malicious.life
Open in
urlscan Pro
161.156.161.99
Public Scan
URL:
https://malicious.life/
Submission: On October 24 via api from GR — Scanned from DE
Submission: On October 24 via api from GR — Scanned from DE
Form analysis
1 forms found in the DOMPOST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/3354902/b2c353f7-c8fe-45c6-89b4-0be6cc50b04f
<form novalidate="" accept-charset="UTF-8" action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/3354902/b2c353f7-c8fe-45c6-89b4-0be6cc50b04f" enctype="multipart/form-data"
id="hsForm_b2c353f7-c8fe-45c6-89b4-0be6cc50b04f_menusubscribeform" method="POST"
class="hs-form stacked hs-form-private hsForm_b2c353f7-c8fe-45c6-89b4-0be6cc50b04f hs-form-b2c353f7-c8fe-45c6-89b4-0be6cc50b04f hs-form-b2c353f7-c8fe-45c6-89b4-0be6cc50b04f_b262b55b-ebe7-4195-b255-c0536f709b4f"
data-form-id="b2c353f7-c8fe-45c6-89b4-0be6cc50b04f" data-portal-id="3354902" target="target_iframe_b2c353f7-c8fe-45c6-89b4-0be6cc50b04f_menusubscribeform" data-reactid=".hbspt-forms-0">
<div class="hs_email hs-email hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-0.1:$0"><label id="label-email-b2c353f7-c8fe-45c6-89b4-0be6cc50b04f_menusubscribeform" class="" placeholder="Enter your Email"
for="email-b2c353f7-c8fe-45c6-89b4-0be6cc50b04f_menusubscribeform" data-reactid=".hbspt-forms-0.1:$0.0"><span data-reactid=".hbspt-forms-0.1:$0.0.0">Email</span><span class="hs-form-required"
data-reactid=".hbspt-forms-0.1:$0.0.1">*</span></label>
<legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$0.1"></legend>
<div class="input" data-reactid=".hbspt-forms-0.1:$0.$email"><input id="email-b2c353f7-c8fe-45c6-89b4-0be6cc50b04f_menusubscribeform" class="hs-input" type="email" name="email" required="" placeholder="Enter your Email" value=""
autocomplete="email" data-reactid=".hbspt-forms-0.1:$0.$email.0" inputmode="email"></div>
</div>
<div class="legal-consent-container" data-reactid=".hbspt-forms-0.2">
<div class="hs-richtext" data-reactid=".hbspt-forms-0.2.0">
<p>By providing my contact information and ticking the box below, I agree to Cybereason’s <a href="https://www.cybereason.com/privacy-policy">Privacy Policy</a> and consent to communications from Cybereason at the contact information provided.
</p>
</div>
<div data-reactid=".hbspt-forms-0.2.1:0">
<div class="hs-dependent-field" data-reactid=".hbspt-forms-0.2.1:0.$LEGAL_CONSENT=1subscription_type_4864053">
<div class="hs_LEGAL_CONSENT.subscription_type_4864053 hs-LEGAL_CONSENT.subscription_type_4864053 hs-fieldtype-booleancheckbox field hs-form-field"
data-reactid=".hbspt-forms-0.2.1:0.$LEGAL_CONSENT=1subscription_type_4864053.$LEGAL_CONSENT=1subscription_type_4864053">
<legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.2.1:0.$LEGAL_CONSENT=1subscription_type_4864053.$LEGAL_CONSENT=1subscription_type_4864053.1"></legend>
<div class="input" data-reactid=".hbspt-forms-0.2.1:0.$LEGAL_CONSENT=1subscription_type_4864053.$LEGAL_CONSENT=1subscription_type_4864053.$LEGAL_CONSENT=1subscription_type_4864053">
