PodBud
Malicious Life

Malicious Life

True Crime

by Ran Levi

Tales of cybersecurity history hosted by Ran Levi. The wildest hacks you can ever imagine, told by the people who were actually there.

Listen on:SpotifyApple

Episodes (265)

#

Weev, Part 2

Dec 10, 202428m
#

Weev, Part 1

Nov 27, 202429m
#

Cuckoo Spear [B-Side]

Nov 20, 202430m
#

The Man Who Went To War With Anonymous - And Lost

Nov 13, 202438m
#

What Can Organizations Learn from "Grim Beeper"? [B-Side]

Nov 5, 202435m
#

The Fappening/Celebgate

Oct 29, 202429m
#

Operation Snow White, Part 2

Oct 15, 202430m
#

Operation Snow White, Part 1

Oct 1, 202429m
#

Caught in the Crossfire: Infighting and Treason in Russia’s Cyber World

Sep 17, 202426m
#

SNAP Fraud: Getting Rich by Stealing from the Poor

Sep 3, 202429m
#

The Hollywood Con Queen, Part 2

Aug 20, 202431m
#

The Hollywood Con Queen, Part 1

Aug 7, 202434m
#

The Doomed Queen’s Secret Ciphers

Jul 23, 202430m
#

Why Did People Write Viruses In The 80s & 90s?

Jul 9, 202427m
#

Section 230: The Law that Makes Social Media Great, and Terrible

Jun 25, 202434m
#

What Happened at Uber?

Jun 11, 202437m
#

The Nigerian Prince

May 28, 202428m
#

Unmasking Secrets: The Rise of Open-Source Intelligence

May 14, 202433m
#

The Source Code of Malicious Life

Apr 30, 202447m
#

The Y2K Bug, Part 2

Apr 16, 202431m
#

The Y2K Bug, Part 1

Mar 31, 202427m
#

Can You Bomb a Hacker?

Mar 19, 202430m
#

Kevin Mitnick, Part 2

Mar 4, 202449m
#

Kevin Mitnick, Part 1

Feb 19, 202437m
#

SIM Registration: Security, or Surveillance?

Feb 5, 202431m
#

The Mariposa Botnet

Jan 22, 202444m
#

The Real Story of Citibank’s $10M Hack

Jan 9, 202432m
#

How to Hack Into Satellites

Dec 27, 202330m
#

Moonlight Maze

Dec 11, 202335m
#

Volt Typhoon

Nov 28, 202331m
#

Is NSO Evil? Part 2

Nov 13, 202340m
#

Is NSO Evil? Part 1

Oct 30, 202332m
#

Should You Pay Ransomware Attackers? A Game Theory Approach

Oct 17, 202332m
#

Silent Firewalls: The Underrepresentation of Women in Cyber

Oct 2, 202329m
#

Operation Kudo

Sep 20, 202333m
#

Can We Stop the AI Cyber Threat?

Sep 4, 202327m
#

Is Generative AI Dangerous?

Aug 22, 202337m
#

Why aren't there more bug bounty programs?

Aug 8, 202333m
#

The Voynich Manuscript

Jul 25, 202329m
#

Roman Seleznev: Did the Punishment Fit the Crime?

Jul 10, 202338m
#

Sony BMG's Rootkit Fiasco

Jun 27, 202341m
#

Ad Fraud, Part 2

Jun 9, 202328m
#

Ad Fraud, Part 1

May 30, 202323m
#

The Economics Of Cybersecurity

May 15, 202326m
#

The Reason You Don’t Have Data Privacy

May 1, 202337m
#

How Entire Countries Can Lose the Internet

Apr 17, 202332m
#

Olympic Destroyer

Apr 3, 202335m
#

The Lawerence Berkeley Hack, Part 2

Mar 20, 202335m
#

The Lawerence Berkeley Hack, Part 1

Mar 8, 202329m
#

Russian Propaganda, Explained [ML B-Side]

Feb 28, 202333m
#

Operation Ivy Bells

Feb 20, 202344m
#

Why Do NFTs Disappear? [ML BSide]

