Malicious Life Podcast: Dave Kennedy on the History of DerbyCon

Malicious Life Podcast: Dave Kennedy on the History of DerbyCon

DerbyCon was conceived with the notion that it was going to be all about making the security community a family. Dave Kennedy, one of the founders of DerbyCon, talks about the unique vibe of the conference, his fear of clowns, and why he'll never listen to a Busta Rhymes album ... Read More
Malicious Life Podcast: The Life and Exploits of Albert Gonzales Part 2

Malicious Life Podcast: The Life and Exploits of Albert Gonzales Part 2

In this second installment of the series (listen to Albert Gonzales Part 1 here), Gonzales is working with the Secret Service and apparently doing an outstanding job. He was such a good employee, in fact, that they had him doing seminars for staff and speaking at government-run conferences. At one ... Read More
Malicious Life Podcast: Jeff Moss on the History of DEF CON

Malicious Life Podcast: Jeff Moss on the History of DEF CON

Jeff Moss, founder of the DEF CON Hacker conference (as well as Black Hat), discusses the origins of DEF CON, its "interesting relationship” with law enforcement and intelligence agencies, and some of the notable shenanigans the conference attendees pulled off over the years - check it out… ... Read More
Malicious Life Podcast: The Life and Exploits of Albert Gonzales Part 1

Malicious Life Podcast: The Life and Exploits of Albert Gonzales Part 1

It was as a teenager that Albert Gonzalez, one of the greatest cybercriminals in history, developed the obsession that would go on to ruin his life. Gonzalez and some of his friends would go on to pull off some of the most remarkable crimes in the history of computers - ... Read More
Malicious Life Podcast: History of the THOTCON Hacking Conference

Malicious Life Podcast: History of the THOTCON Hacking Conference

THOTCON is not your ordinary, run-of-the-mill security conference, and it's obvious from the moment you browse their website. How did a local, small-scale event in Chicago grow to become a major cybersecurity conference? What is its connection to The Matrix movie? ... Read More
Malicious Life Podcast: China's Unrestricted Cyberwarfare Part 3

Malicious Life Podcast: China’s Unrestricted Cyberwarfare Part 3

For more than a decade, China orchestrated a sophisticated espionage campaign against Nortel Networks, using Huawei, Chinese civilians working in Canada, and even organized crime gangs to steal important technical and operational information. When Nortel finally fell, the Chinese were there to reap the rewards of their death ... Read More
Malicious Life Podcast: Inside the DarkSide Colonial Pipeline Attack

Malicious Life Podcast: Inside the DarkSide Colonial Pipeline Attack

On Friday, May 7th, 2021, Colonial Pipeline suffered a cyberattack that forced the company to shut down its operations. As a result, gasoline outages were reported across the U.S. East Coast ... Read More
Malicious Life Podcast: China's Unrestricted Cyberwarfare Part 2

Malicious Life Podcast: China’s Unrestricted Cyberwarfare Part 2

In China's Unrestricted Cyberwarfare Part 1 we explored the story of two Chinese military officers, veterans of the semi-conflict with Taiwan, who helped shape the role of cyber in modern warfare in China and beyond with special guest Lieutenant Colonel, USMC (retired) Bill Hagestad, a leading international authority on cyberwarfare ... Read More
Malicious Life Podcast: The Untold Story of the RSA Breach Part 2

Malicious Life Podcast: The Untold Story of the RSA Breach Part 2

In March of 2011, security vendor RSA was the target of an attack that compromised sensitive data related to the company's flagship SecureID product, a solution that was in-use by thousands of high-profile clients around the world including the U.S. government and an array of U.S. defense contractors. The company's ... Read More
Malicious Life Podcast: The Untold Story of the RSA Breach Part 1

Malicious Life Podcast: The Untold Story of the RSA Breach Part 1

In March of 2011, security vendor RSA was the target of an attack that compromised sensitive data related to the company's flagship SecureID product. The solution was in-use by thousands of high-profile clients around the world, including the U.S. government and an array of U.S. defense contractors. The company's leadership ... Read More