Rephonic
Artwork for Malicious Life

Malicious Life

Malicious Life
Cybersecurity
Citibank
Vladimir Levin
Kevin Mitnick
Y2K
Nso Group
1994 Cyber Heists
SIM Registration
Mobile Telecommunications
Bob Bemer
Moonlight Maze
Russian Hacker Community
Namibia
Cybercrime
Pacific Bell
Y2K Bug
Jamal Khashoggi
Turla
Banking Cybersecurity
Internet History

Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.

PublishesWeeklyEpisodes265Founded8 years ago
Category
Technology

Listen to this Podcast

Artwork for Malicious Life

Latest Episodes

The Electronic Frontier Foundation, long time critics of the Computer Fraud and Abuse Act, followed Weev's trial - but did not get involved. For the appeal, however, the organization decided to step it. But althought the EFF had some strong points ag... more

Much like Aaron Swartz did, Andrew "weev" Auernheimer fought against the Computer Fraud and Abuse Act, a law both men belived to be dangerous and unjust. But unlike Swartz, the internet's own boy, weev is an unapologetic troll who spread bile and cha... more

APT-10 is a Chinese nation-state threat actor that in recent years has been targeting Japanese IT & Instrastructure organizations using a sophisticated backdoor malware known as LODEINFO. Recently, Jin Ito & Loic Castel, researchers from Cybereason's... more

Aaron Barr was en-signals intelligence officer specializing in analytics. As part of HBGary Federal, he came up with a plan to unmask the key leaders of Anonymous, the infamous hacker collective. People who worked with Aaron warned him that his data ... more

Key Facts

Accepts Guests
Accepts Sponsors
Contact Information
Podcast Host

Similar Podcasts

People also subscribe to these shows.

Hacked
HackedHacked
Darknet Diaries
Darknet DiariesJack Rhysider
Hacking Humans
Hacking HumansN2K Networks
Smashing Security
Smashing SecurityGraham Cluley & Carole Theriault
Click Here
Click HereRecorded Future News

Recent Guests

Tony Ortega
Journalist covering Scientology since 2012
tonyortega.stopstack.com
Episode: Operation Snow White, Part 1
John Atek
Artist and author, former Scientologist
Episode: Operation Snow White, Part 1
Heywood Telco
CEO of LexisNexis
LexisNexis
Episode: SNAP Fraud: Getting Rich by Stealing from the Poor
Vicky Nijies
Policy advocate at the Massachusetts Law Reform Institute
Massachusetts Law Reform Institute
Episode: SNAP Fraud: Getting Rich by Stealing from the Poor
George Lasry
A codebreaking expert who has been deciphering historical ciphers for over a decade.
Episode: The Doomed Queen’s Secret Ciphers
Kenneth Ziren
A personal advocate for reform of Section 230, who shares his legal battle against AOL over content liability.
N/A
Episode: Section 230: The Law that Makes Social Media Great, and Terrible
Joe Sullivan
Former Chief Security Officer at Uber, involved in a major data breach incident
Formerly of Uber
Episode: What Happened at Uber?
Perry Chen
Founder and former CEO of Kickstarter
Episode: The Y2K Bug, Part 1
Una Hathaway
Founder and director of the Center for Global Legal Challenges at Yale Law School
Yale Law School
Episode: Can You Bomb a Hacker?

Host

Ran Levi
Host of a series exploring the intricacies and stories behind cybersecurity, focusing on unique aspects and narratives within the field.

Reviews

4.8 out of 5 stars from 2.1k ratings
  • bad company ethics

    how can you be concerned about millions going hungry , when the host claims he is from “israel” who is currently starving millions?

    Apple Podcasts
    1
    nakd moon
    United States4 months ago
  • What an absolutely politically motivated podcast masquerading g as a cyber security podcast

    Podcast Addict
    1
    zabby
    5 months ago
  • Amazing Security Stories

    Amazing security stories with interviews and just the right level of detail for audio. Also Ran recommends other interesting podcasts.

    Apple Podcasts
    5
    Tradingdivergences
    United Kingdom5 months ago
  • I generally love this podcast and it is a regular to help make road trips go by faster. But I was a bit disappointed in the making light of women being forced into marriage by rape as a "thing in the past" this is still a very relevant issue in many parts of the world. Minimizing this is not really the best look.

    Podcast Addict
    4
    BeeFree
    7 months ago
  • Bad narrator

    I only listened for five minutes, but it drove me crazy to hear the narrator's voice rise and fall in a peculiar, unnatural way that doesn't follow punctuation and the normal way of speaking. It might be to make it more dramatic, but it makes it very difficult to concentrate on the content.

    Apple Podcasts
    2
    elbarzum
    Denmark8 months ago

Listeners Say

Key themes from listener reviews, highlighting what works and what could be improved about the show.

Listeners appreciate the depth of knowledge shared by experts and the unraveling of complex cybersecurity topics.
The podcast is seen as informative, offering both entertainment and valuable insights for cybersecurity professionals.
Some feedback points to inconsistent audio quality, but overall, the content is highly praised for its relevance and intrigue.
Engaging storytelling that captivates audiences with real-life accounts of cybersecurity breaches.

Chart Rankings

How this podcast ranks in the Apple Podcasts, Spotify and YouTube charts.