Feb 13, 202327m
#

The (Other) Problem with NFTs

Feb 6, 202327m
#

SIM Swapping Follow Up [ML B-Side]

Jan 30, 202318m
#

You Should Be Afraid of SIM Swaps

Jan 23, 202333m
#

FBI vs. REvil [ML BSide]

Jan 16, 202321m
#

Cyberbunker, Part 2

Jan 10, 202331m
#

Cyberbunker, Part 1

Jan 2, 202327m
#

How Netflix Learned Cloud Security

Dec 26, 202220m
#

Fred Cohen: The Godfather of Computer Viruses [ML B-Side]

Dec 19, 202229m
#

Thamar Reservoir

Dec 13, 202236m
#

The Problem With Kernel-Mode Anti-Cheat Software

Dec 6, 202233m
#

Norse Corp.: How To NOT build a cybersecurity startup

Nov 27, 202239m
#

Jailbreaking Tractors [ML BSide]

Nov 20, 202224m
#

The Russian Business Network

Nov 13, 202231m
#

What can Chess grandmasters teach us about Cyber? [ML BSide]

Nov 7, 202223m
#

LabMD Vs. The FTC

Oct 31, 202239m
#

What Would Happen if CBS Got Hacked? [ML BSide]

Oct 24, 202222m
#

Hacking Stock Markets, Part 2

Oct 18, 202229m
#

Vishing: Voice Scams [ML BSide]

Oct 10, 202225m
#

Hacking Stock Markets, Part 1

Oct 4, 202229m
#

What’s it's Like to Fight LulzSec [ML B-Side]

Sep 27, 202224m
#

"King Kimble": Kim DotCom

Sep 18, 202232m
#

Hacking Multi-Factor Authentication

Sep 13, 202226m
#

Hacking Language Models

Sep 5, 202227m
#

Software Bill of Materials (SBOMs) [ML BSide]

Aug 31, 202225m
#

Leo Kuvayev– The Czar of Spammers

Aug 22, 202232m
#

"A CISO's Nightmare": Israel Baron on Railway Secuirty

Aug 14, 202226m
#

“Designed by criminals, for criminals”: Operation Trojan Shield

Aug 8, 202227m
#

Andrew Ginter: A 40-Years-Old Backdoor [ML-BSide]

Aug 1, 202229m
#

Silk Road, The Amazon of Drugs - Part 2

Jul 21, 202233m
#

Kurtis Minder: Ransomware Negotiations [ML BSide]

Jul 18, 202230m
#

Silk Road: The Amazon of drugs, Part 1

Jul 11, 202221m
#

Jacob Goldstein: The Future of BitCoin [ML BSide]

Jul 4, 202223m
#

The “Cypherpunks” Who Invented Private Digital Money

Jun 22, 202232m
#

Malicious LIVE: Celebrating 5 Years of Malicious Life

Jun 19, 202256m
#

Hackers vs. Spies: The Stratfor Leaks, Pt. 2

Jun 14, 202232m
#

Hackers vs. Spies: The Stratfor Leaks, Pt. 1

Jun 7, 202234m
#

Catching A Cybercriminal [ML B-Side]

May 30, 202228m
#

What The LinkedIn Hack Taught Us About Storing Passwords

May 24, 202230m
#

Operation CuckooBees [ML B-Side]

May 17, 202226m
#

How to Russia-Proof Your Democracy [ML BSide]

May 9, 202227m
#

Op. Sundevil And The Birth of the EFF

May 2, 202224m
#

MITRE Attack Flow [ML B-Sides]

Apr 24, 202234m
#

Aaron Swartz

Apr 19, 202231m
#

The Russia-Ukraine Cyberwar [ML B-Side]

Apr 10, 202235m
#

Chris Roberts: Hackers on a Plane

Apr 5, 202230m
#

DIE - A New Paragidm for Cyber Security [ML B-Side]

Mar 28, 202223m
#

Cyber PTSD

Mar 22, 202230m
#

How Resilient Is Our Banking System?

