Malicious Life

Tales of cybersecurity. The wildest hacks you can ever imagine, told by people who were actually there. Hosted by cybersecurity expert and book author, Ran Levi, this is not your average talk-show. These are fascinating, unknown tales, slowly unraveled, deeply researched. Think Hardcore History meets Hackable- and come dig into a history you never knew existed.

https://redcircle.com/shows/malicious-life

Eine durchschnittliche Folge dieses Podcasts dauert 32m. Bisher sind 419 Folge(n) erschienen. Jede Woche gibt es eine neue Folge dieses Podcasts.

Gesamtlänge aller Episoden: 9 days 12 hours 53 minutes

subscribe
share






recommended podcasts


Hacking Language Models


Language models are everywhere today: they run in the background of Google Translate and other translation tools; they help operate voice assistants like Alexa or Siri; and most interestingly, they are available via several experiential projects trying to emulate natural conversations, such as OpenAI’s GPT-3 and Google’s LaMDA. Can these models be hacked to gain access to the sensitive information they learned from their training data? 



Advertising Inquiries: https://redcircle...


share








 September 5, 2022  27m
 
 

Software Bill of Materials (SBOM) [ML B-side]


In May 2021, Following the Solarwinds and the Colonial Pipeline attacks, the Biden administration published a presidential Executive Order mandating the use of SBOMs - Software Bill of Materials - in all government agencies.


share








 August 31, 2022  25m
 
 

Software Bill of Materials (SBOMs) [ML BSide]


Software Bill of Materials (SBOMs) [ML BSide]



Advertising Inquiries: https://redcircle.com/brands


share








 August 31, 2022  25m
 
 

Leo Kuvayev– The Czar of Spammers


Railway systems are a mess of old systems built on top of older systems, running ancient operating systems and exposing their most sensitive inner workings to commuters via WIFI. Why are railway systems so difficult to defend,


share








 August 22, 2022  26m
 
 

Leo Kuvayev– The Czar of Spammers


Criminals, particularly cyber criminals, aren’t “good” people; in most cases, they do have their own personal boundaries. Every once in a while, you encounter a criminal who’s different. Someone who seems not to have limits at all. A ruthless person, for whom the goal truly justifies the means. Leo Kuvayev is that kind of a person - and that made him so successful as a cyber-criminal. But even a genius criminal can go just one step too far...


share








 August 22, 2022  32m
 
 

“A CISO’s Nightmare”: Israel Baron on Railway Security [ML B-side]


Railway systems are a mess of old systems built on top of older systems, running ancient operating systems and exposing their most sensitive inner workings to commuters via WIFI. Why are railway systems so difficult to defend,


share








 August 15, 2022  26m
 
 

"A CISO's Nightmare": Israel Baron on Railway Secuirty


"A CISO's Nightmare": Israel Baron on Railway Secuirty



Advertising Inquiries: https://redcircle.com/brands


share








 August 14, 2022  26m
 
 

“Designed by criminals, for criminals”: Operation Trojan Shield


The Anom was the holy grail of dark, illegal communication: a mobile phone that could send encrypted messages, and even included a secret Kill-Switch to foil attempts by law enforcement agents to get to its contents.


share








 August 8, 2022  27m
 
 

“Designed by criminals, for criminals”: Operation Trojan Shield


“Designed by criminals, for criminals”: Operation Trojan Shield



Advertising Inquiries: https://redcircle.com/brands


share








 August 8, 2022  27m
 
 

Andrew Ginter: A 40-Year-Old Backdoor [ML B-Side]


Ken Thompson is a legendary computer scientist who also made a seminal contribution to computer security in 1983, when he described a nifty hack that could allow an attacker to plant an almost undetectable malicious code inside a C compiler.


share








 August 1, 2022  29m