<ul class="inputs-list" data-reactid=".hbspt-forms-0.2.1:0.$LEGAL_CONSENT=1subscription_type_4864053.$LEGAL_CONSENT=1subscription_type_4864053.$LEGAL_CONSENT=1subscription_type_4864053.0">
<li class="hs-form-booleancheckbox" data-reactid=".hbspt-forms-0.2.1:0.$LEGAL_CONSENT=1subscription_type_4864053.$LEGAL_CONSENT=1subscription_type_4864053.$LEGAL_CONSENT=1subscription_type_4864053.0.0"><label
for="LEGAL_CONSENT.subscription_type_4864053-b2c353f7-c8fe-45c6-89b4-0be6cc50b04f_menusubscribeform" class="hs-form-booleancheckbox-display"
data-reactid=".hbspt-forms-0.2.1:0.$LEGAL_CONSENT=1subscription_type_4864053.$LEGAL_CONSENT=1subscription_type_4864053.$LEGAL_CONSENT=1subscription_type_4864053.0.0.0"><input
id="LEGAL_CONSENT.subscription_type_4864053-b2c353f7-c8fe-45c6-89b4-0be6cc50b04f_menusubscribeform" class="hs-input" type="checkbox" name="LEGAL_CONSENT.subscription_type_4864053" value="true"
data-reactid=".hbspt-forms-0.2.1:0.$LEGAL_CONSENT=1subscription_type_4864053.$LEGAL_CONSENT=1subscription_type_4864053.$LEGAL_CONSENT=1subscription_type_4864053.0.0.0.0"><span
data-reactid=".hbspt-forms-0.2.1:0.$LEGAL_CONSENT=1subscription_type_4864053.$LEGAL_CONSENT=1subscription_type_4864053.$LEGAL_CONSENT=1subscription_type_4864053.0.0.0.1"><span>I agree to receive other communications from
Cybereason.</span></span></label></li>
</ul>
</div>
</div>
</div>
<legend class="hs-field-desc checkbox-desc" style="display:none;" data-reactid=".hbspt-forms-0.2.1:0.1"></legend>
</div>
<div class="hs-richtext" data-reactid=".hbspt-forms-0.2.2">
<p></p>
</div>
<div class="hs-richtext" data-reactid=".hbspt-forms-0.2.3">
<p></p>
</div>
</div>
<div class="hs_submit hs-submit" data-reactid=".hbspt-forms-0.5">
<div class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.5.0"></div>
<div class="actions" data-reactid=".hbspt-forms-0.5.1"><input type="submit" value="Press Enter to Subscribe" class="hs-button primary large" data-reactid=".hbspt-forms-0.5.1.0"></div>
</div><noscript data-reactid=".hbspt-forms-0.6"></noscript><input name="hs_context" type="hidden"
value="{"rumScriptExecuteTime":1089.2999997138977,"rumServiceResponseTime":1515.8999996185303,"rumFormRenderTime":1.799999713897705,"rumTotalRenderTime":1518.3999996185303,"rumTotalRequestTime":410.3999996185303,"legalConsentOptions":"{\"communicationConsentCheckboxes\":[{\"communicationTypeId\":4864053,\"label\":\"<span>I agree to receive other communications from Cybereason.</span>\",\"required\":false}],\"legitimateInterestLegalBasis\":\"LEGITIMATE_INTEREST_PQL\",\"communicationConsentText\":\"<p>By providing my contact information and ticking the box below, I agree to Cybereason’s <a href=\\\"https://www.cybereason.com/privacy-policy\\\">Privacy Policy</a> and consent to communications from Cybereason at the contact information provided.