Mar 16, 202223m
#

How Resiliant Is Our Banking System? [ML BSide]

Mar 14, 202223m
#

Crypto AG, Part 3: The Truth Is Revealed

Mar 8, 202232m
#

Quantum Cyber Security [ML BSide]

Feb 28, 202228m
#

Crypto AG, Part 2: The Death of Bo Jr.

Feb 21, 202236m
#

Why do APTs use Ransomeware? [ML BSide]

Feb 14, 202217m
#

Crypto AG - The Greatest Espionage Operation Ever, Part 1

Feb 7, 202227m
#

Why aren't SMBs investing in Cyber Security? [ML B-Side]

Jan 31, 202222m
#

The Bloody Origins of Israel's Cyber Security Industry

Jan 25, 202235m
#

Hacker Highschool: Pete Herzog [ML BSide]

Jan 17, 202228m
#

The Mystery of Cicada 3301

Jan 10, 202234m
#

How the Internet Changed the NSA

Jan 3, 202236m
#

Is Code === Free Speech?

Dec 27, 202130m
#

A digital 'vaccine' for Log4Shell [ML BSide]

Dec 20, 202119m
#

Shawn Carpenter: A Cyber Vigliante

Dec 14, 202137m
#

Ransomware Attackers Don’t Take Holidays [ML B-Side]

Dec 6, 202121m
#

Tay: A Teenage Bot Gone Rogue

Nov 30, 202128m
#

Wild West Hackin' Fest [ML BSide]

Nov 22, 202136m
#

Operation Flyhook, Part 2

Nov 15, 202127m
#

IP Hijacking [ML BSide]

Nov 9, 202136m
#

Operation Flyhook, Part 1

Nov 1, 202127m
#

In Defence Of the NSA [ML B-Side]

Oct 26, 202135m
#

Marcus Hutchins - An Accidental Hero

Oct 18, 202133m
#

Operation GhostShell

Oct 11, 202122m
#

Smart TVs: A New Battlefield

Oct 4, 202134m
#

The MITRE ATT&CK Framework

Sep 27, 202124m
#

Should The U.S. Ban Chinese and Russian Technology?

Sep 20, 202135m
#

Jack Rhysider, Darknet Diaries [ML B-Side]

Sep 13, 202132m
#

The Tesla Hack

Sep 6, 202131m
#

Understanding China [ML B-Side]

Aug 30, 202119m
#

John McAfee

Aug 23, 202147m
#

RSA Breach FollowUp: Are We Doing Security Right? [ML B-Side]

Aug 16, 202145m
#

DeadRinger [ML B-Side]

Aug 10, 202137m
#

The Jester

Aug 3, 202135m
#

The State of Credit Card Security [ML B-Side]

Jul 26, 202122m
#

Albert Gonzalez, Part 3

Jul 20, 202131m
#

DerbyCon - Dave Kennedy [ML B-Side]

Jul 13, 202136m
#

Albert Gonzalez, Part 2

Jul 7, 202137m
#

Jeff Moss: DEF CON [ML B-Side]

Jun 28, 202136m
#

Albert Gonzales, Part 1

Jun 21, 202127m
#

THOTCON Hacking Conference [ML BSide]

Jun 15, 202130m
#

China's Unrestricted Warfare, Part 3

Jun 8, 202135m
#

Colonial Pipeline & DarkSide: Assaf Dahan [B-Side]

Jun 1, 202129m
#

RSA Breach, Part 2

May 24, 202129m
#

RSA Breach: The Untold Story, Part 1

May 20, 202125m
#

China's Unrestricted Warfare, Part 2

May 11, 202128m
#

Creating a Grassroots Security Conference: Jack Daniel [ML B-Side]

May 4, 202130m
#

China's Unrestricted Warfare, Part 1

Apr 27, 202133m
#

Can Nuclear Power Plants Be Hacked?

