Malicious Life

Malicious Life

Por Malicious Life
En Malicious Life

THOTCON Hacking Conference [B-Side]

THOTCON is not your ordinary, run-of-the-mill security conference – and it’s even...

Add to ... 

China’s Unrestricted Warfare, Part 3

For more than a decade, China orchestrated a sophisticated espionage campaign against Nortel...

Add to ... 

Colonial Pipeline & DarkSide: Assaf Dahan [B-Side]

On Friday, May 7th, 2021, Colonial Pipeline suffered a cyberattack that forced the company to...

Add to ... 

RSA Breach, Part 2

In the wake of RSA’s disclosure of the breach, the company cyber analysts chose not to...

Add to ... 

RSA Breach: The Untold Story, Part 1

In March 2011, RSA was facing a terrible dilemma. An attacker siphoned data relating to...

Add to ... 

China’s Unrestricted Warfare, Part 2

In the early 2000’s, Nortel was consciously, intentionally, aggressively positioning...

Add to ... 

Creating a Grassroots Security Conference: Jack Daniel [ML B-Side]

Security BSides – or just ‘BSides’, for short’ – is the first...

Add to ... 

China’s Unrestricted Warfare, Part 1

Back in the 1990’s, Cyberwarfare was a word rarely used in the West – and...

Add to ... 

Can Nuclear Power Plants Be Hacked?

\n\n\n\nAndrew Ginter, VP of Industrial Security at Waterfall Security Solutions, speaks to Sr....

Add to ... 

Shutting Down The Internet in 30 Minutes: Chris Wysopal [ML B-Side]

\n\n\n\nChris Wysopal (aka WeldPond), a cyber security pionneer and one of L0pht’s founding...

Add to ... 

‘L0pht’, Part 2 – The End

In the early days, the L0pht guys tinkered with what they already had laying around, or could...

Add to ... 

The Story of ‘L0pht’, Part 1

‘L0pht’, or ‘L0pht Heavy Indutries’, was one of the most infuencial...

Add to ... 

The MS Exchange Hack [ML B-Side]

Israel Barack, Cybereason’s CISO and an expert on cyber-warfare, on the recent MS Exchange...

Add to ... 

NotPetya, Part 2

When the NotPetya pandemic hit, Cyber Analyst Amit Serper was sitting in his parents’...

Add to ... 

NotPetya, Part 1

On June 28th, 2017, millions of Ukranians were celebrating ‘Constitution Day.’ Their...

Add to ... 

Facial Recognition in Law Enforcement, Pt. 2

It seems likely that legislation alone won’t be able to regulate the widespread use of...

Add to ... 

Should Law Enforcement Use Facial Recognition? Pt. 1

There are plenty of reasons why Police should use AI for facial recognition: after all, Humans...

Add to ... 

Clearview AI

Clearview AI scrapes billions of images off social media and the open web, applies facial...

Add to ... 

Breaking Into Secure Buildings

FC, aka ‘Freaky Clown’, is an expert in “Physical assessments” –...

Add to ... 

Special: The SolarWinds Hack

Ran talks to Israel Barak, Cybereason’s CISO and a Cyber-defense and Warfare expert, about...

Add to ...