Powered by RND
PodcastsTechnologyMalicious Life
Listen to Malicious Life in the App
Listen to Malicious Life in the App
(3,100)(247,963)
Save favourites
Alarm
Sleep timer

Malicious Life

Podcast Malicious Life
Malicious Life
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journal...
More

Available Episodes

5 of 265
  • Weev, Part 2
    The Electronic Frontier Foundation, long time critics of the Computer Fraud and Abuse Act, followed Weev's trial - but did not get involved. For the appeal, however, the organization decided to step it. But althought the EFF had some strong points against the CFAA - the justices, appearntly, had something very different on their mind. Advertising Inquiries: https://redcircle.com/brands
    --------  
    28:49
  • Weev, Part 1
    Much like Aaron Swartz did, Andrew "weev" Auernheimer fought against the Computer Fraud and Abuse Act, a law both men belived to be dangerous and unjust. But unlike Swartz, the internet's own boy, weev is an unapologetic troll who spread bile and chaos wherever he goes, a man who seemed to take pleasure in making others miserable. His fight raises a thorny question: when a bad person fights for a good cause, how should we feel about it?  Advertising Inquiries: https://redcircle.com/brands
    --------  
    29:56
  • Cuckoo Spear [B-Side]
    APT-10 is a Chinese nation-state threat actor that in recent years has been targeting Japanese IT & Instrastructure organizations using a sophisticated backdoor malware known as LODEINFO. Recently, Jin Ito & Loic Castel, researchers from Cybereason's IR Team, uncovered a new tool used by the group: NOOPDOOR, which incorporates highly sophisticated persistence mechanisms, allowing APT-10 to evade detection and remain inside enterprise networks for two or even three years. Advertising Inquiries: https://redcircle.com/brands
    --------  
    30:43
  • The Man Who Went To War With Anonymous - And Lost
    Aaron Barr was en-signals intelligence officer specializing in analytics. As part of HBGary Federal, he came up with a plan to unmask the key leaders of Anonymous, the infamous hacker collective. People who worked with Aaron warned him that his data was sub-par, but the determined vet claimed he had a strong "gut feeling" that he was on the right track.Advertising Inquiries: https://redcircle.com/brands
    --------  
    38:05
  • What Can Organizations Learn from "Grim Beeper"? [B-Side]
    On 17 and 18 of September 2024, thousands of pagers and hand held radio devices used by Hezbollah, exploded simultaneously across Lebanon and Syria, killing at least 42 terrorists and wounding more than 3,000. Devon Ackerman, Cybereason’s Global Head of Digital Forensic and Incident response and a former Special Agent at the FBI's Operational Technology Division, discusses the lessons organizations can learn from this ultra-sophisticated supply chain attack. How such traumatic events impact the mindset of hacked organizations, what kind of threat actors are capable of pulling off long-term attacks like these, and the three most important steps organizations can take to minimize the chance of a supply chain attack.Advertising Inquiries: https://redcircle.com/brands
    --------  
    35:51

More Technology podcasts

About Malicious Life

Podcast website

Listen to Malicious Life, Lex Fridman Podcast and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features

Malicious Life: Podcasts in Family

Radio
Social
v6.31.1 | © 2007-2024 radio.de GmbH
Generated: 12/11/2024 - 9:39:23 PM