Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
don't worry if you don't have an account with us, we'll create one
[{"meta":{"author":"Malicious Life","authorlink":""},"src":"https:\/\/audio3.redcircle.com\/episodes\/cac938a0-456f-4c60-a43e-e016d5bfee59\/stream.mp3","thumb":{"src":"https:\/\/images.lystnfm.com\/wp\/tr:n-app_thumbnail_medium\/https:\/\/media.redcircle.com\/images\/2024\/4\/16\/18\/d28b31bb-6501-483f-b566-6b1cd95e9cc9_malicious_2500.jpg"},"title":"The Y2K Bug, Part 2","link":"javascript:;","id":"item-130449154"},{"meta":{"author":"Malicious Life","authorlink":""},"src":"https:\/\/audio3.redcircle.com\/episodes\/fbe18f2d-76f0-491d-bebb-5ddd5a929f33\/stream.mp3","thumb":{"src":"https:\/\/images.lystnfm.com\/wp\/tr:n-app_thumbnail_medium\/https:\/\/media.redcircle.com\/images\/2024\/3\/31\/9\/b39abede-2625-42a8-8cce-3b9c023a335a_malicious_2500.jpg"},"title":"The Y2K Bug, Part 1","link":"javascript:;","id":"item-125825311"},{"meta":{"author":"Malicious Life","authorlink":""},"src":"https:\/\/audio3.redcircle.com\/episodes\/4fe29daf-4c22-405e-a6ca-f6dfed121758\/stream.mp3","thumb":{"src":"https:\/\/images.lystnfm.com\/wp\/tr:n-app_thumbnail_medium\/https:\/\/media.redcircle.com\/images\/2024\/3\/19\/14\/5c913c2f-4978-4de0-a7ac-4c34ddf7ff60_malicious_2500.jpg"},"title":"Can You Bomb a Hacker?","link":"javascript:;","id":"item-122505131"}]