</p>\",\"processingConsentType\":\"IMPLICIT\",\"processingConsentText\":\"<p></p>\",\"privacyPolicyText\":\"<p></p>\",\"isLegitimateInterest\":false}","renderRawHtml":"true","embedAtTimestamp":"1666646378334","formDefinitionUpdatedAt":"1533235576431","pageUrl":"https://malicious.life/","pageTitle":"Cybersecurity History Podcast | Malicious Life","source":"FormsNext-static-5.545","sourceName":"FormsNext","sourceVersion":"5.545","sourceVersionMajor":"5","sourceVersionMinor":"545","timestamp":1666646378334,"userAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.5249.119 Safari/537.36","originalEmbedContext":{"formInstanceId":"menusubscribeform","portalId":"3354902","formId":"b2c353f7-c8fe-45c6-89b4-0be6cc50b04f","target":"#hbspt-menu-form-holder"},"boolCheckBoxFields":"LEGAL_CONSENT.subscription_type_4864053","formInstanceId":"menusubscribeform","renderedFieldsIds":["email","LEGAL_CONSENT.subscription_type_4864053"],"formTarget":"#hbspt-menu-form-holder","correlationId":"e75aadfc-cfc1-4782-9c60-dd82161e7f7f","captchaStatus":"NOT_APPLICABLE"}"
data-reactid=".hbspt-forms-0.7"><iframe name="target_iframe_b2c353f7-c8fe-45c6-89b4-0be6cc50b04f_menusubscribeform" style="display:none;" data-reactid=".hbspt-forms-0.8"></iframe>
</form>
Text Content
LATEST EPISODES * Vishing: Voice Scams [ML BSide] Authentication has come a long way since the 1980s or 90s, but when it comes to phone calls - we’re still in the Middle Ages. Vishing, or Voice Scams, are ... * Hacking Stock Markets, Part 2 Financial markets make good targets for criminals: after all, that's where the big money is. Surprisingly, many of these criminals are not your run-of-the-mill black hat hacker, but brokers registered ... * What Would Happen if CBS Got Hacked? [ML BSide] Media companies probably get hacked no more than other, non-media oriented organizations such as hospitals, banks, etc. But these hacks are often more visible and more memorable because… well, media ... * Cybersecurity History * Podcast * Listener Survey * Twitter * About Us * Sponsors * Contact Us * Cybereason Subscribe Email* By providing my contact information and ticking the box below, I agree to Cybereason’s Privacy Policy and consent to communications from Cybereason at the contact information provided. * I agree to receive other communications from Cybereason. Press Enter to Subscribe Invalid Email Failed to Send MALICIOUS LIFE BY CYBEREASON tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians Listen Below * Season 1 * Season 1.5- Stuxnet * Season 2 – The Invisible War * Season 3 * Specials & Interviews EPISODE 1 Ghost in the Machine PLAY NOW EPISODE 2 The Dark Avenger PLAY NOW EPISODE 3 Spam Empire PLAY NOW EPISODE 4 Big Cannons PLAY NOW EPISODE 5 The Roots of Evil: Ransomware, Pt. 1 PLAY NOW EPISODE 6 Hell to Pay: Ransomware, Part 2 PLAY NOW EPISODE 7 Stuxnet, part 1 PLAY NOW EPISODE 8 Stuxnet, part 2 PLAY NOW EPISODE 9 Stuxnet, part 3 PLAY NOW EPISODE 10 The Whistleblowers PLAY NOW EPISODE 11 The Propaganda PLAY NOW EPISODE 12 The Soldiers of North Korea PLAY NOW EPISODE 13 Weapons of Mass Disruption PLAY NOW EPISODE 14 Deception PLAY NOW EPISODE 15 Friend or Foe PLAY NOW EPISODE 16 The Trojan Horse Affair PLAY NOW EPISODE 17 Super Spies PLAY NOW EPISODE 18 Cyber Terrorism PLAY NOW EPISODE 19 HackBack PLAY NOW EPISODE 20 Fancy Bear, Cozy Bear PLAY NOW EPISODE 21 The Legalities