All Episodes
Malicious Life — 265 episodes
Weev, Part 2
Weev, Part 1
Cuckoo Spear [B-Side]
The Man Who Went To War With Anonymous - And Lost
What Can Organizations Learn from "Grim Beeper"? [B-Side]
The Fappening/Celebgate
Operation Snow White, Part 2
Operation Snow White, Part 1
Caught in the Crossfire: Infighting and Treason in Russia’s Cyber World
SNAP Fraud: Getting Rich by Stealing from the Poor
The Hollywood Con Queen, Part 2
The Hollywood Con Queen, Part 1
The Doomed Queen’s Secret Ciphers
Why Did People Write Viruses In The 80s & 90s?
Section 230: The Law that Makes Social Media Great, and Terrible
What Happened at Uber?
The Nigerian Prince
Unmasking Secrets: The Rise of Open-Source Intelligence
The Source Code of Malicious Life
The Y2K Bug, Part 2
The Y2K Bug, Part 1
Can You Bomb a Hacker?
Kevin Mitnick, Part 2
Kevin Mitnick, Part 1
SIM Registration: Security, or Surveillance?
The Mariposa Botnet
The Real Story of Citibank’s $10M Hack
How to Hack Into Satellites
Moonlight Maze
Volt Typhoon
Is NSO Evil? Part 2
Is NSO Evil? Part 1
Should You Pay Ransomware Attackers? A Game Theory Approach
Silent Firewalls: The Underrepresentation of Women in Cyber
Operation Kudo
Can We Stop the AI Cyber Threat?
Is Generative AI Dangerous?
Why aren't there more bug bounty programs?
The Voynich Manuscript
Roman Seleznev: Did the Punishment Fit the Crime?
Sony BMG's Rootkit Fiasco
Ad Fraud, Part 2
Ad Fraud, Part 1
The Economics Of Cybersecurity
The Reason You Don’t Have Data Privacy
How Entire Countries Can Lose the Internet
Olympic Destroyer
The Lawerence Berkeley Hack, Part 2
The Lawerence Berkeley Hack, Part 1
Russian Propaganda, Explained [ML B-Side]
Operation Ivy Bells
Why Do NFTs Disappear? [ML BSide]
The (Other) Problem with NFTs
SIM Swapping Follow Up [ML B-Side]
You Should Be Afraid of SIM Swaps
FBI vs. REvil [ML BSide]
Cyberbunker, Part 2
Cyberbunker, Part 1
How Netflix Learned Cloud Security
Fred Cohen: The Godfather of Computer Viruses [ML B-Side]
Thamar Reservoir
The Problem With Kernel-Mode Anti-Cheat Software
Norse Corp.: How To NOT build a cybersecurity startup
Jailbreaking Tractors [ML BSide]
The Russian Business Network
What can Chess grandmasters teach us about Cyber? [ML BSide]
LabMD Vs. The FTC
What Would Happen if CBS Got Hacked? [ML BSide]
Hacking Stock Markets, Part 2
Vishing: Voice Scams [ML BSide]
Hacking Stock Markets, Part 1
What’s it's Like to Fight LulzSec [ML B-Side]
"King Kimble": Kim DotCom
Hacking Multi-Factor Authentication
Hacking Language Models
Software Bill of Materials (SBOMs) [ML BSide]
Leo Kuvayev– The Czar of Spammers
"A CISO's Nightmare": Israel Baron on Railway Secuirty
“Designed by criminals, for criminals”: Operation Trojan Shield
Andrew Ginter: A 40-Years-Old Backdoor [ML-BSide]
Silk Road, The Amazon of Drugs - Part 2
Kurtis Minder: Ransomware Negotiations [ML BSide]
Silk Road: The Amazon of drugs, Part 1
Jacob Goldstein: The Future of BitCoin [ML BSide]
The “Cypherpunks” Who Invented Private Digital Money
Malicious LIVE: Celebrating 5 Years of Malicious Life
Hackers vs. Spies: The Stratfor Leaks, Pt. 2
Hackers vs. Spies: The Stratfor Leaks, Pt. 1
Catching A Cybercriminal [ML B-Side]
What The LinkedIn Hack Taught Us About Storing Passwords
Operation CuckooBees [ML B-Side]
How to Russia-Proof Your Democracy [ML BSide]
Op. Sundevil And The Birth of the EFF
MITRE Attack Flow [ML B-Sides]
Aaron Swartz
The Russia-Ukraine Cyberwar [ML B-Side]
Chris Roberts: Hackers on a Plane
DIE - A New Paragidm for Cyber Security [ML B-Side]
Cyber PTSD
How Resilient Is Our Banking System?
How Resiliant Is Our Banking System? [ML BSide]
Crypto AG, Part 3: The Truth Is Revealed
Quantum Cyber Security [ML BSide]
Crypto AG, Part 2: The Death of Bo Jr.
Why do APTs use Ransomeware? [ML BSide]
Crypto AG - The Greatest Espionage Operation Ever, Part 1
Why aren't SMBs investing in Cyber Security? [ML B-Side]
The Bloody Origins of Israel's Cyber Security Industry
Hacker Highschool: Pete Herzog [ML BSide]
The Mystery of Cicada 3301
How the Internet Changed the NSA
Is Code === Free Speech?
A digital 'vaccine' for Log4Shell [ML BSide]
Shawn Carpenter: A Cyber Vigliante
Ransomware Attackers Don’t Take Holidays [ML B-Side]
Tay: A Teenage Bot Gone Rogue
Wild West Hackin' Fest [ML BSide]
Operation Flyhook, Part 2
IP Hijacking [ML BSide]
Operation Flyhook, Part 1
In Defence Of the NSA [ML B-Side]
Marcus Hutchins - An Accidental Hero
Operation GhostShell
Smart TVs: A New Battlefield
The MITRE ATT&CK Framework
Should The U.S. Ban Chinese and Russian Technology?
