The wildest computer hacks you could ever imagine. 500 million dollars disappear into thin air. Two teenagers disrupt a rocket launch. Foreign spies rig an election. Hosted by author and cybersecurity expert Ran Levi, Malicious Life unravels complex, dramatic historical events, with interviews from people who were actually there. Lock your door, wipe your hard drive, and come listen to fascinating stories from the cyber underground.
Shutting Down The Internet in 30 Minutes: Chris Wysopal [ML B-Side]
Chris Wysopal, a cyber security pionneer and one of L0pht's founding members, talks about the group's 1998 testimony in the Senate, how they used shaming to force cooporations to fix their software, and the (not so fortunate) consequenses of the sale to @stake.
‘L0pht’, Part 2 – The End
In the early days, the L0pht guys tinkered with what they already had laying around, or could find dumpster diving. But things change, of course. By the end of the ‘90s many of the L0pht hackers had quit their day jobs, incorporating under the name “L0pht Heavy Industries”, and moving into a nicer space, the “new L0pht.” Seven days after Y2K, they merged with @stake, an internet security startup. It was a signal that hacking wasn’t just for the kids anymore.
The Story of ‘L0pht’, Part 1
'L0pht', or 'L0pht Heavy Indutries', was one of the most infuencial hacker collectives of the 90's: it's members were even invited to testify infront of the Congress on the current state of Internet security. In this episode, four L0pht's founding members - Count Zero, Weld Pond, Kingpin & Dildog - talk about the begining and influence of the L0pht on cyber security.
The MS Exchange Hack [ML B-Side]
Israel Barack, Cybereason's CISO and an expert on cyber-warfare, on the recent MS Exchange hack that hit thousands of organizations worldwide: what happened, what were the vulenrabilites expolited in the attack - and what can we do to defend against such attacks in the future.
NotPetya, Part 2
When the NotPetya pandemic hit, Cyber Analyst Amit Serper was sitting in his parents' living room, getting ready to go out with a few friends. He didn't have most of his tools with him, but he nonetheless took a swipe at the malware. An hour later, he held the precious vaccine.
NotPetya, Part 1
On June 28th, 2017, millions of Ukranians were celebrating 'Constitution Day.' Their national holiday turned into a nightmare, as tens of thousands of computers all over the country were infected by a mysterious malware. By that afternoon, the cyber-pandemic was already going global.
Customer ReviewsSee All
Great addition to my rotation
I thought I had run the gamut of cyber security podcasts. Some I am still subscribed to and others have been let go. But as I was looking for some more episodes on stuxnet, I discovered malicious life! I’ve now binged 5 different episodes of theirs and I can’t wait to listen to more. Well done and keep up the good work!
Please stop making Covid analogies
The Covid pandemic has been a traumatic roller-coaster for many people. I personally like to escape the constant stream of Covid news with podcasts that (should) tell stories of unrelated origin. However, Ran, to my dismay your incessant use of ‘pandemic’ and ‘vaccine’ and ‘cure’ is quite triggering.
Using Covid as an analogous protagonist in your stories is lazy in my opinion, and it’s anxiety inducing for me. It’s particularly bad in Not Petya parts 1 and 2, but sprinkled in throughout the episodes in 2020.
Malicious life was once a glorious escape from the incessant Covid news cycle - and I’m sad to report that even a cyber security podcast such as this has fallen victim to the Covid narrative pandering seen almost everywhere these days. Please - stop with the pandemic dialogue - it’s triggering and immediately jolts me out of the story you’re trying to tell and back into the fear and anxiety of March 2021.
Good but stop upspeaking
YOU yell every OTHER WORD at the END of EACH sentence INDEED