184 episodes

The wildest computer hacks you could ever imagine. 500 million dollars disappear into thin air. Two teenagers disrupt a rocket launch. Foreign spies rig an election. Hosted by author and cybersecurity expert Ran Levi, Malicious Life unravels complex, dramatic historical events, with interviews from people who were actually there. Lock your door, wipe your hard drive, and come listen to fascinating stories from the cyber underground.

Malicious Life Cybereason

    • Technology
    • 4.9 • 109 Ratings

The wildest computer hacks you could ever imagine. 500 million dollars disappear into thin air. Two teenagers disrupt a rocket launch. Foreign spies rig an election. Hosted by author and cybersecurity expert Ran Levi, Malicious Life unravels complex, dramatic historical events, with interviews from people who were actually there. Lock your door, wipe your hard drive, and come listen to fascinating stories from the cyber underground.

    “King Kimble”: Kim DotCom

    “King Kimble”: Kim DotCom

    The US government says that Kim Schmitz, better know as Kim DotCom, is the leader of a file sharing crime ring. He sees himself as a an internet freedom fighter: a fugitive on the run from vindictive overly-powerful governments. Can King Kimble escape the wrath of the USA?

    • 32 min
    Hacking Multi-Factor Authentication [ML B-side]

    Hacking Multi-Factor Authentication [ML B-side]

    Multi-Factor Authentication (MFA) is usually considered a better solution for authentication than just using passwords. But Roger Grimes, a veteran security professional, and a Data-Driven Defense Evangelist claims that the sense of security current MFA solutions provides us - is false.

    • 26 min
    Hacking Language Models

    Hacking Language Models

    Language models are everywhere today: they run in the background of Google Translate and other translation tools; they help operate voice assistants like Alexa or Siri; and most interestingly, they are available via several experiential projects trying to emulate natural conversations, such as OpenAI’s GPT-3 and Google’s LaMDA. Can these models be hacked to gain access to the sensitive information they learned from their training data?

    • 27 min
    Software Bill of Materials (SBOM) [ML B-side]

    Software Bill of Materials (SBOM) [ML B-side]

    In May 2021, Following the Solarwinds and the Colonial Pipeline attacks, the Biden administration published a presidential Executive Order mandating the use of SBOMs - Software Bill of Materials - in all government agencies. What are SBOMs and how useful are they in cybersecurity? Nate Nelson talks to two experts: Allan Friedman (CISA) and Chris Blask (Cybeats).

    • 25 min
    Leo Kuvayev– The Czar of Spammers

    Leo Kuvayev– The Czar of Spammers

    Criminals, particularly cyber criminals, aren’t “good” people; in most cases, they do have their own personal boundaries. Every once in a while, you encounter a criminal who’s different. Someone who seems not to have limits at all. A ruthless person, for whom the goal truly justifies the means. Leo Kuvayev is that kind of a person - and that made him so successful as a cyber-criminal. But even a genius criminal can go just one step too far.

    • 32 min
    “A CISO’s Nightmare”: Israel Baron on Railway Security [ML B-side]

    “A CISO’s Nightmare”: Israel Baron on Railway Security [ML B-side]

    Railway systems are a mess of old systems built on top of older systems, running ancient operating systems and exposing their most sensitive inner workings to commuters via WIFI. Why are railway systems so difficult to defend, and what are the most probable attack vectors against them? Nate Nelson, our senior producer, speaks with Israel Baron, Israel Railway's first ever CISO.

    • 26 min

Customer Reviews

4.9 out of 5
109 Ratings

109 Ratings

itsmeagain20 ,

👍

Another fantastic episode

Don't like to complain, but... ,

Fantastic and really insightful podcast.

My view is that Malicious Life should be essential listening for anybody interested in a cybersecurity career.

picky neek ,

significantly superior podivar served on silver platters over crushed ice

After listening to every single one of Malicious Life podcasts (some more than once) its clear to me how important a resource this pod constitutes. I salute all the people involved ... the service provided here is second to none.

You Might Also Like

VICE
Jack Rhysider
CyberWire Inc.
Graham Cluley & Carole Theriault
CyberWire, Inc.
The Record by Recorded Future