Malicious Life

By Malicious Life

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.

Image by Malicious Life

Category: Technology

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 2235
Reviews: 9
Episodes: 263


 Feb 27, 2023
excellent podcast about the past and present history of cyber security.

ruined
 Jan 29, 2023
why inject liberal bias? i liked this podcast until you went libtard.its only fake news if its not far left. "illegal immigrants today, democrats on welfare tomorrow" - truth. do you live in USA? Did you vote for slobbering idiot monarch?

Arthur
 Mar 24, 2022
One of my favourite podcasts. So many interesting interviews and stories. I nearly always learn something new.


 Oct 15, 2021


 Aug 6, 2021

Description

Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.


Episode Date
Cuckoo Spear [B-Side]
Nov 20, 2024
The Man Who Went To War With Anonymous - And Lost
Nov 13, 2024
What Can Organizations Learn from "Grim Beeper"? [B-Side]
Nov 05, 2024
The Fappening/Celebgate
Oct 29, 2024
Operation Snow White, Part 2
Oct 15, 2024
Operation Snow White, Part 1
Oct 01, 2024
Caught in the Crossfire: Infighting and Treason in Russia’s Cyber World
Sep 17, 2024
SNAP Fraud: Getting Rich by Stealing from the Poor
Sep 03, 2024
The Hollywood Con Queen, Part 2
Aug 20, 2024
The Hollywood Con Queen, Part 1
Aug 07, 2024
The Doomed Queen’s Secret Ciphers
Jul 23, 2024
Why Did People Write Viruses In The 80s & 90s?
Jul 09, 2024
Section 230: The Law that Makes Social Media Great, and Terrible
Jun 25, 2024
What Happened at Uber?
Jun 11, 2024
The Nigerian Prince
May 28, 2024
Unmasking Secrets: The Rise of Open-Source Intelligence
May 14, 2024
The Source Code of Malicious Life
Apr 30, 2024
The Y2K Bug, Part 2
Apr 16, 2024
The Y2K Bug, Part 1
Mar 31, 2024
Can You Bomb a Hacker?
Mar 19, 2024
Kevin Mitnick, Part 2
Mar 04, 2024
Kevin Mitnick, Part 1
Feb 19, 2024
SIM Registration: Security, or Surveillance?
Feb 05, 2024
The Mariposa Botnet
Jan 22, 2024
The Real Story of Citibank’s $10M Hack
Jan 09, 2024
How to Hack Into Satellites
Dec 27, 2023
Moonlight Maze
Dec 11, 2023
Volt Typhoon
Nov 28, 2023
Is NSO Evil? Part 2
Nov 13, 2023
Is NSO Evil? Part 1
Oct 30, 2023
Should You Pay Ransomware Attackers? A Game Theory Approach
Oct 17, 2023
Silent Firewalls: The Underrepresentation of Women in Cyber
Oct 02, 2023
Operation Kudo
Sep 20, 2023
Can We Stop the AI Cyber Threat?
Sep 04, 2023
Is Generative AI Dangerous?
Aug 22, 2023
Why aren't there more bug bounty programs?
Aug 08, 2023
The Voynich Manuscript
Jul 25, 2023
Roman Seleznev: Did the Punishment Fit the Crime?
Jul 10, 2023
Sony BMG's Rootkit Fiasco
Jun 27, 2023
Ad Fraud, Part 2
Jun 09, 2023
Ad Fraud, Part 1
May 30, 2023
The Economics Of Cybersecurity
May 15, 2023
The Reason You Don’t Have Data Privacy
May 01, 2023
How Entire Countries Can Lose the Internet
Apr 17, 2023
Olympic Destroyer
Apr 03, 2023
The Lawerence Berkeley Hack, Part 2
Mar 20, 2023
The Lawerence Berkeley Hack, Part 1
Mar 08, 2023
Russian Propaganda, Explained [ML B-Side]
Feb 28, 2023
Operation Ivy Bells
Feb 20, 2023
Why Do NFTs Disappear? [ML BSide]
Feb 13, 2023
The (Other) Problem with NFTs
Feb 06, 2023
SIM Swapping Follow Up [ML B-Side]
Jan 30, 2023
