Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
Feb 27, 2023
excellent podcast about the past and present history of cyber security.
ruined
Jan 29, 2023
why inject liberal bias? i liked this podcast until you went libtard.its only fake news if its not far left. "illegal immigrants today, democrats on welfare tomorrow" - truth. do you live in USA? Did you vote for slobbering idiot monarch?
Arthur
Mar 24, 2022
One of my favourite podcasts. So many interesting interviews and stories. I nearly always learn something new.
Oct 15, 2021
Aug 6, 2021
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
Episode | Date |
---|---|
Cuckoo Spear [B-Side]
|
Nov 20, 2024 |
The Man Who Went To War With Anonymous - And Lost
|
Nov 13, 2024 |
What Can Organizations Learn from "Grim Beeper"? [B-Side]
|
Nov 05, 2024 |
The Fappening/Celebgate
|
Oct 29, 2024 |
Operation Snow White, Part 2
|
Oct 15, 2024 |
Operation Snow White, Part 1
|
Oct 01, 2024 |
Caught in the Crossfire: Infighting and Treason in Russia’s Cyber World
|
Sep 17, 2024 |
SNAP Fraud: Getting Rich by Stealing from the Poor
|
Sep 03, 2024 |
The Hollywood Con Queen, Part 2
|
Aug 20, 2024 |
The Hollywood Con Queen, Part 1
|
Aug 07, 2024 |
The Doomed Queen’s Secret Ciphers
|
Jul 23, 2024 |
Why Did People Write Viruses In The 80s & 90s?
|
Jul 09, 2024 |
Section 230: The Law that Makes Social Media Great, and Terrible
|
Jun 25, 2024 |
What Happened at Uber?
|
Jun 11, 2024 |
The Nigerian Prince
|
May 28, 2024 |
Unmasking Secrets: The Rise of Open-Source Intelligence
|
May 14, 2024 |
The Source Code of Malicious Life
|
Apr 30, 2024 |
The Y2K Bug, Part 2
|
Apr 16, 2024 |
The Y2K Bug, Part 1
|
Mar 31, 2024 |
Can You Bomb a Hacker?
|
Mar 19, 2024 |
Kevin Mitnick, Part 2
|
Mar 04, 2024 |
Kevin Mitnick, Part 1
|
Feb 19, 2024 |
SIM Registration: Security, or Surveillance?
|
Feb 05, 2024 |
The Mariposa Botnet
|
Jan 22, 2024 |
The Real Story of Citibank’s $10M Hack
|
Jan 09, 2024 |
How to Hack Into Satellites
|
Dec 27, 2023 |
Moonlight Maze
|
Dec 11, 2023 |
Volt Typhoon
|
Nov 28, 2023 |
Is NSO Evil? Part 2
|
Nov 13, 2023 |
Is NSO Evil? Part 1
|
Oct 30, 2023 |
Should You Pay Ransomware Attackers? A Game Theory Approach
|
Oct 17, 2023 |
Silent Firewalls: The Underrepresentation of Women in Cyber
|
Oct 02, 2023 |
Operation Kudo
|
Sep 20, 2023 |
Can We Stop the AI Cyber Threat?
|
Sep 04, 2023 |
Is Generative AI Dangerous?
|
Aug 22, 2023 |
Why aren't there more bug bounty programs?
|
Aug 08, 2023 |
The Voynich Manuscript
|
Jul 25, 2023 |
Roman Seleznev: Did the Punishment Fit the Crime?
