Malicious Life cover image

Malicious Life

Latest episodes

undefined
Oct 4, 2022 • 30min

Hacking Stock Markets, Part 1

Hacking Stock Markets, Part 1Advertising Inquiries: https://redcircle.com/brands
undefined
Sep 27, 2022 • 24min

What’s it's Like to Fight LulzSec [ML B-Side]

What’s it's Like to Fight LulzSec [ML B-Side]Advertising Inquiries: https://redcircle.com/brands
undefined
Sep 18, 2022 • 33min

"King Kimble": Kim DotCom

The US government says that Kim Schmitz, better know as Kim DotCom, is the leader of a file sharing crime ring. He sees himself as a an internet freedom fighter: a fugitive on the run from vindictive overly-powerful governments. Can King Kimble escape the wrath of the USA? Advertising Inquiries: https://redcircle.com/brands
undefined
Sep 13, 2022 • 26min

Hacking Multi-Factor Authentication

Multi-Factor Authentication (MFA) is usually considered a better solution for authentication than just using passwords. But Roger Grimes, a veteran security professional, and a Data-Driven Defense Evangelist claims that the sense of security current MFA solutions provides us - is false. Advertising Inquiries: https://redcircle.com/brands
undefined
Sep 5, 2022 • 28min

Hacking Language Models

Language models are everywhere today: they run in the background of Google Translate and other translation tools; they help operate voice assistants like Alexa or Siri; and most interestingly, they are available via several experiential projects trying to emulate natural conversations, such as OpenAI’s GPT-3 and Google’s LaMDA. Can these models be hacked to gain access to the sensitive information they learned from their training data? Advertising Inquiries: https://redcircle.com/brands
undefined
Aug 31, 2022 • 25min

Software Bill of Materials (SBOMs) [ML BSide]

Software Bill of Materials (SBOMs) [ML BSide]Advertising Inquiries: https://redcircle.com/brands
undefined
Aug 22, 2022 • 32min

Leo Kuvayev– The Czar of Spammers

Criminals, particularly cyber criminals, aren’t “good” people; in most cases, they do have their own personal boundaries. Every once in a while, you encounter a criminal who’s different. Someone who seems not to have limits at all. A ruthless person, for whom the goal truly justifies the means. Leo Kuvayev is that kind of a person - and that made him so successful as a cyber-criminal. But even a genius criminal can go just one step too far.Advertising Inquiries: https://redcircle.com/brands
undefined
Aug 14, 2022 • 26min

"A CISO's Nightmare": Israel Baron on Railway Secuirty

"A CISO's Nightmare": Israel Baron on Railway SecuirtyAdvertising Inquiries: https://redcircle.com/brands
undefined
Aug 8, 2022 • 27min

“Designed by criminals, for criminals”: Operation Trojan Shield

“Designed by criminals, for criminals”: Operation Trojan ShieldAdvertising Inquiries: https://redcircle.com/brands
undefined
Aug 1, 2022 • 29min

Andrew Ginter: A 40-Years-Old Backdoor [ML-BSide]

Andrew Ginter: A 40-Years-Old Backdoor [ML-BSide]Advertising Inquiries: https://redcircle.com/brands

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode