Malicious Life

Auteur(s): Malicious Life
  • Résumé

  • Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.

    All Rights Reserved.
    Voir plus Voir moins
activate_Holiday_promo_in_buybox_DT_T2
Épisodes
  • Cuckoo Spear [B-Side]
    Nov 20 2024

    APT-10 is a Chinese nation-state threat actor that in recent years has been targeting Japanese IT & Instrastructure organizations using a sophisticated backdoor malware known as LODEINFO. Recently, Jin Ito & Loic Castel, researchers from Cybereason's IR Team, uncovered a new tool used by the group: NOOPDOOR, which incorporates highly sophisticated persistence mechanisms, allowing APT-10 to evade detection and remain inside enterprise networks for two or even three years.



    Our Sponsors:
    * Check out 1Password and use my code MALICIOUS for a great deal: 1password.com


    Advertising Inquiries: https://redcircle.com/brands
    Voir plus Voir moins
    31 min
  • The Man Who Went To War With Anonymous - And Lost
    Nov 13 2024

    Aaron Barr was en-signals intelligence officer specializing in analytics. As part of HBGary Federal, he came up with a plan to unmask the key leaders of Anonymous, the infamous hacker collective. People who worked with Aaron warned him that his data was sub-par, but the determined vet claimed he had a strong "gut feeling" that he was on the right track.



    Our Sponsors:
    * Check out 1Password and use my code MALICIOUS for a great deal: 1password.com


    Advertising Inquiries: https://redcircle.com/brands
    Voir plus Voir moins
    38 min
  • What Can Organizations Learn from "Grim Beeper"? [B-Side]
    Nov 5 2024

    On 17 and 18 of September 2024, thousands of pagers and hand held radio devices used by Hezbollah, exploded simultaneously across Lebanon and Syria, killing at least 42 terrorists and wounding more than 3,000.

    Devon Ackerman, Cybereason’s Global Head of Digital Forensic and Incident response and a former Special Agent at the FBI's Operational Technology Division, discusses the lessons organizations can learn from this ultra-sophisticated supply chain attack. How such traumatic events impact the mindset of hacked organizations, what kind of threat actors are capable of pulling off long-term attacks like these, and the three most important steps organizations can take to minimize the chance of a supply chain attack.



    Our Sponsors:
    * Check out 1Password and use my code MALICIOUS for a great deal: 1password.com


    Advertising Inquiries: https://redcircle.com/brands
    Voir plus Voir moins
    36 min

Ce que les auditeurs disent de Malicious Life

Moyenne des évaluations de clients

Évaluations – Cliquez sur les onglets pour changer la source des évaluations.