|
Jul 10, 2023 |
Sony BMG's Rootkit Fiasco
|
Jun 27, 2023 |
Ad Fraud, Part 2
|
Jun 09, 2023 |
Ad Fraud, Part 1
|
May 30, 2023 |
The Economics Of Cybersecurity
|
May 15, 2023 |
The Reason You Don’t Have Data Privacy
|
May 01, 2023 |
How Entire Countries Can Lose the Internet
|
Apr 17, 2023 |
Olympic Destroyer
|
Apr 03, 2023 |
The Lawerence Berkeley Hack, Part 2
|
Mar 20, 2023 |
The Lawerence Berkeley Hack, Part 1
|
Mar 08, 2023 |
Russian Propaganda, Explained [ML B-Side]
|
Feb 28, 2023 |
Operation Ivy Bells
|
Feb 20, 2023 |
Why Do NFTs Disappear? [ML BSide]
|
Feb 13, 2023 |
The (Other) Problem with NFTs
|
Feb 06, 2023 |
SIM Swapping Follow Up [ML B-Side]
|
Jan 30, 2023 |
You Should Be Afraid of SIM Swaps
|
Jan 23, 2023 |
FBI vs. REvil [ML BSide]
|
Jan 16, 2023 |
Cyberbunker, Part 2
|
Jan 10, 2023 |
Cyberbunker, Part 1
|
Jan 02, 2023 |
How Netflix Learned Cloud Security
|
Dec 26, 2022 |
Fred Cohen: The Godfather of Computer Viruses [ML B-Side]
|
Dec 19, 2022 |
Thamar Reservoir
|
Dec 13, 2022 |
The Problem With Kernel-Mode Anti-Cheat Software
|
Dec 06, 2022 |
Norse Corp.: How To NOT build a cybersecurity startup
|
Nov 27, 2022 |
Jailbreaking Tractors [ML BSide]
|
Nov 20, 2022 |
The Russian Business Network
|
Nov 13, 2022 |
What can Chess grandmasters teach us about Cyber? [ML BSide]
|
Nov 07, 2022 |
LabMD Vs. The FTC
|
Oct 31, 2022 |
What Would Happen if CBS Got Hacked? [ML BSide]
|
Oct 24, 2022 |
Hacking Stock Markets, Part 2
|
Oct 18, 2022 |
Vishing: Voice Scams [ML BSide]
|
Oct 10, 2022 |
Hacking Stock Markets, Part 1
|
Oct 04, 2022 |
What’s it's Like to Fight LulzSec [ML B-Side]
|
Sep 27, 2022 |
"King Kimble": Kim DotCom
|
Sep 18, 2022 |
Hacking Multi-Factor Authentication
|
Sep 13, 2022 |
Hacking Language Models
|
Sep 05, 2022 |
Software Bill of Materials (SBOMs) [ML BSide]
|
Aug 31, 2022 |
Leo Kuvayev– The Czar of Spammers
|
Aug 22, 2022 |
"A CISO's Nightmare": Israel Baron on Railway Secuirty
|
Aug 14, 2022 |
“Designed by criminals, for criminals”: Operation Trojan Shield
|
Aug 08, 2022 |
Andrew Ginter: A 40-Years-Old Backdoor [ML-BSide]
|
Aug 01, 2022 |
Silk Road, The Amazon of Drugs - Part 2
|
Jul 21, 2022 |
Kurtis Minder: Ransomware Negotiations [ML BSide]
|
Jul 18, 2022 |
Silk Road: The Amazon of drugs, Part 1
|
Jul 11, 2022 |
Jacob Goldstein: The Future of BitCoin [ML BSide]
|
Jul 04, 2022 |
The “Cypherpunks” Who Invented Private Digital Money
|
Jun 22, 2022 |
Malicious LIVE: Celebrating 5 Years of Malicious Life
|
Jun 19, 2022 |
Hackers vs. Spies: The Stratfor Leaks, Pt. 2
|
Jun 14, 2022 |
Hackers vs. Spies: The Stratfor Leaks, Pt. 1
|
Jun 07, 2022 |
Catching A Cybercriminal [ML B-Side]
|
May 30, 2022 |
What The LinkedIn Hack Taught Us About Storing Passwords
|
May 24, 2022 |
Operation CuckooBees [ML B-Side]
|
May 17, 2022 |
How to Russia-Proof Your Democracy [ML BSide]
|
May 09, 2022 |
Op. Sundevil And The Birth of the EFF
|
May 02, 2022 |
MITRE Attack Flow [ML B-Sides]
|
Apr 24, 2022 |
Aaron Swartz
|
Apr 19, 2022 |
The Russia-Ukraine Cyberwar [ML B-Side]
|
Apr 10, 2022 |
Chris Roberts: Hackers on a Plane
|
Apr 05, 2022 |
DIE - A New Paragidm for Cyber Security [ML B-Side]
|
Mar 28, 2022 |
Cyber PTSD
|
Mar 22, 2022 |
How Resilient Is Our Banking System?
