Malicious Life

A podcast
 2 people rated this podcast

Best Episodes of Malicious Life

Mark All
Search Episodes...
A rare, inside look, at how Cybereason’s researchers were able to uncover one of the largest Cyber Espionage campaigns ever discovered, against multiple Telecommunications companies around the world. The post Operation SoftCell appeared first on Malicious Life.
In 2015 Bastian Obermayer, an investigative journalist for the Süddeutsche Zeitung, received a message every journalist dreams of: the biggest leak in journalism history. But dealing with the massive 2.7 Terabyte data-dump, 11.5 million documents – while making sure his source’s identity could not be uncovered, turned out to be a huge challenge. The post Protecting The “Panama Papers” Whistleblower appeared first on Malicious Life.
In 1983, the US got word that an ally’s embassy – probably France’s – was bugged by the Soviets. This reports triggered Operation GUNMAN: a complete removal & de-bugging of *all* electronic devices in the US embassy in the USSR. This secretive operation resulted in a surprising discovery – and made the NSA what it is today. The post Op. GUNMAN & The World’s First Keylogger appeared first on Malicious Life.
Georgia’s elections infrastructure had been hacked multiple times since 2014 – both by Russian Intelligence and local White Hat hackers. The upcoming elections are plagued with uncertainty – and uncertainty and democracy go together like wet hands and electrical outlets. The post Election Hacking, Part 2 appeared first on Malicious Life.
In this episode we’re talking about just one state. One which, depending on which way it leans, might bring the entire electoral college with it. One which, as of this writing, is absolutely, positively, neck and neck. Dead heat. A few votes one way or the other could swing it. In other words: this is the kind of state that cannot afford to be hacked. But might be. The post Election Hacking, Part 1 appeared first on Malicious Life.
About a year ago, Cybereason’s Managed Detection and Response team (aka MDR) stumbled upon a attack involving Russian cybercriminals, POS devices and an entire new family of previously undiscovered malware. The post MDR Vs. The TrickBot Gang appeared first on Malicious Life.
Between 2010 and 2014, Yahoo was hacked numerous times – each time setting a new ‘world record’ for the largest data breach in history. It also hid those breaches from it’s investors, customers and the SEC. The post Yahoo’s Ugly Death, Part 2 appeared first on Malicious Life.
When Marissa Mayer joined Yahoo as CEO, the company’s stock rose 2% the day of the announcement. But the new CEO was basically initiated into her job by a major data breach – and the worst was yet to come. The post Yahoo’s Ugly Death, Part 1 appeared first on Malicious Life.
Falun Gong is a religious movement heavily persecuted in China. In 2017, members of the movement sued Cisco Systems for aiding and abetting the Chinese government in this persecution – since Cisco helped China erect ‘Golden Shield'”: the massive Chinese IT infrastructure project which combined internet censorship and pervasive Chinese state cyberspying. The post The Great Firewall of China, Pt. 2: Cisco’s Trial appeared first on Malicious Life.
The Great Firewall is just mind-bogglingly big, repressing freedom of speech and information for over 800 million Chinese internet users every year. The Great Firewall is so big that it’s worth asking: how did the Chinese manage to build it in the first place? 20 years ago, our info-sec technology was much less advanced than it is today. China was a second-rate technology power, not even comparable to their position today. Most of all: a firewall, like the one they proposed, had never existed before–or, for that matter, since. How, then, did they pull it off? The post The Great Firewall of China – Part 1 appeared first on Malicious Life.
Ran & Israel Barak, Cybereason’s CISO, discuss the latest development in ransomware evolution: multi-stage attacks in which the attackers infiltrate the target network, steal data and gather intelligence – before detonating the ransomware to cause maximal denial-of-service to the victim organization. What does this new tactic mean for the use of backups as a mean to mitigate the risk from ransomware? This episode was recorded live on July 29th, 2020. The post Multi-Stage Ransomware (Live!) appeared first on Malicious Life.
Hackers keep modifying and improving their methods of operations. Assaf Dahan, Sr. Director and Head of Threat Research at Cybereason, tells us about the recent shift to Blackmail – as a way to pressure Ransomware victims to pay the ransom. Assaf’s Webinar will take place on July 14th, 2020. Register to the webinar at https://www.cybereason.com/ransomware. The post From Ransomware To Blackmail, With Assaf Dahan appeared first on Malicious Life.
On August 1st, 2017, Bitcoin forked. But it wasn’t the SegWit2x fork everyone was talking about – It was a different fork, supported by a coalition of miners who, in doing what they were doing, were essentially ditching SegWit2x in favor of their own scaling solution. What happened here? Who betrayed SegWit2x? The post SegWit2x, Part 3 appeared first on Malicious Life.
SegWit2x was proposed as a solution to Bitcoin’s network problems – but some people in the anti-2x movement claimed that it is nothing less than a cyber-attack: a 51% attack on Bitcoin, to be precise. This is getting ugly. The post SegWit2x, Part 2 appeared first on Malicious Life.