Apr 19, 202124m
#

Shutting Down The Internet in 30 Minutes: Chris Wysopal (WeldPond) [ML B-Side]

Apr 12, 202140m
#

L0pht, Part 2

Apr 5, 202144m
#

The Story of 'L0pht', Part 1

Mar 30, 202139m
#

MS Exchange Hack [ML B-Side]

Mar 22, 202124m
#

NotPetya Part 2

Mar 15, 202124m
#

NotPetya Part 1

Mar 1, 202132m
#

Facial Recognition in Law Enforcment, Part 2

Feb 16, 202132m
#

Should Law Enforcement Use Facial Recognition? Pt. 1

Feb 3, 202147m
#

Clearview AI

Jan 21, 202143m
#

Breaking Into Buildings

Jan 7, 202134m
#

Special: The Solarwinds Hack

Dec 28, 202034m
#

100th Episode Special

Dec 21, 202041m
#

Jan Sloot's Incredible Digital Coding System

Dec 7, 202054m
#

Op. GUNMAN & The World's First Keylogger

Nov 22, 202039m
#

Election Hacking, Part 2

Nov 2, 202039m
#

Election Hacking, Part 1

Oct 22, 202036m
#

MDR Vs. The TrickBot Gang

Oct 12, 202024m
#

Yahoo's Ugly Death, Part 2

Sep 25, 202043m
#

Yahoo's Ugly Death, Part 1

Sep 11, 202033m
#

The Great Firewall of China, Pt. 2: Cisco's Trial

Aug 27, 202028m
#

The Great Firewall of China - Part 1

Aug 14, 202040m
#

Troy Hunt - Interview

Aug 4, 202021m
#

Multi-Stage Ransomware (Live)

Aug 2, 202047m
#

Protecting The Panama Papers Whistleblower

Jul 16, 202039m
#

From Ransomware To Blackmail, With Assaf Dahan

Jul 7, 202014m
#

SegWit2x, Part 3

Jul 3, 202059m
#

SegWit2x Part 2

Jun 19, 202049m
#

Hacking Fortnite Accounts (CPRadio)

Jun 11, 202029m
#

SegWit2x, or - The Year Bitcoiners Will Never Forget, Part 1

Jun 4, 202036m
#

No Honor Among Thieves

May 22, 202040m
#

Maintaining Secure Business Continuity With A Remote Workforce - With Sam Curry

May 14, 202015m
#

The Problem With Passwords

May 8, 202044m
#

Steven Wozniak Interview, Deep 2017

Apr 23, 202036m
#

The Hauwei Ban, Part 2

Apr 23, 202037m
#

The Huawei Ban, Part 1

Apr 9, 202030m
#

The Max Headroom Signal Hijack

Mar 24, 202036m
#

ToTok, Part 3: Becoming a Spyware Superpower

Mar 15, 202034m
#

Operation Glowing Symphony

Mar 13, 20201h 13m
#

ToTok, Part 2: The Masterminds of Mobile Malware

Mar 10, 202025m
#

ToTok, Part 1: How to Convince Someone to Download Spyware

Mar 5, 202029m
#

How To Defend A Bank, Pt. II: Right of Bang

Feb 27, 202025m
#

How To Defend A Bank, Part 1: Fusion Centers

Feb 13, 202027m
#

Triton, Part 2: The World’s Most Dangerous Malware

Jan 29, 202038m
#

Triton Part 1

Jan 16, 202036m
#

Dead Drops

Jan 14, 202038m
#

Deep Fakes, Part 2: Man Vs. Machine

Jan 2, 202037m
#

GAN and Deep Fakes, Part 1

Dec 19, 201943m
#

Sam Curry: The 2020 Crystal Ball

Dec 10, 201915m
#

Human Side Channels

Dec 3, 201933m
#

What's the problem with Cyber Insurance?

Nov 21, 201935m
#

Gozi B-Side: Amit Serper & Sam Curry

Nov 19, 201919m
#

Gozi Part 2

Nov 14, 201935m
#

EP61: Prying Eyes

Nov 12, 201929m
#

EP60: ML B-Side: Lodrian Cherne On Stalkerware

Nov 8, 201918m
#

EP59: Gozi, Part 1: The Rise of Malware-as-a-Service

Oct 31, 201929m
#

EP58: How is Spyware Legal?