You Should Be Afraid of SIM Swaps
Jan 23, 2023
FBI vs. REvil [ML BSide]
Jan 16, 2023
Cyberbunker, Part 2
Jan 10, 2023
Cyberbunker, Part 1
Jan 02, 2023
How Netflix Learned Cloud Security
Dec 26, 2022
Fred Cohen: The Godfather of Computer Viruses [ML B-Side]
Dec 19, 2022
Thamar Reservoir
Dec 13, 2022
The Problem With Kernel-Mode Anti-Cheat Software
Dec 06, 2022
Norse Corp.: How To NOT build a cybersecurity startup
Nov 27, 2022
Jailbreaking Tractors [ML BSide]
Nov 20, 2022
The Russian Business Network
Nov 13, 2022
What can Chess grandmasters teach us about Cyber? [ML BSide]
Nov 07, 2022
LabMD Vs. The FTC
Oct 31, 2022
What Would Happen if CBS Got Hacked? [ML BSide]
Oct 24, 2022
Hacking Stock Markets, Part 2
Oct 18, 2022
Vishing: Voice Scams [ML BSide]
Oct 10, 2022
Hacking Stock Markets, Part 1
Oct 04, 2022
What’s it's Like to Fight LulzSec [ML B-Side]
Sep 27, 2022
"King Kimble": Kim DotCom
Sep 18, 2022
Hacking Multi-Factor Authentication
Sep 13, 2022
Hacking Language Models
Sep 05, 2022
Software Bill of Materials (SBOMs) [ML BSide]
Aug 31, 2022
Leo Kuvayev– The Czar of Spammers
Aug 22, 2022
"A CISO's Nightmare": Israel Baron on Railway Secuirty
Aug 14, 2022
“Designed by criminals, for criminals”: Operation Trojan Shield
Aug 08, 2022
Andrew Ginter: A 40-Years-Old Backdoor [ML-BSide]
Aug 01, 2022
Silk Road, The Amazon of Drugs - Part 2
Jul 21, 2022
Kurtis Minder: Ransomware Negotiations [ML BSide]
Jul 18, 2022
Silk Road: The Amazon of drugs, Part 1
Jul 11, 2022
Jacob Goldstein: The Future of BitCoin [ML BSide]
Jul 04, 2022
The “Cypherpunks” Who Invented Private Digital Money
Jun 22, 2022
Malicious LIVE: Celebrating 5 Years of Malicious Life
Jun 19, 2022
Hackers vs. Spies: The Stratfor Leaks, Pt. 2
Jun 14, 2022
Hackers vs. Spies: The Stratfor Leaks, Pt. 1
Jun 07, 2022
Catching A Cybercriminal [ML B-Side]
May 30, 2022
What The LinkedIn Hack Taught Us About Storing Passwords
May 24, 2022
Operation CuckooBees [ML B-Side]
May 17, 2022
How to Russia-Proof Your Democracy [ML BSide]
May 09, 2022
Op. Sundevil And The Birth of the EFF
May 02, 2022
MITRE Attack Flow [ML B-Sides]
Apr 24, 2022
Aaron Swartz
Apr 19, 2022
The Russia-Ukraine Cyberwar [ML B-Side]
Apr 10, 2022
Chris Roberts: Hackers on a Plane
Apr 05, 2022
DIE - A New Paragidm for Cyber Security [ML B-Side]
Mar 28, 2022
Cyber PTSD
Mar 22, 2022
How Resilient Is Our Banking System?
Mar 16, 2022
How Resiliant Is Our Banking System? [ML BSide]
Mar 14, 2022
Crypto AG, Part 3: The Truth Is Revealed
Mar 08, 2022
Quantum Cyber Security [ML BSide]
Feb 28, 2022
Crypto AG, Part 2: The Death of Bo Jr.
Feb 21, 2022
Why do APTs use Ransomeware? [ML BSide]
Feb 14, 2022
Crypto AG - The Greatest Espionage Operation Ever, Part 1
Feb 07, 2022
Why aren't SMBs investing in Cyber Security? [ML B-Side]
Jan 31, 2022
The Bloody Origins of Israel's Cyber Security Industry
Jan 25, 2022
Hacker Highschool: Pete Herzog [ML BSide]
Jan 17, 2022
The Mystery of Cicada 3301
Jan 10, 2022
How the Internet Changed the NSA
Jan 03, 2022
Is Code === Free Speech?
Dec 27, 2021
A digital 'vaccine' for Log4Shell [ML BSide]
Dec 20, 2021
Shawn Carpenter: A Cyber Vigliante
Dec 14, 2021
Ransomware Attackers Don’t Take Holidays [ML B-Side]
Dec 06, 2021
Tay: A Teenage Bot Gone Rogue
Nov 30, 2021
