attempts to...

Listen
Malicious Life
The Legalities of the Cyber War from 2018-04-04T06:52:39

Catching a criminal is by no means easy, but there’s something we take for granted in any crime: that the criminal has a face and a name, that they used a specific weapon on a specific target, and ...

Listen
Malicious Life
Fancy Bear, Cozy Bear from 2018-03-21T06:52:24

When representatives from the Democratic National Committee reached out to a silicon valley cybersecurity company, to investigate a potential breach in their computer system, it’s hard to imagine w...

Listen
Malicious Life
Hack Back from 2018-03-07T06:51:52

Those who have experienced a cybercrime know the feelings of frustration and helplessness that come along with it. A hacker could be halfway across the world when they attack you, and you might hav...

Listen
Malicious Life
Cyber Terrorism from 2018-02-21T13:11:41

What governments and powerful organizations regularly use, others will find ways to use as well. Cyber activity fits so incredibly well with terrorism. Actors can remain hidden, or reveal themselve...

Listen
Malicious Life
Super Spies from 2018-02-07T12:16:07

The NSA has many means at its disposal. But how does it use these means, and for what goals? Discover the (literally) secret history of the NSA’s cyber activity. Travel with us to Russia and back, ...

Listen
Malicious Life
The Trojan Horse Affair from 2018-01-24T06:01:24

The early 2000s were an interesting time in Information Security. This is roughly the period when malware transitioned from viruses written by teenagers for fun, to cybercrime tools in the hands of...

Listen
Malicious Life
Friend or Foe from 2018-01-10T06:08:57

The largest hack in U.S military history may have been conducted by… The NSA. In 1997, a wargame conducted by the NSA showed just how unprepared we were for a potential cybernetic strike- in 4 days...

Listen
Malicious Life
Amit Serper Interview- Holiday Special Episode from 2017-12-27T06:45:50

It’s the holidays and everyone’s on vacation – but the Internet never rests and neither do the bad guys in cybersecurity. So, for this holiday special, we figured we’ll air an interesting interview...

Listen
Malicious Life
Deception from 2017-12-13T06:19:59

From the Bulgarian hacker scene of the 90’s, featured in episodes 1 and 2, we now move to the vibrant underground hacker scene of West and East Berlin. Working secretly for the KGB, a young Berline...

Listen
Malicious Life
Weapons of Mass Disruption from 2017-11-29T14:09:26

The threat of fire and fury stands at the center of all modern conflicts- nuclear bombs that can eradicate life in seconds are the ultimate weapon of war, as they pose a huge threat to centers of p...

Listen
Malicious Life
The Soldiers of North Korea from 2017-11-15T05:01:25

Guerrilla warfare has been around for as long as conventional warfare has. The idea that a small force, through cunning and brazen action, could overtake a larger force is an old one. From pirates ...

Listen
Malicious Life
The Propaganda from 2017-11-01T06:07:28

Governments around the world have been making devious use of the internet as a platform to spread, not malware, but propaganda. As in all wars, propaganda is a huge part of the modern cyber war. Jo...

Listen
Malicious Life
The Whistleblowers from 2017-10-17T06:26:12

WikiLeaks has ushered in a new age in whistle blowing: Modern leakers such as Chelsea Manning – who’s story is the focus of our current episode – expose huge amounts of confidential information. Bu...

Listen
Malicious Life
Stuxnet, part 3 from 2017-10-02T06:30:07

Stuxnet was a devastating weapon, but who wielded it? That is the question we try to answer with the final installment of our Stuxnet series. In this episode, we explore other, similar battles of t...

Listen
Malicious Life
Stuxnet, part 2 from 2017-09-18T06:33:52

Stuxnet was a weapon, a kind of a smart bomb- perhaps one of the smartest bombs ever created. A bomb that couldn’t rely on operators, cameras, and laser targeting, instead it had to “think” its way...

Listen
Malicious Life
Stuxnet, part 1 from 2017-08-30T09:30:56

Where armies once fought with bullets and bombs, they now engage in clandestine, invisible warfare. In 2010 a virus was discovered that would change the world’s perception of cyber warfare forever....

Listen
Malicious Life
Hell to Pay from 2017-08-21T08:02:44

A global FBI manhunt for the world’s most wanted cyber criminal ends in the capture of a massive criminal network, but with the escape of the man himself. Security experts who operate within the gr...

Listen
Malicious Life
The Roots of Evil from 2017-08-07T07:32:57

WannaCry’s widespread cyber attack on more than 200,000 computers all over the world made headlines – but only a few people remember a similar attack, named The AIDS Trojan, almost 30 years earlier...

Listen
Malicious Life
Big Cannons from 2017-07-24T08:31:02

2016 is known throughout the circles of information security as “The Year of The DDoS Attacks”, and rightfully so: 5 large scale DDoS attacks – ‘Distributed Denial Of Service’ – shocked the technol...

Listen
Malicious Life
Spam Empire from 2017-07-06T11:08:30

In this episode of Malicious Life, we take a look at one of the oldest forms of criminal activity on the web- the spam empires of the 90’s and 2000’s. Find out how these multi-million dollar indust...

Listen
Malicious Life
The Dark Avenger from 2017-06-30T06:38:38

In 1989, a message was found in a virus: “Eddie Lives…Somewhere in Time!”. ‘Eddie’ was a particularly nasty virus, and its discovery led a young Bulgarian security researcher down a rabbit hole, on...

Listen
Malicious Life
Ghost In The Machine from 2017-06-28T07:01:06

Cybercrime is one of the most notable threats we face as computer users, nowadays. But it wasn’t always so. Those of us who’ve been in the field long enough may remember a time when computer viruse...

Listen