Cover image of Malicious Life

Malicious Life

Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.

Ranked #1

Podcast cover

Spam Empire

Spam Empire

In this episode of Malicious Life, we take a look at one of the oldest forms of criminal activity on the web- the spam e... Read more

6 Jul 2017

31mins

Ranked #2

Podcast cover

Operation Aurora, Part 1

Operation Aurora, Part 1

In January 2010, Google revealed in its blog that it was hacked. This attack, since known as Operation Aurora, is attrib... Read more

12 Sep 2019

34mins

Similar Podcasts

Ranked #3

Podcast cover

Gozi, Part 1: The Rise of Malware-as-a-Service

Gozi, Part 1: The Rise of Malware-as-a-Service

Nikita Kuzmin could have been a whiz programmer or a CEO of a successful startup. But as a teen in Moscow, he fell in wi... Read more

31 Oct 2019

29mins

Ranked #4

Podcast cover

GAN and Deep Fakes, Part 1

GAN and Deep Fakes, Part 1

Over the past two years, the internet has been inundated with celebrity Deep Fake videos of all kinds: Obama, Putin, and... Read more

19 Dec 2019

43mins

Most Popular Podcasts

Ranked #5

Podcast cover

Big Cannons

Big Cannons

2016 is known throughout the circles of information security as “The Year of The DDoS Attacks”, and rightfully so: 5 lar... Read more

24 Jul 2017

44mins

Ranked #6

Podcast cover

Triton: A Malware Designed To Kill Humans, Part 1

Triton: A Malware Designed To Kill Humans, Part 1

Industrial Security requires a different skill set–really, an entirely different mindset than working in IT does. In thi... Read more

16 Jan 2020

36mins

Ranked #7

Podcast cover

The Equifax Data Breach Pt. I: A Big Data Bubble

The Equifax Data Breach Pt. I: A Big Data Bubble

In their 120 year history, Equifax never sold anything, or provided any service to ordinary folks – except collect DATA.... Read more

27 Mar 2019

3mins

Ranked #8

Podcast cover

Hell to Pay

Hell to Pay

A global FBI manhunt for the world’s most wanted cyber criminal ends in the capture of a massive criminal network, but w... Read more

21 Aug 2017

37mins

Ranked #9

Podcast cover

The Ashley Madison Hack, Part 1

The Ashley Madison Hack, Part 1

When Ashley Madison got hacked, it made international headlines. Why? Because it wasn’t just a major event. It demonstra... Read more

19 Sep 2018

29mins

Ranked #10

Podcast cover

Super Spies

Super Spies

The NSA has many means at its disposal. But how does it use these means, and for what goals? Discover the (literally) se... Read more

7 Feb 2018

34mins

Ranked #11

Podcast cover

How is Spyware Legal?

How is Spyware Legal?

Today’s Cyber Stalkers have free access to almost government-grade spyware software with which they can terrorize their ... Read more

17 Oct 2019

41mins

Ranked #12

Podcast cover

The Target Hack

The Target Hack

If movies have taught me anything, it’s that if you want to rob a bank, you dress as the cleaning crew. The people behin... Read more

23 Aug 2018

33mins

Ranked #13

Podcast cover

The Roots of Evil

The Roots of Evil

WannaCry’s widespread cyber attack on more than 200,000 computers all over the world made headlines – but only a few peo... Read more

7 Aug 2017

30mins

Ranked #14

Podcast cover

DeCSS: Hackers Vs Hollywood

DeCSS: Hackers Vs Hollywood

Twenty years ago, a 15-years old Norwegian kid was put on trial for breaking the DVD Copy Prevention system. His case sp... Read more

13 Mar 2019

44mins

Ranked #15

Podcast cover

The Fall Of Mt. Gox – Part 1

The Fall Of Mt. Gox – Part 1

In its prime, Mt. Gox was essentially the place where Bitcoin happened. But for two years, Mt. Gox was imploding from th... Read more

22 Jan 2019

49mins

Ranked #16

Podcast cover

What’s the problem with Cyber Insurance?

What’s the problem with Cyber Insurance?

Thousands of companies are losing millions of dollars to cyber attacks. An insurance seems an ideal solution to their wo... Read more

21 Nov 2019

35mins

Ranked #17

Podcast cover

Stuxnet, part 1

Stuxnet, part 1

Where armies once fought with bullets and bombs, they now engage in clandestine, invisible warfare. In 2010 a virus was ... Read more

30 Aug 2017

33mins

Ranked #18

Podcast cover

The Ashley Madison Hack, Part 2

The Ashley Madison Hack, Part 2

On the second installment of our Ashely Madison hack retelling, we look at the fallout of one of the hack, and the peopl... Read more

4 Oct 2018

32mins

Ranked #19

Podcast cover

Human Side Channels

Human Side Channels

Even the best hackers are human, and humans are inescapably unique. Forensic Linguistics, Behavioral Signatures and Cult... Read more

5 Dec 2019

33mins

Ranked #20

Podcast cover

Deep Fakes, Part 2: Man Vs. Machine

Deep Fakes, Part 2: Man Vs. Machine

Deep Fakes are set to revolutionize content creation, but alongside this technology’s benefits, it also has the potentia... Read more

2 Jan 2020

37mins

“Podium: AI tools for podcasters. Generate show notes, transcripts, highlight clips, and more with AI. Try it today at https://podium.page”