Description
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
Episodes
- EpisodeWhat’s it's Like to Fight LulzSec [ML B-Side]What’s it's Like to Fight LulzSec [ML B-Side]Advertising Inquiries: https://redcircle.com/brands
- EpisodeWild West Hackin' Fest [ML BSide]Wild West Hackin' Fest [ML BSide]Advertising Inquiries: https://redcircle.com/brands
- EpisodeOperation Flyhook, Part 2Operation Flyhook, Part 2Advertising Inquiries: https://redcircle.com/brands
- EpisodeIP Hijacking [ML BSide]IP Hijacking [ML BSide]Advertising Inquiries: https://redcircle.com/brands
- EpisodeOperation Flyhook, Part 1Operation Flyhook, Part 1Advertising Inquiries: https://redcircle.com/brands
- EpisodeIn Defence Of the NSA [ML B-Side]In Defence Of the NSA [ML B-Side]Advertising Inquiries: https://redcircle.com/brands
- EpisodeMarcus Hutchins - An Accidental HeroMarcus Hutchins - An Accidental HeroAdvertising Inquiries: https://redcircle.com/brands
- EpisodeOperation GhostShellOperation GhostShellAdvertising Inquiries: https://redcircle.com/brands
- EpisodeSmart TVs: A New BattlefieldSmart TVs: A New BattlefieldAdvertising Inquiries: https://redcircle.com/brands
- EpisodeThe MITRE ATT&CK FrameworkThe MITRE ATT&CK FrameworkAdvertising Inquiries: https://redcircle.com/brands
- EpisodeNotPetya Part 1NotPetya Part 1Advertising Inquiries: https://redcircle.com/brands
- EpisodeFacial Recognition in Law Enforcment, Part 2Facial Recognition in Law Enforcment, Part 2Advertising Inquiries: https://redcircle.com/brands
- EpisodeThe Huawei Ban, Part 1The Huawei Ban, Part 1Advertising Inquiries: https://redcircle.com/brands
- EpisodeThe Max Headroom Signal HijackThe Max Headroom Signal HijackAdvertising Inquiries: https://redcircle.com/brands
- EpisodeToTok, Part 3: Becoming a Spyware SuperpowerToTok, Part 3: Becoming a Spyware SuperpowerAdvertising Inquiries: https://redcircle.com/brands
- EpisodeOperation Glowing SymphonyOperation Glowing SymphonyAdvertising Inquiries: https://redcircle.com/brands
- EpisodeToTok, Part 2: The Masterminds of Mobile MalwareToTok, Part 2: The Masterminds of Mobile MalwareAdvertising Inquiries: https://redcircle.com/brands
- EpisodeDIE - A New Paragidm for Cyber Security [ML B-Side]DIE - A New Paragidm for Cyber Security [ML B-Side]Advertising Inquiries: https://redcircle.com/brands
- EpisodeCyber PTSDCyber PTSDAdvertising Inquiries: https://redcircle.com/brands
- EpisodeHow Resilient Is Our Banking System?How Resilient Is Our Banking System?Advertising Inquiries: https://redcircle.com/brands
- EpisodeHow Resiliant Is Our Banking System? [ML BSide]How Resiliant Is Our Banking System? [ML BSide]Advertising Inquiries: https://redcircle.com/brands
- EpisodeCrypto AG, Part 3: The Truth Is RevealedCrypto AG, Part 3: The Truth Is RevealedAdvertising Inquiries: https://redcircle.com/brands
- EpisodeQuantum Cyber Security [ML BSide]Quantum Cyber Security [ML BSide]Advertising Inquiries: https://redcircle.com/brands
- EpisodeCrypto AG, Part 2: The Death of Bo Jr.Crypto AG, Part 2: The Death of Bo Jr.Advertising Inquiries: https://redcircle.com/brands
- EpisodeWhy do APTs use Ransomeware? [ML BSide]Why APTs use Ransomeware? [ML BSide]Advertising Inquiries: https://redcircle.com/brands
- EpisodeCrypto AG - The Greatest Espionage Operation Ever, Part 1Crypto AG - The Greatest Espionage Operation Ever, Part 1Advertising Inquiries: https://redcircle.com/brands
- EpisodeWhy aren't SMBs investing in Cyber Security? [ML B-Side]Why aren't SMBs investing in Cyber Security? [ML B-Side]Advertising Inquiries: https://redcircle.com/brands
- EpisodeThe Bloody Origins of Israel's Cyber Security IndustryThe Bloody Origins of Israel's Cyber Security IndustryAdvertising Inquiries: https://redcircle.com/brands
- EpisodeHacker Highschool: Pete Herzog [ML BSide]Hacker Highschool: Pete Herzog [ML BSide]Advertising Inquiries: https://redcircle.com/brands
- EpisodeThe Mystery of Cicada 3301The Mystery of Cicada 3301Advertising Inquiries: https://redcircle.com/brands
- EpisodeHow the Internet Changed the NSAHow the Internet Changed the NSAAdvertising Inquiries: https://redcircle.com/brands
- EpisodeIs Code === Free Speech?Is Code === Free Speech?Advertising Inquiries: https://redcircle.com/brands
- EpisodeA digital 'vaccine' for Log4Shell [ML BSide]A digital 'vaccine' for Log4Shell [ML BSide]Advertising Inquiries: https://redcircle.com/brands
- EpisodeShawn Carpenter: A Cyber ViglianteShawn Carpenter: A Cyber ViglianteAdvertising Inquiries: https://redcircle.com/brands
- EpisodeRansomware Attackers Don’t Take Holidays [ML B-Side]Ransomware Attackers Don’t Take Holidays [ML B-Side]Advertising Inquiries: https://redcircle.com/brands
- EpisodeWeev, Part 2The Electronic Frontier Foundation, long time critics of the Computer Fraud and Abuse Act, followed Weev's trial - but did not get involved. For the appeal, however, the organization decided to step it....