|
Mar 16, 2022 |
How Resiliant Is Our Banking System? [ML BSide]
|
Mar 14, 2022 |
Crypto AG, Part 3: The Truth Is Revealed
|
Mar 08, 2022 |
Quantum Cyber Security [ML BSide]
|
Feb 28, 2022 |
Crypto AG, Part 2: The Death of Bo Jr.
|
Feb 21, 2022 |
Why do APTs use Ransomeware? [ML BSide]
|
Feb 14, 2022 |
Crypto AG - The Greatest Espionage Operation Ever, Part 1
|
Feb 07, 2022 |
Why aren't SMBs investing in Cyber Security? [ML B-Side]
|
Jan 31, 2022 |
The Bloody Origins of Israel's Cyber Security Industry
|
Jan 25, 2022 |
Hacker Highschool: Pete Herzog [ML BSide]
|
Jan 17, 2022 |
The Mystery of Cicada 3301
|
Jan 10, 2022 |
How the Internet Changed the NSA
|
Jan 03, 2022 |
Is Code === Free Speech?
|
Dec 27, 2021 |
A digital 'vaccine' for Log4Shell [ML BSide]
|
Dec 20, 2021 |
Shawn Carpenter: A Cyber Vigliante
|
Dec 14, 2021 |
Ransomware Attackers Don’t Take Holidays [ML B-Side]
|
Dec 06, 2021 |
Tay: A Teenage Bot Gone Rogue
|
Nov 30, 2021 |
Wild West Hackin' Fest [ML BSide]
|
Nov 22, 2021 |
Operation Flyhook, Part 2
|
Nov 15, 2021 |
IP Hijacking [ML BSide]
|
Nov 09, 2021 |
Operation Flyhook, Part 1
|
Nov 01, 2021 |
In Defence Of the NSA [ML B-Side]
|
Oct 26, 2021 |
Marcus Hutchins - An Accidental Hero
|
Oct 18, 2021 |
Operation GhostShell
|
Oct 11, 2021 |
Smart TVs: A New Battlefield
|
Oct 04, 2021 |
The MITRE ATT&CK Framework
|
Sep 27, 2021 |
Should The U.S. Ban Chinese and Russian Technology?
|
Sep 20, 2021 |
Jack Rhysider, Darknet Diaries [ML B-Side]
|
Sep 13, 2021 |
The Tesla Hack
|
Sep 06, 2021 |
Understanding China [ML B-Side]
|
Aug 30, 2021 |
John McAfee
|
Aug 23, 2021 |
RSA Breach FollowUp: Are We Doing Security Right? [ML B-Side]
|
Aug 16, 2021 |
DeadRinger [ML B-Side]
|
Aug 10, 2021 |
The Jester
|
Aug 03, 2021 |
The State of Credit Card Security [ML B-Side]
|
Jul 26, 2021 |
Albert Gonzalez, Part 3
|
Jul 20, 2021 |
DerbyCon - Dave Kennedy [ML B-Side]
|
Jul 13, 2021 |
Albert Gonzalez, Part 2
|
Jul 07, 2021 |
Jeff Moss: DEF CON [ML B-Side]
|
Jun 28, 2021 |
Albert Gonzales, Part 1
|
Jun 21, 2021 |
THOTCON Hacking Conference [ML BSide]
|
Jun 15, 2021 |
China's Unrestricted Warfare, Part 3
|
Jun 08, 2021 |
Colonial Pipeline & DarkSide: Assaf Dahan [B-Side]
|
Jun 01, 2021 |
RSA Breach, Part 2
|
May 24, 2021 |
RSA Breach: The Untold Story, Part 1
|
May 20, 2021 |
China's Unrestricted Warfare, Part 2
|
May 11, 2021 |
Creating a Grassroots Security Conference: Jack Daniel [ML B-Side]
|
May 04, 2021 |
China's Unrestricted Warfare, Part 1
|
Apr 27, 2021 |
Can Nuclear Power Plants Be Hacked?