Jack Rhysider, Darknet Diaries [ML B-Side]
The Tesla Hack
Understanding China [ML B-Side]
John McAfee
RSA Breach FollowUp: Are We Doing Security Right? [ML B-Side]
DeadRinger [ML B-Side]
The Jester
The State of Credit Card Security [ML B-Side]
Albert Gonzalez, Part 3
DerbyCon - Dave Kennedy [ML B-Side]
Albert Gonzalez, Part 2
Jeff Moss: DEF CON [ML B-Side]
Albert Gonzales, Part 1
THOTCON Hacking Conference [ML BSide]
China's Unrestricted Warfare, Part 3
Colonial Pipeline & DarkSide: Assaf Dahan [B-Side]
RSA Breach, Part 2
RSA Breach: The Untold Story, Part 1
China's Unrestricted Warfare, Part 2
Creating a Grassroots Security Conference: Jack Daniel [ML B-Side]
China's Unrestricted Warfare, Part 1
Can Nuclear Power Plants Be Hacked?
Shutting Down The Internet in 30 Minutes: Chris Wysopal (WeldPond) [ML B-Side]
L0pht, Part 2
The Story of 'L0pht', Part 1
MS Exchange Hack [ML B-Side]
NotPetya Part 2
NotPetya Part 1
Facial Recognition in Law Enforcment, Part 2
Should Law Enforcement Use Facial Recognition? Pt. 1
Clearview AI
Breaking Into Buildings
Special: The Solarwinds Hack
100th Episode Special
Jan Sloot's Incredible Digital Coding System
Op. GUNMAN & The World's First Keylogger
Election Hacking, Part 2
Election Hacking, Part 1
MDR Vs. The TrickBot Gang
Yahoo's Ugly Death, Part 2
Yahoo's Ugly Death, Part 1
The Great Firewall of China, Pt. 2: Cisco's Trial
The Great Firewall of China - Part 1
Troy Hunt - Interview
Multi-Stage Ransomware (Live)
Protecting The Panama Papers Whistleblower
From Ransomware To Blackmail, With Assaf Dahan
SegWit2x, Part 3
SegWit2x Part 2
Hacking Fortnite Accounts (CPRadio)
SegWit2x, or - The Year Bitcoiners Will Never Forget, Part 1
No Honor Among Thieves
Maintaining Secure Business Continuity With A Remote Workforce - With Sam Curry
The Problem With Passwords
Steven Wozniak Interview, Deep 2017
The Hauwei Ban, Part 2
The Huawei Ban, Part 1
The Max Headroom Signal Hijack
ToTok, Part 3: Becoming a Spyware Superpower
Operation Glowing Symphony
ToTok, Part 2: The Masterminds of Mobile Malware
ToTok, Part 1: How to Convince Someone to Download Spyware
How To Defend A Bank, Pt. II: Right of Bang
How To Defend A Bank, Part 1: Fusion Centers
Triton, Part 2: The World’s Most Dangerous Malware
Triton Part 1
Dead Drops
Deep Fakes, Part 2: Man Vs. Machine
GAN and Deep Fakes, Part 1
Sam Curry: The 2020 Crystal Ball
Human Side Channels
What's the problem with Cyber Insurance?
Gozi B-Side: Amit Serper & Sam Curry
Gozi Part 2
EP61: Prying Eyes
EP60: ML B-Side: Lodrian Cherne On Stalkerware
EP59: Gozi, Part 1: The Rise of Malware-as-a-Service
EP58: How is Spyware Legal?
EP57: Listeners Survey Special
EP56: Operation Aurora, Part 2
EP55: Operation Aurora, Part 1
Responding to a Cyber Attack with Missiles
EP53: Are Ad Blockers Malicious?
ML_Conficker
Operation SoftCell
'Pa Bell' Vs. Youth International Party Line
The U.S vs. Gary McKinnon
The WANK Worm, Part 2
The WANK Worm, Part 1
The Equifax Data Breach Pt. II: The Bits Hit The Fan
The Equifax Data Breach Pt. I: A Big Data Bubble
DeCSS: Hackers Vs Hollywood
Marconi & The Maskelyne Affair
The Fall Of Mt. Gox – Part 2
The Location Data Brokers – A CYBER Podcast Special
The Fall Of Mt. Gox – Part 1
Black Duck Eggs: Darknet Diaries
Dave Kennedy: The Psychological Principles of Social Engineering
The Ethereum DAO Hack
The Jerusalem Virus, Part 2
The Jerusalem Virus, Part 1
Gene Spafford on the Morris Worm & Cyber-security in the 1980’s
China Vs. Github
The Ashley Madison Hack, Part 2
The Ashley Madison Hack, Part 1
Interview Special: Graham Cluley
The Target Hack
WoW: Corrupted Blood
The Stuxnet Virus Pt. 3
The Stuxnet Virus Pt. 2
The Stuxnet Virus Pt. 1
Shamoon – The Biggest Hack In History
The Melissa Virus
GhostNet
The Morris Worm Pt. 2
The Morris Worm Pt. 1
The Half Life 2 Hack
The Legalities of the Cyber War
Fancy Bear, Cozy Bear
Hack Back
Cyber Terrorism
Super Spies
The Trojan Horse Affair
Friend or Foe
Amit Serper Interview- Holiday Special Episode
Deception
Weapons of Mass Disruption
The Soldiers of North Korea
The Propaganda
The Whistleblowers
Stuxnet, part 3
Stuxnet, part 2
Stuxnet, part 1
Hell to Pay
The Roots of Evil
Big Cannons
Spam Empire
The Dark Avenger
Ghost In The Machine