- EpisodeWeev, Part 1Much like Aaron Swartz did, Andrew "weev" Auernheimer fought against the Computer Fraud and Abuse Act, a law both men belived to be dangerous and unjust. But unlike Swartz, the internet's own boy,...
- EpisodeCuckoo Spear [B-Side]APT-10 is a Chinese nation-state threat actor that in recent years has been targeting Japanese IT & Instrastructure organizations using a sophisticated backdoor malware known as LODEINFO. Recently, Jin...
- EpisodeThe Man Who Went To War With Anonymous - And LostAaron Barr was en-signals intelligence officer specializing in analytics. As part of HBGary Federal, he came up with a plan to unmask the key leaders of Anonymous, the infamous hacker collective. People who...
- EpisodeWhat Can Organizations Learn from "Grim Beeper"? [B-Side]On 17 and 18 of September 2024, thousands of pagers and hand held radio devices used by Hezbollah, exploded simultaneously across Lebanon and Syria, killing at least 42 terrorists and wounding more than...
- EpisodeThe Fappening/CelebgateCould thousands of people keep a secret? Common sense says no—secrets spread, and people talk. But for over a decade, from 2006 to 2017, a website managed to stay under law enforcement’s radar, despite the...
- EpisodeOperation Snow White, Part 2Scientology spies were trained in all covert operations techniques: surveillance, recruiting agents, infiltrating enemy lines, and blackmail. However, a suspicious librarian and a determined FBI agent brought...
- EpisodeOperation Snow White, Part 1In 1963, the FDA raided the headquaters of a budding new and esoteric religion - The Church of Scientology. In response to this and similar incidents to come, the church's founder - an eccentric science...
- EpisodeCaught in the Crossfire: Infighting and Treason in Russia’s Cyber WorldOn Dec. 5, 2016, two senior Russian Intelligence officers and two civilians were arrested and accused of treason. A few weeks later, when Western journalists were finally able to speak with the men’s lawyers,...
- EpisodeSNAP Fraud: Getting Rich by Stealing from the PoorSNAP - better known as food stamps - goes back to the Great Depression. ,The physical stamps were replaced with EBT cards in the 1990s, but since these cards are without the secure EMV chip techonolgy,...
- EpisodeThe Hollywood Con Queen, Part 2Nicole Kotsianas, an investigator with K2 Intelligence, made it her personal mission to hunt down the Hollywood Con Queen, who crulley tormented her victioms and shattered their dreams. Nicole's efforts...
- EpisodeThe Hollywood Con Queen, Part 1In 2015, two aspiring script writers flew to Indonesia to meet with executives of a large Chinese film corporation. It was a trap: the Hollywood Con Queen not only coned them out of tens of thousands of...
- EpisodeThe Doomed Queen’s Secret CiphersIn the pre-internet era, encryption was a matter of life and death, and the motives behind these ciphers were varied and complex. Discover how George Lasry, a modern codebreaker, uncovered the secrets of...
- EpisodeWhy Did People Write Viruses In The 80s & 90s?Why did people write malware in the pre-internet days? Back then, there was no way to make money by writing malware. So why write them in the first place? The lack of a financial motivation meant that virus...
- EpisodeTay: A Teenage Bot Gone RogueTay: A Teenage Bot Gone RogueAdvertising Inquiries: https://redcircle.com/brands