Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
headphones
Malicious Life

Malicious Life

Malicious Life

Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.

5 Listeners

bookmark
Share icon

All episodes

Best episodes

Top 10 Malicious Life Episodes

Goodpods has curated a list of the 10 best Malicious Life episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to Malicious Life for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite Malicious Life episode by adding your comments to the episode page.

Malicious Life - Cyberbunker, Part 1

Cyberbunker, Part 1

Malicious Life

play

01/02/23 • 27 min


Sven Kamphuis and Herman Johan Xennt are quite dissimilar: one is young, the other is old, one is a Freedom Fighter, the other a businessman. In 1996, their unlikely partnership coalesced around a mutual deep hatred towards authority – and around a very unusual building: a Cold-War era nuclear bunker.

2 Listeners

bookmark
plus icon
share episode
Malicious Life - Cyberbunker, Part 2

Cyberbunker, Part 2

Malicious Life

play

01/10/23 • 31 min


Spamhaus’s decision to add Cyberbunker to its list of Spam sources led the Stophaus coalition to initiate a DDoS attack later dubbed “The attack that almost broke the Internet.” The fallout from this attack led to Cyberbunker relocating to a bunker in Germany – but it was the involvement of an Irish drug lord known as ‘The Penguin’ that led to the bullet-proof hosting company’s downfall.

2 Listeners

comment icon

1 Comment

1

bookmark
plus icon
share episode
Malicious Life - You Should Be Afraid of SIM Swaps
play

01/23/23 • 33 min


If SIM swap stories ever make the news, almost uniformly, they focus on people who lost a lot of money. But SIM swaps also take a psychological toll. Getting cut off from the grid all of a sudden, not knowing why, not being able to call for help. Even when it’s over, you never know if your attackers — whoever they are — will come back again.

1 Listener

bookmark
plus icon
share episode

Nobody likes cheaters, especially in video games: we play games to have fun, and nothing hurts the joy of playing a good game more than losing to a cheater. That is why EA is not the only publisher to implement kernel-mode anti-cheat software in their games: League of Legends and Valorant, for example, use similar software. Yet some people warn that installing such kernel-level systems is extremely dangerous. So, what’s the problem with kernel-mode anti-cheat software?

1 Listener

bookmark
plus icon
share episode
Malicious Life - How Netflix Learned Cloud Security [ML B-Side]
play

12/26/22 • 20 min


2011 was a pivotal year for Netflix: the now hugely successful company was then in the midst of a formidable transformation, changing from a mail-based DVD rental service to the modern streaming service that it is today. It was at this crucial point in the company’s history that Jason Chan, our guest in this episode, was hired by Netflix to lay the foundations for its cloud security protocols. Nate Nelson, our Sr. Producer, spoke with Jason about the decade he spent at the company, what he learned during his tenure there, and the ideas that took shape at that time, such as Chaos Engineering.

1 Listener

bookmark
plus icon
share episode
Malicious Life - The Y2K Bug, Part 2

The Y2K Bug, Part 2

Malicious Life

play

04/16/24 • 31 min

In the waning years of the 20th century, amid growing anxieties about the turn of the millennium, one man, Robert Bemer, observed the unfolding drama from his remote home on King Possum Lake. A revered figure in computing, Bemer had early on flagged a significant, looming issue known as the Y2K bug, which threatened to disrupt global systems as calendars rolled over to the year 2000. This episode delves into Bemer's life during this critical period, exploring his predictions, the ensuing global frenzy to avert disaster, and the disparate views on whether the billions spent in prevention were justified or merely a response to a misunderstood threat.


Advertising Inquiries: https://redcircle.com/brands

1 Listener

bookmark
plus icon
share episode
Malicious Life - The Russian Business Network
play

11/14/22 • 31 min


In 2006 the Russian Business Network pivoted its business: the once legitimate ISP became a ‘bullet-proof’ hosting service, catering to the needs of cybercriminals. It quickly became the largest player in the Russian cybercrime landscape, with ~60% of all cybercrime activity related to Russia connected to it in some way. Following the Russian government’s years-old tradition of collaborating with organized crime, it’s no wonder that the Russian Business Network quickly became Putin’s informal cyber attack arm.

1 Listener

bookmark
plus icon
share episode
Malicious Life - Moonlight Maze

Moonlight Maze

Malicious Life

play

12/11/23 • 35 min

When investigators discovered in 1996 that US military networks were being extensively hacked, they didn't realize they were witnessing the birth of what would become Russia's formidable Turla APT espionage group. We uncover the 20-year metamorphosis of this original group of hackers into one of the most sophisticated and dangerous state-sponsored threats that's still active today.


Advertising Inquiries: https://redcircle.com/brands

1 Listener

bookmark
plus icon
share episode

When it was founded in 2011, Norse Corp. – which described itself as “the world’s largest dedicated threat intelligence network” – had everything a promising startup could wish for: a charismatic and experienced founder, a rare and valuable technology, and few tens of millons of dollars from investors. Less than six years later, it all came crashing down in the most horrible death a business can experience. What went wrong in Norse Corp.?

1 Listener

bookmark
plus icon
share episode
Malicious Life - FBI vs. REvil [ML BSide]
play

01/16/23 • 21 min


A year ago we told you the story of Kaseya: an IT solutions company that was breached on July 2021, and its servers were used to spread ransomware to an estimated 800 to 1500 small to medium-sized businesses.
Nate Nelson, our Sr. producer, spoke with Rich Murray, who leads the FBI’s North Texas Cyber unit, about how the Federal Bureau of Investigations dealt with another attack by REvil – this time against the Texas government – and how they managed to figure out who was behind it.

1 Listener

bookmark
plus icon
share episode

Show more best episodes

Toggle view more icon

FAQ

How many episodes does Malicious Life have?

Malicious Life currently has 429 episodes available.

What topics does Malicious Life cover?

The podcast is about Podcasts and Technology.

What is the most popular episode on Malicious Life?

The episode title 'Cyberbunker, Part 1' is the most popular.

What is the average episode length on Malicious Life?

The average episode length on Malicious Life is 33 minutes.

How often are episodes of Malicious Life released?

Episodes of Malicious Life are typically released every 6 days, 14 hours.

When was the first episode of Malicious Life?

The first episode of Malicious Life was released on Jun 28, 2017.

Show more FAQ

Toggle view more icon

Comments