of the Cyber War PLAY NOW EPISODE 22 The Half Life 2 Hack PLAY NOW EPISODE 23 The Morris Worm Pt. 1 PLAY NOW EPISODE 24 The Morris Worm Pt. 2 PLAY NOW EPISODE 25 GhostNet PLAY NOW EPISODE 26 The Melissa Virus PLAY NOW EPISODE 27 Shamoon - The Biggest Hack In History PLAY NOW EPISODE 28 WoW: Corrupted Blood PLAY NOW EPISODE 29 The Target Hack PLAY NOW EPISODE 30 The Ashley Madison Hack Part 1 PLAY NOW EPISODE 31 The Ashley Madison Hack Part 2 PLAY NOW EPISODE 32 The Ashley Madison Hack Part 2 PLAY NOW EPISODE 33 China Vs. Github PLAY NOW EPISODE 34 Gene Spafford on the Morris Worm & ... PLAY NOW EPISODE 35 The Jerusalem Virus, Part 1 PLAY NOW EPISODE 36 The Jerusalem Virus, Part 2 PLAY NOW EPISODE 37 The Ethereum DAO Hack PLAY NOW EPISODE 38 Dave Kennedy: The Psychological Principles of Social ... PLAY NOW EPISODE 40 The Fall Of Mt. Gox - Part ... PLAY NOW EPISODE 42 The Fall Of Mt. Gox - Part ... PLAY NOW EPISODE 43 Marconi & The Maskelyne Affair PLAY NOW EPISODE 44 DeCSS: Hackers Vs Hollywood PLAY NOW EPISODE 45 The Equifax Data Breach Pt. I: A ... PLAY NOW EPISODE 46 The Equifax Data Breach Pt. II: The ... PLAY NOW EPISODE 47 The WANK Worm, Part 1 PLAY NOW EPISODE 48 The WANK Worm, Part 2 PLAY NOW EPISODE 49 The U.S vs. Gary McKinnon PLAY NOW EPISODE 50 'Pa Bell' Vs. Youth International Party Line PLAY NOW EPISODE 51 Operation SoftCell PLAY NOW EPISODE 52 Conficker PLAY NOW EPISODE 53 Are Ad Blockers Malicious? PLAY NOW EPISODE 54 Responding to a Cyber Attack with Missiles PLAY NOW EPISODE 55 Operation Aurora, Part 1 PLAY NOW EPISODE 56 Operation Aurora, Part 2 PLAY NOW EPISODE 57 Listeners Survey Special PLAY NOW EPISODE 58 How is Spyware Legal? PLAY NOW EPISODE 59 Gozi, Part 1: The Rise of Malware-as-a-Service PLAY NOW EPISODE 60 B-Side: Lodrina Cherne On Stalkerware PLAY NOW EPISODE 62 Gozi, Part 2: Thief-in-Law PLAY NOW EPISODE 63 Gozi B-Side: Amit Serper & Sam Curry PLAY NOW EPISODE 64 What's the problem with Cyber Insurance? PLAY NOW EPISODE 65 Human Side Channels PLAY NOW EPISODE 66 Sam Curry: The 2020 Crystal Ball PLAY NOW EPISODE 67 GAN and Deep Fakes, Part 1 PLAY NOW EPISODE 68 Deep Fakes, Part 2: Man Vs. Machine PLAY NOW EPISODE 70 Triton: A Malware Designed To Kill Humans, ... PLAY NOW EPISODE 71 Triton, Part 2: The World’s Most Dangerous ... PLAY NOW EPISODE 72 How To Defend A Bank, Part 1: ... PLAY NOW EPISODE 73 How To Defend A Bank, Pt. II: ... PLAY NOW EPISODE 74 ToTok, Part 1: How to Convince Someone ... PLAY NOW EPISODE 75 ToTok, Part 2: The Masterminds of Mobile ... PLAY NOW EPISODE 77 ToTok, Part 3: Becoming a Spyware Superpower PLAY NOW EPISODE 78 The Max Headroom Signal Hijack PLAY NOW EPISODE 79 The Huawei Ban, Part 1 PLAY NOW EPISODE 80 The Huawei Ban, Part 2 PLAY NOW EPISODE 81 The Problem With Passwords PLAY NOW EPISODE 82 Maintaining Secure Business Continuity With A Remote ... PLAY NOW EPISODE 83 No Honor Among Thieves PLAY NOW EPISODE 84 SegWit2x, or - The Year Bitcoiners Will ... PLAY NOW EPISODE 85 Hacking Fortnite Accounts (CPRadio) PLAY NOW EPISODE 86 SegWit2x, Part 2 PLAY NOW