
Malicious Life
Malicious Life
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.

5 Listeners
All episodes
Best episodes
Top 10 Malicious Life Episodes
Goodpods has curated a list of the 10 best Malicious Life episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to Malicious Life for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite Malicious Life episode by adding your comments to the episode page.

Cyberbunker, Part 1
Malicious Life
01/02/23 • 27 min
Sven Kamphuis and Herman Johan Xennt are quite dissimilar: one is young, the other is old, one is a Freedom Fighter, the other a businessman. In 1996, their unlikely partnership coalesced around a mutual deep hatred towards authority – and around a very unusual building: a Cold-War era nuclear bunker.

2 Listeners

Cyberbunker, Part 2
Malicious Life
01/10/23 • 31 min
Spamhaus’s decision to add Cyberbunker to its list of Spam sources led the Stophaus coalition to initiate a DDoS attack later dubbed “The attack that almost broke the Internet.” The fallout from this attack led to Cyberbunker relocating to a bunker in Germany – but it was the involvement of an Irish drug lord known as ‘The Penguin’ that led to the bullet-proof hosting company’s downfall.

2 Listeners
1 Comment
1

The (Other) Problem with NFTs
Malicious Life
02/06/23 • 27 min
Physical artworks in museums are usually well-guarded – but digital artworks are something else entirely: in 2021 alone, scammers successfully stole 100 million dollars worth of non-fungible tokens, or NFTs. Yet blockchain technology, where most NFTs live – is one of the most secure technologies in history. Why, then, are NFT collectors keep getting hacked?

1 Listener
![Malicious Life - How Netflix Learned Cloud Security [ML B-Side]](https://storage.googleapis.com/goodpods-images-bucket/episode_images/38efbfdf4df5e3b250cb197edf277f56000b402e308fb0c93161095d4805ff3b.avif)
How Netflix Learned Cloud Security [ML B-Side]
Malicious Life
12/26/22 • 20 min
2011 was a pivotal year for Netflix: the now hugely successful company was then in the midst of a formidable transformation, changing from a mail-based DVD rental service to the modern streaming service that it is today. It was at this crucial point in the company’s history that Jason Chan, our guest in this episode, was hired by Netflix to lay the foundations for its cloud security protocols. Nate Nelson, our Sr. Producer, spoke with Jason about the decade he spent at the company, what he learned during his tenure there, and the ideas that took shape at that time, such as Chaos Engineering.

1 Listener

You Should Be Afraid of SIM Swaps
Malicious Life
01/23/23 • 33 min
If SIM swap stories ever make the news, almost uniformly, they focus on people who lost a lot of money. But SIM swaps also take a psychological toll. Getting cut off from the grid all of a sudden, not knowing why, not being able to call for help. Even when it’s over, you never know if your attackers — whoever they are — will come back again.

1 Listener
![Malicious Life - SIM Swapping Follow Up [ML B-Side]](https://storage.googleapis.com/goodpods-images-bucket/episode_images/38efbfdf4df5e3b250cb197edf277f56000b402e308fb0c93161095d4805ff3b.avif)
SIM Swapping Follow Up [ML B-Side]
Malicious Life
01/30/23 • 18 min
Today we’re bringing back Haseeb Awan, the founder of Efani Secure Mobile – a bespoke cybersecurity-focused phone service, protecting high-risk individuals against mobile hacks. Haseeb will delve into the technicalities of SIM swapping, explaining the various techniques that hackers use to carry out this fraudulent activity. He will also provide insights into what telecommunication companies can do to prevent SIM swapping and what steps individuals can take to protect themselves from falling victim to this crime.

1 Listener

Norse Corp.: How To NOT build a cybersecurity startup
Malicious Life
11/28/22 • 39 min
When it was founded in 2011, Norse Corp. – which described itself as “the world’s largest dedicated threat intelligence network” – had everything a promising startup could wish for: a charismatic and experienced founder, a rare and valuable technology, and few tens of millons of dollars from investors. Less than six years later, it all came crashing down in the most horrible death a business can experience. What went wrong in Norse Corp.?

1 Listener

The Russian Business Network
Malicious Life
11/14/22 • 31 min
In 2006 the Russian Business Network pivoted its business: the once legitimate ISP became a ‘bullet-proof’ hosting service, catering to the needs of cybercriminals. It quickly became the largest player in the Russian cybercrime landscape, with ~60% of all cybercrime activity related to Russia connected to it in some way. Following the Russian government’s years-old tradition of collaborating with organized crime, it’s no wonder that the Russian Business Network quickly became Putin’s informal cyber attack arm.

1 Listener
![Malicious Life - FBI vs. REvil [ML BSide]](https://storage.googleapis.com/goodpods-images-bucket/episode_images/38efbfdf4df5e3b250cb197edf277f56000b402e308fb0c93161095d4805ff3b.avif)
FBI vs. REvil [ML BSide]
Malicious Life
01/16/23 • 21 min
A year ago we told you the story of Kaseya: an IT solutions company that was breached on July 2021, and its servers were used to spread ransomware to an estimated 800 to 1500 small to medium-sized businesses.
Nate Nelson, our Sr. producer, spoke with Rich Murray, who leads the FBI’s North Texas Cyber unit, about how the Federal Bureau of Investigations dealt with another attack by REvil – this time against the Texas government – and how they managed to figure out who was behind it.

1 Listener
![Malicious Life - The Problem With Kernel-Mode Anti-Cheat Software [ML B-Side]](https://storage.googleapis.com/goodpods-images-bucket/episode_images/38efbfdf4df5e3b250cb197edf277f56000b402e308fb0c93161095d4805ff3b.avif)
12/06/22 • 33 min
Nobody likes cheaters, especially in video games: we play games to have fun, and nothing hurts the joy of playing a good game more than losing to a cheater. That is why EA is not the only publisher to implement kernel-mode anti-cheat software in their games: League of Legends and Valorant, for example, use similar software. Yet some people warn that installing such kernel-level systems is extremely dangerous. So, what’s the problem with kernel-mode anti-cheat software?

1 Listener
Show more best episodes

Show more best episodes
Featured in these lists
FAQ
How many episodes does Malicious Life have?
Malicious Life currently has 430 episodes available.
What topics does Malicious Life cover?
The podcast is about Podcasts and Technology.
What is the most popular episode on Malicious Life?
The episode title 'Cyberbunker, Part 1' is the most popular.
What is the average episode length on Malicious Life?
The average episode length on Malicious Life is 33 minutes.
How often are episodes of Malicious Life released?
Episodes of Malicious Life are typically released every 6 days, 14 hours.
When was the first episode of Malicious Life?
The first episode of Malicious Life was released on Jun 28, 2017.
Show more FAQ

Show more FAQ