|
Apr 19, 2021 |
Shutting Down The Internet in 30 Minutes: Chris Wysopal (WeldPond) [ML B-Side]
|
Apr 12, 2021 |
L0pht, Part 2
|
Apr 05, 2021 |
The Story of 'L0pht', Part 1
|
Mar 30, 2021 |
MS Exchange Hack [ML B-Side]
|
Mar 22, 2021 |
NotPetya Part 2
|
Mar 15, 2021 |
NotPetya Part 1
|
Mar 01, 2021 |
Facial Recognition in Law Enforcment, Part 2
|
Feb 16, 2021 |
Should Law Enforcement Use Facial Recognition? Pt. 1
|
Feb 03, 2021 |
Clearview AI
|
Jan 21, 2021 |
Breaking Into Buildings
|
Jan 07, 2021 |
Special: The Solarwinds Hack
|
Dec 28, 2020 |
100th Episode Special
|
Dec 21, 2020 |
Jan Sloot's Incredible Digital Coding System
|
Dec 07, 2020 |
Op. GUNMAN & The World's First Keylogger
|
Nov 22, 2020 |
Election Hacking, Part 2
|
Nov 02, 2020 |
Election Hacking, Part 1
|
Oct 22, 2020 |
MDR Vs. The TrickBot Gang
|
Oct 12, 2020 |
Yahoo's Ugly Death, Part 2
|
Sep 25, 2020 |
Yahoo's Ugly Death, Part 1
|
Sep 11, 2020 |
The Great Firewall of China, Pt. 2: Cisco's Trial
|
Aug 27, 2020 |
The Great Firewall of China - Part 1
|
Aug 14, 2020 |
Troy Hunt - Interview
|
Aug 04, 2020 |
Multi-Stage Ransomware (Live)
|
Aug 02, 2020 |
Protecting The Panama Papers Whistleblower
|
Jul 16, 2020 |
From Ransomware To Blackmail, With Assaf Dahan
|
Jul 07, 2020 |
SegWit2x, Part 3
|
Jul 03, 2020 |
SegWit2x Part 2
|
Jun 19, 2020 |
Hacking Fortnite Accounts (CPRadio)
|
Jun 11, 2020 |
SegWit2x, or - The Year Bitcoiners Will Never Forget, Part 1
|
Jun 04, 2020 |
No Honor Among Thieves
|
May 22, 2020 |
Maintaining Secure Business Continuity With A Remote Workforce - With Sam Curry
|
May 14, 2020 |
The Problem With Passwords
|
May 08, 2020 |
Steven Wozniak Interview, Deep 2017
|
Apr 23, 2020 |
The Hauwei Ban, Part 2
|
Apr 23, 2020 |
The Huawei Ban, Part 1
|
Apr 09, 2020 |
The Max Headroom Signal Hijack
|
Mar 24, 2020 |
ToTok, Part 3: Becoming a Spyware Superpower
|
Mar 15, 2020 |
Operation Glowing Symphony
|
Mar 13, 2020 |
ToTok, Part 2: The Masterminds of Mobile Malware
|
Mar 10, 2020 |
ToTok, Part 1: How to Convince Someone to Download Spyware
|
Mar 05, 2020 |
How To Defend A Bank, Pt. II: Right of Bang
|
Feb 27, 2020 |
How To Defend A Bank, Part 1: Fusion Centers
|
Feb 13, 2020 |
Triton, Part 2: The World’s Most Dangerous Malware
|
Jan 29, 2020 |
Triton Part 1
|
Jan 16, 2020 |
Dead Drops
|
Jan 14, 2020 |
Deep Fakes, Part 2: Man Vs. Machine
|
Jan 02, 2020 |
GAN and Deep Fakes, Part 1
|
Dec 19, 2019 |
Sam Curry: The 2020 Crystal Ball
|
Dec 10, 2019 |
Human Side Channels
|
Dec 03, 2019 |
What's the problem with Cyber Insurance?
|
Nov 21, 2019 |
Gozi B-Side: Amit Serper & Sam Curry
|
Nov 19, 2019 |
Gozi Part 2
|
Nov 14, 2019 |
EP61: Prying Eyes
|
Nov 12, 2019 |
EP60: ML B-Side: Lodrian Cherne On Stalkerware
|
Nov 08, 2019 |
EP59: Gozi, Part 1: The Rise of Malware-as-a-Service
|
Oct 31, 2019 |
EP58: How is Spyware Legal?