Wild West Hackin' Fest [ML BSide]
Nov 22, 2021
Operation Flyhook, Part 2
Nov 15, 2021
IP Hijacking [ML BSide]
Nov 09, 2021
Operation Flyhook, Part 1
Nov 01, 2021
In Defence Of the NSA [ML B-Side]
Oct 26, 2021
Marcus Hutchins - An Accidental Hero
Oct 18, 2021
Operation GhostShell
Oct 11, 2021
Smart TVs: A New Battlefield
Oct 04, 2021
The MITRE ATT&CK Framework
Sep 27, 2021
Should The U.S. Ban Chinese and Russian Technology?
Sep 20, 2021
Jack Rhysider, Darknet Diaries [ML B-Side]
Sep 13, 2021
The Tesla Hack
Sep 06, 2021
Understanding China [ML B-Side]
Aug 30, 2021
John McAfee
Aug 23, 2021
RSA Breach FollowUp: Are We Doing Security Right? [ML B-Side]
Aug 16, 2021
DeadRinger [ML B-Side]
Aug 10, 2021
The Jester
Aug 03, 2021
The State of Credit Card Security [ML B-Side]
Jul 26, 2021
Albert Gonzalez, Part 3
Jul 20, 2021
DerbyCon - Dave Kennedy [ML B-Side]
Jul 13, 2021
Albert Gonzalez, Part 2
Jul 07, 2021
Jeff Moss: DEF CON [ML B-Side]
Jun 28, 2021
Albert Gonzales, Part 1
Jun 21, 2021
THOTCON Hacking Conference [ML BSide]
Jun 15, 2021
China's Unrestricted Warfare, Part 3
Jun 08, 2021
Colonial Pipeline & DarkSide: Assaf Dahan [B-Side]
Jun 01, 2021
RSA Breach, Part 2
May 24, 2021
RSA Breach: The Untold Story, Part 1
May 20, 2021
China's Unrestricted Warfare, Part 2
May 11, 2021
Creating a Grassroots Security Conference: Jack Daniel [ML B-Side]
May 04, 2021
China's Unrestricted Warfare, Part 1
Apr 27, 2021
Can Nuclear Power Plants Be Hacked?
Apr 19, 2021
Shutting Down The Internet in 30 Minutes: Chris Wysopal (WeldPond) [ML B-Side]
Apr 12, 2021
L0pht, Part 2
Apr 05, 2021
The Story of 'L0pht', Part 1
Mar 30, 2021
MS Exchange Hack [ML B-Side]
Mar 22, 2021
NotPetya Part 2
Mar 15, 2021
NotPetya Part 1
Mar 01, 2021
Facial Recognition in Law Enforcment, Part 2
Feb 16, 2021
Should Law Enforcement Use Facial Recognition? Pt. 1
Feb 03, 2021
Clearview AI
Jan 21, 2021
Breaking Into Buildings
Jan 07, 2021
Special: The Solarwinds Hack
Dec 28, 2020
100th Episode Special
Dec 21, 2020
Jan Sloot's Incredible Digital Coding System
Dec 07, 2020
Op. GUNMAN & The World's First Keylogger
Nov 22, 2020
Election Hacking, Part 2
Nov 02, 2020
Election Hacking, Part 1
Oct 22, 2020
MDR Vs. The TrickBot Gang
Oct 12, 2020
Yahoo's Ugly Death, Part 2
Sep 25, 2020
Yahoo's Ugly Death, Part 1
Sep 11, 2020
The Great Firewall of China, Pt. 2: Cisco's Trial
Aug 27, 2020
The Great Firewall of China - Part 1
Aug 14, 2020
Troy Hunt - Interview
Aug 04, 2020
Multi-Stage Ransomware (Live)
Aug 02, 2020
Protecting The Panama Papers Whistleblower
Jul 16, 2020
From Ransomware To Blackmail, With Assaf Dahan
Jul 07, 2020
SegWit2x, Part 3
Jul 03, 2020
SegWit2x Part 2
Jun 19, 2020
Hacking Fortnite Accounts (CPRadio)
Jun 11, 2020
SegWit2x, or - The Year Bitcoiners Will Never Forget, Part 1
Jun 04, 2020
No Honor Among Thieves
May 22, 2020
Maintaining Secure Business Continuity With A Remote Workforce - With Sam Curry
May 14, 2020
The Problem With Passwords
May 08, 2020
Steven Wozniak Interview, Deep 2017
Apr 23, 2020
The Hauwei Ban, Part 2
Apr 23, 2020
The Huawei Ban, Part 1
Apr 09, 2020
The Max Headroom Signal Hijack
Mar 24, 2020
ToTok, Part 3: Becoming a Spyware Superpower
Mar 15, 2020
Operation Glowing Symphony
Mar 13, 2020