EPISODE 87 SegWit2x, Part 3 PLAY NOW EPISODE 88 From Ransomware To Blackmail, With Assaf Dahan PLAY NOW EPISODE 89 Protecting The "Panama Papers" Whistleblower PLAY NOW EPISODE 90 Multi-Stage Ransomware (Live) PLAY NOW EPISODE 91 The Great Firewall of China - Part ... PLAY NOW EPISODE 92 The Great Firewall of China, Pt. 2: ... PLAY NOW EPISODE 93 Yahoo's Ugly Death, Part 1 PLAY NOW EPISODE 94 Yahoo's Ugly Death, Part 2 PLAY NOW EPISODE 95 MDR Vs. The TrickBot Gang PLAY NOW EPISODE 96 Election Hacking, Part 1 PLAY NOW EPISODE 97 Election Hacking, Part 2 PLAY NOW EPISODE 98 Op. GUNMAN & The World's First Keylogger PLAY NOW EPISODE 99 Jan Sloot's Incredible Data Compression System PLAY NOW EPISODE 100 100th Episode Special PLAY NOW EPISODE 101 Special: The SolarWinds Hack PLAY NOW EPISODE 102 Breaking Into Secure Buildings PLAY NOW EPISODE 103 Clearview AI PLAY NOW EPISODE 104 Should Law Enforcement Use Facial Recognition? Pt. ... PLAY NOW EPISODE 105 Facial Recognition in Law Enforcement, Pt. 2 PLAY NOW EPISODE 106 NotPetya, Part 1 PLAY NOW EPISODE 107 NotPetya, Part 2 PLAY NOW EPISODE 108 The MS Exchange Hack [ML B-Side] PLAY NOW EPISODE 109 The Story of 'L0pht', Part 1 PLAY NOW EPISODE 110 'L0pht', Part 2 - The End PLAY NOW EPISODE 111 Shutting Down The Internet in 30 Minutes: ... PLAY NOW EPISODE 112 Can Nuclear Power Plants Be Hacked? PLAY NOW EPISODE 113 China's Unrestricted Warfare, Part 1 PLAY NOW EPISODE 114 Creating a Grassroots Security Conference: Jack Daniel ... PLAY NOW EPISODE 115 China's Unrestricted Warfare, Part 2 PLAY NOW EPISODE 116 RSA Breach: The Untold Story, Part 1 PLAY NOW EPISODE 117 RSA Breach: The Untold Story, Part 2 PLAY NOW EPISODE 118 Colonial Pipeline & DarkSide: Assaf Dahan [B-Side] PLAY NOW EPISODE 119 China's Unrestricted Warfare, Part 3 PLAY NOW EPISODE 120 THOTCON Hacking Conference [B-Side] PLAY NOW EPISODE 121 Albert Gonzalez, Part 1 PLAY NOW EPISODE 122 Jeff Moss: DEF CON [ML B-Side] PLAY NOW EPISODE 123 Albert Gonzalez, Part 2 PLAY NOW EPISODE 124 DerbyCon - Dave Kennedy [ML B-Side] PLAY NOW EPISODE 125 Albert Gonzalez, Part 3 PLAY NOW EPISODE 126 The State of Credit Card Security [ML ... PLAY NOW EPISODE 127 The Jester PLAY NOW EPISODE 128 DeadRinger [ML B-Side] PLAY NOW EPISODE 129 RSA Breach FollowUp: Are We Doing Security ... PLAY NOW EPISODE 130 John McAfee PLAY NOW EPISODE 131 Understanding China [ML B-Side] PLAY NOW EPISODE 132 The Tesla Hack PLAY NOW EPISODE 133 Jack Rhysider, Darknet Diaries [ML B-Side] PLAY NOW EPISODE 134 Should The U.S. Ban Chinese and Russian ... PLAY NOW EPISODE 135 The MITRE ATT&CK Framework [ML B-Side] PLAY NOW EPISODE 136 Smart TVs: A New Battlefield PLAY NOW EPISODE 137 Operation GhostShell [ML B-Side] PLAY NOW EPISODE 138 Marcus Hutchins: A Controversial Hero PLAY NOW EPISODE 139 In Defense Of The NSA [ML B-Side] PLAY NOW EPISODE 140 Operation Flyhook, Part 1 PLAY NOW EPISODE 141 IP Hijacking [ML BSide] PLAY NOW EPISODE 142 Operation Flyhook, Part 2 PLAY NOW EPISODE 143 Wild West Hackin' Fest [ML BSide] PLAY NOW EPISODE 144 Tay: A Teenage Bot