|
Oct 17, 2019 |
EP57: Listeners Survey Special
|
Oct 10, 2019 |
EP56: Operation Aurora, Part 2
|
Sep 26, 2019 |
EP55: Operation Aurora, Part 1
|
Sep 12, 2019 |
Responding to a Cyber Attack with Missiles
|
Aug 29, 2019 |
EP53: Are Ad Blockers Malicious?
|
Aug 15, 2019 |
ML_Conficker
|
Jul 18, 2019 |
Operation SoftCell
|
Jul 10, 2019 |
'Pa Bell' Vs. Youth International Party Line
|
Jun 16, 2019 |
The U.S vs. Gary McKinnon
|
May 27, 2019 |
The WANK Worm, Part 2
|
May 10, 2019 |
The WANK Worm, Part 1
|
Apr 25, 2019 |
The Equifax Data Breach Pt. II: The Bits Hit The Fan
|
Apr 11, 2019 |
The Equifax Data Breach Pt. I: A Big Data Bubble
|
Mar 27, 2019 |
DeCSS: Hackers Vs Hollywood
|
Mar 13, 2019 |
Marconi & The Maskelyne Affair
|
Feb 21, 2019 |
The Fall Of Mt. Gox – Part 2
|
Feb 06, 2019 |
The Location Data Brokers – A CYBER Podcast Special
|
Jan 24, 2019 |
The Fall Of Mt. Gox – Part 1
|
Jan 22, 2019 |
Black Duck Eggs: Darknet Diaries
|
Jan 08, 2019 |
Dave Kennedy: The Psychological Principles of Social Engineering
|
Dec 25, 2018 |
The Ethereum DAO Hack
|
Dec 13, 2018 |
The Jerusalem Virus, Part 2
|
Nov 26, 2018 |
The Jerusalem Virus, Part 1
|
Nov 15, 2018 |
Gene Spafford on the Morris Worm & Cyber-security in the 1980’s
|
Oct 31, 2018 |
China Vs. Github
|
Oct 16, 2018 |
The Ashley Madison Hack, Part 2
|
Oct 04, 2018 |
The Ashley Madison Hack, Part 1
|
Sep 19, 2018 |
Interview Special: Graham Cluley
|
Sep 05, 2018 |
The Target Hack
|
Aug 23, 2018 |
WoW: Corrupted Blood
|
Jul 25, 2018 |
The Stuxnet Virus Pt. 3
|
Jul 12, 2018 |
The Stuxnet Virus Pt. 2
|
Jul 12, 2018 |
The Stuxnet Virus Pt. 1
|
Jul 12, 2018 |
Shamoon – The Biggest Hack In History
|
Jun 29, 2018 |
The Melissa Virus
|
Jun 14, 2018 |
GhostNet
|
May 30, 2018 |
The Morris Worm Pt. 2
|
May 16, 2018 |
The Morris Worm Pt. 1
|
May 02, 2018 |
The Half Life 2 Hack
|
Apr 18, 2018 |
The Legalities of the Cyber War
|
Apr 04, 2018 |
Fancy Bear, Cozy Bear
|
Mar 21, 2018 |
Hack Back
|
Mar 07, 2018 |
Cyber Terrorism
|
Feb 21, 2018 |
Super Spies
|
Feb 07, 2018 |
The Trojan Horse Affair
|
Jan 24, 2018 |
Friend or Foe
|
Jan 10, 2018 |
Amit Serper Interview- Holiday Special Episode
|
Dec 27, 2017 |
Deception
|
Dec 13, 2017 |
Weapons of Mass Disruption
|
Nov 29, 2017 |
The Soldiers of North Korea
|
Nov 15, 2017 |
The Propaganda
|
Nov 01, 2017 |
The Whistleblowers
|
Oct 17, 2017 |
Stuxnet, part 3
|
Oct 02, 2017 |
Stuxnet, part 2
|
Sep 18, 2017 |
Stuxnet, part 1
|
Aug 30, 2017 |
Hell to Pay
|
Aug 21, 2017 |
The Roots of Evil
|
Aug 07, 2017 |
Big Cannons
|
Jul 24, 2017 |
Spam Empire
|
Jul 06, 2017 |
The Dark Avenger
|
Jun 30, 2017 |
Ghost In The Machine
|
Jun 28, 2017 |