ToTok, Part 2: The Masterminds of Mobile Malware
Mar 10, 2020
ToTok, Part 1: How to Convince Someone to Download Spyware
Mar 05, 2020
How To Defend A Bank, Pt. II: Right of Bang
Feb 27, 2020
How To Defend A Bank, Part 1: Fusion Centers
Feb 13, 2020
Triton, Part 2: The World’s Most Dangerous Malware
Jan 29, 2020
Triton Part 1
Jan 16, 2020
Dead Drops
Jan 14, 2020
Deep Fakes, Part 2: Man Vs. Machine
Jan 02, 2020
GAN and Deep Fakes, Part 1
Dec 19, 2019
Sam Curry: The 2020 Crystal Ball
Dec 10, 2019
Human Side Channels
Dec 03, 2019
What's the problem with Cyber Insurance?
Nov 21, 2019
Gozi B-Side: Amit Serper & Sam Curry
Nov 19, 2019
Gozi Part 2
Nov 14, 2019
EP61: Prying Eyes
Nov 12, 2019
EP60: ML B-Side: Lodrian Cherne On Stalkerware
Nov 08, 2019
EP59: Gozi, Part 1: The Rise of Malware-as-a-Service
Oct 31, 2019
EP58: How is Spyware Legal?
Oct 17, 2019
EP57: Listeners Survey Special
Oct 10, 2019
EP56: Operation Aurora, Part 2
Sep 26, 2019
EP55: Operation Aurora, Part 1
Sep 12, 2019
Responding to a Cyber Attack with Missiles
Aug 29, 2019
EP53: Are Ad Blockers Malicious?
Aug 15, 2019
ML_Conficker
Jul 18, 2019
Operation SoftCell
Jul 10, 2019
'Pa Bell' Vs. Youth International Party Line
Jun 16, 2019
The U.S vs. Gary McKinnon
May 27, 2019
The WANK Worm, Part 2
May 10, 2019
The WANK Worm, Part 1
Apr 25, 2019
The Equifax Data Breach Pt. II: The Bits Hit The Fan
Apr 11, 2019
The Equifax Data Breach Pt. I: A Big Data Bubble
Mar 27, 2019
DeCSS: Hackers Vs Hollywood
Mar 13, 2019
Marconi & The Maskelyne Affair
Feb 21, 2019
The Fall Of Mt. Gox – Part 2
Feb 06, 2019
The Location Data Brokers – A CYBER Podcast Special
Jan 24, 2019
The Fall Of Mt. Gox – Part 1
Jan 22, 2019
Black Duck Eggs: Darknet Diaries
Jan 08, 2019
Dave Kennedy: The Psychological Principles of Social Engineering
Dec 25, 2018
The Ethereum DAO Hack
Dec 13, 2018
The Jerusalem Virus, Part 2
Nov 26, 2018
The Jerusalem Virus, Part 1
Nov 15, 2018
Gene Spafford on the Morris Worm & Cyber-security in the 1980’s
Oct 31, 2018
China Vs. Github
Oct 16, 2018
The Ashley Madison Hack, Part 2
Oct 04, 2018
The Ashley Madison Hack, Part 1
Sep 19, 2018
Interview Special: Graham Cluley
Sep 05, 2018
The Target Hack
Aug 23, 2018
WoW: Corrupted Blood
Jul 25, 2018
The Stuxnet Virus Pt. 3
Jul 12, 2018
The Stuxnet Virus Pt. 2
Jul 12, 2018
The Stuxnet Virus Pt. 1
Jul 12, 2018
Shamoon – The Biggest Hack In History
Jun 29, 2018
The Melissa Virus
Jun 14, 2018
GhostNet
May 30, 2018
The Morris Worm Pt. 2
May 16, 2018
The Morris Worm Pt. 1
May 02, 2018
The Half Life 2 Hack
Apr 18, 2018
The Legalities of the Cyber War
Apr 04, 2018
Fancy Bear, Cozy Bear
Mar 21, 2018
Hack Back
Mar 07, 2018
Cyber Terrorism
Feb 21, 2018
Super Spies
Feb 07, 2018
The Trojan Horse Affair
Jan 24, 2018
Friend or Foe
Jan 10, 2018
Amit Serper Interview- Holiday Special Episode
Dec 27, 2017
Deception
Dec 13, 2017
Weapons of Mass Disruption
Nov 29, 2017
The Soldiers of North Korea
Nov 15, 2017
The Propaganda
Nov 01, 2017
The Whistleblowers
Oct 17, 2017
Stuxnet, part 3
Oct 02, 2017
Stuxnet, part 2
Sep 18, 2017
Stuxnet, part 1
Aug 30, 2017
Hell to Pay
Aug 21, 2017
The Roots of Evil
Aug 07, 2017
Big Cannons
Jul 24, 2017
Spam Empire
Jul 06, 2017
The Dark Avenger
Jun 30, 2017
Ghost In The Machine
Jun 28, 2017