A black market economy has developed around Fortnite’s in-game currency. Cyber criminals are hacking user accounts, juicing credit cards, and selling virtual currency for real-life dollars and cents. To ensure fun and safety for players, the cycle must be stopped. CPRadio Podcast is available at: https://research.checkpoint.com/category/cpradio/ The post Hacking Fortnite Accounts (CPRadio) appeared first on Malicious Life.
In 2017, Bitcoin was winning. Money, attention, success poured out of every seam. It appeared that a golden age had dawned. But just under the surface, the network was teetering on the verge of collapse. Technical problems that were just nuisances when the community was small now became glaring and potentially lethal. Debates among tight communities of knowledgeable users and developers ballooned into full-on internet wars. Factions hardened. Heroes became enemies of the people. The post SegWit2x, or – The Year Bitcoiners Will Never Forget, Part 1 appeared first on Malicious Life.
Amit Serper was doing a routine inspection on a client’s network, when he came across a suspicious-looking pen-testing tool, exhibiting RAT-like behavior. We’ll follow Amit’s investigation, and in the process learn the basics of cyber research. The post No Honor Among Thieves appeared first on Malicious Life.
The COVID19 pandemic forced organizations to transition to a work-from-home model – and many of them were unprepared for such a radical departure from the ‘normal’ security perimeter. Sam Curry, Cybereason’s CSO, talks to Ran about the lessons learned from COVID19, and what steps should Cyber Security professionals take in order to be ready for a future outbreak. Link To Cybereason’s Guide on How To Maintain Secure Business Continuity With A Remote Workforce: http://malicious.life/remotesecurity The post Cybersecurity during a crisis: how remote work has impacted security – With Sam Curry appeared first on Malicious Life.
At the end of our last episode, it kind of seemed like Huawei–the Chinese telecommunications company accused of aiding in state cyber spying–was completely innocent. They were being accused of crimes they may not have committed, based on evidence that largely did not exist. The conspiracies around them seemed unfair at best, malicious at worst. But there’s another side to this story, of course. Huawei didn’t end up on people’s radars for no reason. They’ve earned their notoriety. The post The Problem With Passwords appeared first on Malicious Life.
At the end of our last episode, it kind of seemed like Huawei–the Chinese telecommunications company accused of aiding in state cyber spying–was completely innocent. They were being accused of crimes they may not have committed, based on evidence that largely did not exist. The conspiracies around them seemed unfair at best, malicious at worst. But there’s another side to this story, of course. Huawei didn’t end up on people’s radars for no reason. They’ve earned their notoriety. The post The Huawei Ban, Part 2 appeared first on Malicious Life.
Over the past 20 years, western governments have accused Huawei of everything from IP theft to financial fraud to cyber spying. Often, these claims are made either with no evidence, or only circumstantial evidence. Is Huawei really a national security threat, or are they a political scapegoat? The post The Huawei Ban, Part 1 appeared first on Malicious Life.
On November 22nd, 1987, a hacker took over the signals of two Chicago-area TV stations and broadcast two bizarre and somewhat vulgar messages. In this episode we explore this notorious hack, and its implications on the nature of hacking in general. The post The Max Headroom Signal Hijack appeared first on Malicious Life.
The fact that ToTok came out of the United Arab Emirates is no surprise: in recent years, the UAE has deployed some of the most sophisticated mobile device exploits ever seen. But they got a lot of help from one country in particular… today’s episode is about the UAE. But it’s really about the Americans. The post ToTok, Part 3: Becoming a Spyware Superpower appeared first on Malicious Life.
An episode from Darknet Diaries! The story of how the US cyber command attacked ISIS – as told by the commander of that mission. An extremely rare peak at the inner working of the US cyber command! Darknet Diaries’s homepage is at darknetdiaries.com. The post Operation Glowing Symphony appeared first on Malicious Life.
The corporate structure supporting ToTok involved at least half a dozen real companies, shell companies and intelligence groups, with the individuals who actually operated the app being hidden behind other individuals given sinecure jobs and ponied around to the public as the supposed developers. Ultimately, though, every path that begins with ToTok ends with one very rich and powerful man at the heart of the Emirati state. His name is Sheikh Tahnoon bin Zayed al-Nahyan. The post ToTok, Part 2: The Masterminds of Mobile Malware appeared first on Malicious Life.
Rate Podcast

Share This Podcast

Recommendation sent

Followers

14

Join Podchaser to...

  • Rate podcasts and episodes
  • Follow podcasts and creators
  • Create podcast and episode lists
  • & much more

Podcast Details

Created by
Cybereason
Podcast Status
Active
Started
Jun 28th, 2017
Latest Episode
Nov 22nd, 2020
Release Period
2 per month
Episodes
102
Avg. Episode Length
34 minutes
Explicit
No
Order
Episodic
Language
English

Podcast Tags

Do you host or manage this podcast?
Claim and edit this page to your liking.
Are we missing an episode or update?
Use this to check the RSS feed immediately.