Oct 17, 201941m
#

EP57: Listeners Survey Special

Oct 10, 201928m
#

EP56: Operation Aurora, Part 2

Sep 26, 201932m
#

EP55: Operation Aurora, Part 1

Sep 12, 201934m
#

Responding to a Cyber Attack with Missiles

Aug 29, 201955m
#

EP53: Are Ad Blockers Malicious?

Aug 15, 201933m
#

ML_Conficker

Jul 18, 201940m
#

Operation SoftCell

Jul 10, 201934m
#

'Pa Bell' Vs. Youth International Party Line

Jun 16, 201940m
#

The U.S vs. Gary McKinnon

May 27, 201939m
#

The WANK Worm, Part 2

May 10, 201939m
#

The WANK Worm, Part 1

Apr 25, 201934m
#

The Equifax Data Breach Pt. II: The Bits Hit The Fan

Apr 11, 201931m
#

The Equifax Data Breach Pt. I: A Big Data Bubble

Mar 27, 201944m
#

DeCSS: Hackers Vs Hollywood

Mar 13, 201944m
#

Marconi & The Maskelyne Affair

Feb 21, 201942m
#

The Fall Of Mt. Gox – Part 2

Feb 6, 201946m
#

The Location Data Brokers – A CYBER Podcast Special

Jan 24, 201945m
#

The Fall Of Mt. Gox – Part 1

Jan 22, 201949m
#

Black Duck Eggs: Darknet Diaries

Jan 8, 201931m
#

Dave Kennedy: The Psychological Principles of Social Engineering

Dec 25, 201837m
#

The Ethereum DAO Hack

Dec 13, 201839m
#

The Jerusalem Virus, Part 2

Nov 26, 201828m
#

The Jerusalem Virus, Part 1

Nov 15, 201824m
#

Gene Spafford on the Morris Worm & Cyber-security in the 1980’s

Oct 31, 201855m
#

China Vs. Github

Oct 16, 201841m
#

The Ashley Madison Hack, Part 2

Oct 4, 201832m
#

The Ashley Madison Hack, Part 1

Sep 19, 201829m
#

Interview Special: Graham Cluley

Sep 5, 201853m
#

The Target Hack

Aug 23, 201833m
#

WoW: Corrupted Blood

Jul 25, 201826m
#

The Stuxnet Virus Pt. 3

Jul 12, 201829m
#

The Stuxnet Virus Pt. 2

Jul 12, 201827m
#

The Stuxnet Virus Pt. 1

Jul 12, 201833m
#

Shamoon – The Biggest Hack In History

Jun 29, 201826m
#

The Melissa Virus

Jun 14, 201821m
#

GhostNet

May 30, 201828m
#

The Morris Worm Pt. 2

May 16, 201822m
#

The Morris Worm Pt. 1

May 2, 201826m
#

The Half Life 2 Hack

Apr 18, 201838m
#

The Legalities of the Cyber War

Apr 4, 201822m
#

Fancy Bear, Cozy Bear

Mar 21, 201830m
#

Hack Back

Mar 7, 201833m
#

Cyber Terrorism

Feb 21, 201831m
#

Super Spies

Feb 7, 201834m
#

The Trojan Horse Affair

Jan 24, 201822m
#

Friend or Foe

Jan 10, 201836m
#

Amit Serper Interview- Holiday Special Episode

Dec 27, 201739m
#

Deception

Dec 13, 201729m
#

Weapons of Mass Disruption

Nov 29, 201740m
#

The Soldiers of North Korea

Nov 15, 201733m
#

The Propaganda

Nov 1, 201739m
#

The Whistleblowers

Oct 17, 201736m
#

Stuxnet, part 3

Oct 2, 201729m
#

Stuxnet, part 2

Sep 18, 201727m
#

Stuxnet, part 1

Aug 30, 201733m
#

Hell to Pay

Aug 21, 201737m
#

The Roots of Evil

Aug 7, 201730m
#

Big Cannons

Jul 24, 201744m
#

Spam Empire

Jul 6, 201731m
#

The Dark Avenger

Jun 30, 201730m
#

Ghost In The Machine

Jun 28, 201726m