Gone Rogue PLAY NOW EPISODE 145 "Ransomware Attackers Don’t Take Holidays" [ML B-Side] PLAY NOW EPISODE 146 Shawn Carpenter: A Cyber Vigilante PLAY NOW EPISODE 147 A digital 'vaccine' for Log4Shell [ML BSide] PLAY NOW EPISODE 148 Does Code === Free Speech? PLAY NOW EPISODE 149 How the Internet Changed the NSA [ML ... PLAY NOW EPISODE 150 The Mystery of Cicada 3301 PLAY NOW EPISODE 151 Hacker Highschool: Pete Herzog [ML BSide] PLAY NOW EPISODE 152 The Bloody Origins of Israel's Cyber Security ... PLAY NOW EPISODE 153 Why aren't SMBs investing in Cyber Security? ... PLAY NOW EPISODE 154 Crypto AG - The Greatest Espionage Operation ... PLAY NOW EPISODE 155 Why Do APTs Use Ransomware? [ML B-Side] PLAY NOW EPISODE 156 Crypto AG, Part 2: The Death of ... PLAY NOW EPISODE 157 Quantum Cyber Security [ML BSide] PLAY NOW EPISODE 158 Crypto AG, Part 3: The Truth Is ... PLAY NOW EPISODE 159 How Resilient Is Our Banking System? [ML ... PLAY NOW EPISODE 160 Cyber PTSD PLAY NOW EPISODE 161 DIE - A New paradigm for Cybersecurity ... PLAY NOW EPISODE 162 No Airplane Hacking Episode PLAY NOW EPISODE 163 The Russia-Ukraine Cyberwar [ML B-Side] PLAY NOW EPISODE 164 The Aaron Swartz Story PLAY NOW EPISODE 165 MITRE Attack Flow [ML B-Side] PLAY NOW EPISODE 166 Operation Sundevil and the Birth of the ... PLAY NOW EPISODE 167 How to Russia-Proof Your Democracy [ML BSide] PLAY NOW EPISODE 168 Operation CuckooBees [ML B-Side] PLAY NOW EPISODE 169 What The LinkedIn Hack Taught Us About ... PLAY NOW EPISODE 170 Catching A Cybercriminal [ML B-Side] PLAY NOW EPISODE 171 Hackers vs. Spies: The Stratfor Leaks, Pt. ... PLAY NOW EPISODE 172 Hackers vs. Spies: The Stratfor Leaks, Pt. ... PLAY NOW EPISODE 173 Malicious LIVE: Celebrating 5 Years of Malicious ... PLAY NOW EPISODE 174 The “Cypherpunks” Who Invented Private Digital Money PLAY NOW EPISODE 175 Jacob Goldstein: The Future Of BitCoin [ML ... PLAY NOW EPISODE 176 Silk Road: The Amazon of drugs, Part ... PLAY NOW EPISODE 177 Kurtis Minder: Ransomware Negotiations [ML B-Side] PLAY NOW EPISODE 178 Silk Road: The Amazon of drugs, Part ... PLAY NOW EPISODE 179 Andrew Ginter: A 40-Year-Old Backdoor [ML B-Side] PLAY NOW EPISODE 180 “Designed by criminals, for criminals”: Operation Trojan ... PLAY NOW EPISODE 181 "A CISO's Nightmare": Israel Baron on Railway ... PLAY NOW EPISODE 182 Leo Kuvayev– The Czar of Spammers PLAY NOW EPISODE 183 Software Bill of Materials (SBOM) [ML B-side] PLAY NOW EPISODE 184 Hacking Language Models PLAY NOW EPISODE 185 Hacking Multi-Factor Authentication [ML B-side] PLAY NOW EPISODE 186 King Kimble : Kim DotCom PLAY NOW EPISODE 187 What it’s Like to Fight LulzSec [ML ... PLAY NOW EPISODE 188 Hacking Stock Markets, Part 1 PLAY NOW EPISODE 189 Vishing: Voice Scams [ML BSide] PLAY NOW EPISODE 190 Hacking Stock Markets, Part 2 PLAY NOW EPISODE 191 What Would Happen if CBS Got Hacked? ... PLAY NOW AMIT SERPER ... Amit Serper Interview - Holiday Special Episode PLAY NOW INTERVIEW SPECIAL ... Interview Special - Graham Cluley PLAY NOW © All Rights Reserved to Cybereason Inc. 2022