Apple Podcasts
#139
United States/Technology
Apple Podcasts
#171
United Kingdom/Technology
Apple Podcasts
#42
Australia/Technology
Apple Podcasts
#198
Germany/Technology
Apple Podcasts
#243
France/Technology
Apple Podcasts
#50
Denmark/Technology

Talking Points

Recent interactions between the hosts and their guests.

Cuckoo Spear [B-Side]
Q: How exciting was it for you two to investigate such a case, to actually go head to head with a nation state threat actor?
It was very exciting, particularly because of the sophisticated tools used by the nation-state actor and the strategic detection required.
Cuckoo Spear [B-Side]
Q: How were the attackers able to sneak in that malware into the organization itself?
Initially, Lodeinfo was pushed by threat actors through spear phishing, manipulating victims into executing something malicious. Later, they may have shifted to exploiting vulnerabilities in popular VPNs.
Cuckoo Spear [B-Side]
Q: How did Cybereason get involved in the investigation?
They were engaged as incident responders after discovering odd behaviors and data theft in a customer's network; they investigated and identified multiple victims.
Kevin Mitnick, Part 2
Q: How can attackers gain knowledge about an organization?
Through reconnaissance techniques, often using publicly available information and social media to build a profile of targets.
Kevin Mitnick, Part 2
Q: Is social engineering still as effective as it was in Kevin's time?
Yes, it is just as dangerous today, although awareness has increased.

Audience Metrics

Listeners, social reach, demographics and more for this podcast.

Gender Skew
Location
Interests
Professions
Age Range
Household Income
Social Media Reach

Frequently Asked Questions About Malicious Life

What is Malicious Life about and what kind of topics does it cover?

The content primarily revolves around the intricate and often dramatic narratives of cybersecurity, incorporating real stories from the perspectives of hackers, security analysts, and journalists. Episodes explore historical events related to major cybersecurity breaches, infamous hacking incidents, and the evolution of security measures in technology. The podcast is distinguished by its engaging storytelling approach, intertwining analysis with personal accounts and interviews that shed light on the motivations behind cyber threats and the societal implications of these actions. Each episode often illuminates lesser-known facets of well-documented events, making complex topics accessible and intriguing for listeners interested in technolog... more

Where can I find podcast stats for Malicious Life?

Rephonic provides a wide range of podcast stats for Malicious Life. We scanned the web and collated all of the information that we could find in our comprehensive podcast database. See how many people listen to Malicious Life and access YouTube viewership numbers, download stats, audience demographics, chart rankings, ratings, reviews and more.

How many listeners does Malicious Life get?

Rephonic provides a full set of podcast information for three million podcasts, including the number of listeners. View further listenership figures for Malicious Life, including podcast download numbers and subscriber numbers, so you can make better decisions about which podcasts to sponsor or be a guest on. You will need to upgrade your account to access this premium data.

What are the audience demographics for Malicious Life?

Rephonic provides comprehensive predictive audience data for Malicious Life, including gender skew, age, country, political leaning, income, professions, education level, and interests. You can access these listener demographics by upgrading your account.

How many subscribers and views does Malicious Life have?

To see how many followers or subscribers Malicious Life has on Spotify and other platforms such as Castbox and Podcast Addict, simply upgrade your account. You'll also find viewership figures for their YouTube channel if they have one.

Which podcasts are similar to Malicious Life?

These podcasts share a similar audience with Malicious Life:

1. Hacked
2. Darknet Diaries
3. Hacking Humans
4. Smashing Security
5. Click Here

How many episodes of Malicious Life are there?

Malicious Life launched 8 years ago and published 265 episodes to date. You can find more information about this podcast including rankings, audience demographics and engagement in our podcast database.

How do I contact Malicious Life?

Our systems regularly scour the web to find email addresses and social media links for this podcast. We scanned the web and collated all of the contact information that we could find in our podcast database. But in the unlikely event that you can't find what you're looking for, our concierge service lets you request our research team to source better contacts for you.

Where can I see ratings and reviews for Malicious Life?

Rephonic pulls ratings and reviews for Malicious Life from multiple sources, including Spotify, Apple Podcasts, Castbox, and Podcast Addict.

View all the reviews in one place instead of visiting each platform individually and use this information to decide if a show is worth pitching or not.

How do I access podcast episode transcripts for Malicious Life?

Rephonic provides full transcripts for episodes of Malicious Life. Search within each transcript for your keywords, whether they be topics, brands or people, and figure out if it's worth pitching as a guest or sponsor. You can even set-up alerts to get notified when your keywords are mentioned.

What guests have appeared on Malicious Life?

Recent guests on Malicious Life include:

1. Tony Ortega
2. John Atek
3. Heywood Telco
4. Vicky Nijies
5. George Lasry
6. Kenneth Ziren
7. Joe Sullivan
8. Perry Chen

To view more recent guests and their details, simply upgrade your Rephonic account. You'll also get access to a typical guest profile to help you decide if the show is worth pitching.

Find and pitch the right podcasts

We help savvy brands, marketers and PR professionals to find the right podcasts for any topic or niche. Get the data and contacts you need to pitch podcasts at scale and turn listeners into customers.
Try it free for 7 days