The Y2K Bug, Part 2
3 days, 4 hours ago |
malicious.life
The Y2K Bug, Part 1
2 weeks, 5 days ago |
malicious.life
Can You Bomb a Hacker?
1 month ago |
malicious.life
Kevin Mitnick, Part 2
1 month, 2 weeks ago |
malicious.life
Kevin Mitnick, Part 1
2 months ago |
malicious.life
SIM Registration: Security, or Surveillance?
2 months, 2 weeks ago |
malicious.life
The Mariposa Botnet
2 months, 4 weeks ago |
malicious.life
The Real Story of Citibank’s $10M Hack
3 months, 1 week ago |
malicious.life
How to Hack Into Satellites
3 months, 3 weeks ago |
malicious.life
Moonlight Maze
4 months, 1 week ago |
malicious.life
Volt Typhoon
4 months, 3 weeks ago |
malicious.life
Is NSO Evil? Part 2
5 months ago |
malicious.life
Is NSO Evil? Part 1
5 months, 2 weeks ago |
malicious.life
Silent Firewalls: The Underrepresentation of Women in Cyber
6 months, 2 weeks ago |
malicious.life
Operation Kudo
6 months, 4 weeks ago |
malicious.life
Can We Stop the AI Cyber Threat?
7 months, 2 weeks ago |
malicious.life
Is Generative AI Dangerous?
7 months, 4 weeks ago |
malicious.life
Why aren't there more bug bounty programs?
8 months, 1 week ago |
malicious.life
The Voynich Manuscript
8 months, 3 weeks ago |
malicious.life
Roman Seleznev: Did the Punishment Fit the Crime?
9 months, 1 week ago |
malicious.life
Sony BMG's Rootkit Fiasco
9 months, 3 weeks ago |
malicious.life
Ad Fraud, Part 2
10 months, 1 week ago |
malicious.life
Ad Fraud, Part 1
10 months, 2 weeks ago |
malicious.life
The Economics Of Cybersecurity
11 months ago |
malicious.life
The Reason You Don’t Have Data Privacy
11 months, 2 weeks ago |
malicious.life
The Reason You Don’t Have Data Privacy
11 months, 2 weeks ago |
malicious.life
How Entire Countries Can Lose the Internet
1 year ago |
malicious.life
Olympic Destroyer
1 year ago |
malicious.life
The Lawerence Berkeley Hack, Part 2
1 year ago |
malicious.life
The Lawerence Berkeley Hack, Part 1
1 year, 1 month ago |
malicious.life
The Lawerence Berkeley Hack, Part 1
1 year, 1 month ago |
malicious.life
Russian Propaganda, Explained [ML B-Side]
1 year, 1 month ago |
malicious.life
Russian Propaganda, Explained [ML B-Side]
1 year, 1 month ago |
malicious.life
Operation Ivy Bells
1 year, 1 month ago |
malicious.life
Why Do NFTs Disappear? [ML B-Side]
1 year, 2 months ago |
malicious.life
Why Do NFTs Disappear? [ML BSide]
1 year, 2 months ago |
malicious.life
The (Other) Problem with NFTs
1 year, 2 months ago |
malicious.life
The (Other) Problem with NFTs
1 year, 2 months ago |
malicious.life
SIM Swapping Follow Up [ML B-Side]
1 year, 2 months ago |
malicious.life
SIM Swapping Follow Up [ML B-Side]
1 year, 2 months ago |
malicious.life
You Should Be Afraid of SIM Swaps
1 year, 2 months ago |
malicious.life
You Should Be Afraid of SIM Swaps
1 year, 2 months ago |
malicious.life
FBI vs. REvil [ML BSide]
1 year, 3 months ago |
malicious.life
Cyberbunker, Part 2
1 year, 3 months ago |
malicious.life
Cyberbunker, Part 1
1 year, 3 months ago |
malicious.life
How Netflix Learned Cloud Security [ML B-Side]
1 year, 3 months ago |
malicious.life
How Netflix Learned Cloud Security
1 year, 3 months ago |
malicious.life
Fred Cohen: The Godfather of Computer Viruses [ML B-Side]
1 year, 4 months ago |
malicious.life
Fred Cohen: The Godfather of Computer Viruses [ML B-Side]
1 year, 4 months ago |
malicious.life
The Y2K Bug, Part 2
3 days, 4 hours ago |
malicious.life
Items published with this topic over the last 90 days.
Latest
The Y2K Bug, Part 2
3 days, 4 hours ago |
malicious.life
The Y2K Bug, Part 1
2 weeks, 5 days ago |
malicious.life
Can You Bomb a Hacker?
1 month ago |
malicious.life
Kevin Mitnick, Part 2
1 month, 2 weeks ago |
malicious.life
Kevin Mitnick, Part 1
2 months ago |
malicious.life
SIM Registration: Security, or Surveillance?
2 months, 2 weeks ago |
malicious.life
The Mariposa Botnet
2 months, 4 weeks ago |
malicious.life
The Real Story of Citibank’s $10M Hack
3 months, 1 week ago |
malicious.life
How to Hack Into Satellites
3 months, 3 weeks ago |
malicious.life
Moonlight Maze
4 months, 1 week ago |
malicious.life
Volt Typhoon
4 months, 3 weeks ago |
malicious.life
Is NSO Evil? Part 2
5 months ago |
malicious.life
Is NSO Evil? Part 1
5 months, 2 weeks ago |
malicious.life
Silent Firewalls: The Underrepresentation of Women in Cyber
6 months, 2 weeks ago |
malicious.life
Operation Kudo
6 months, 4 weeks ago |
malicious.life
Can We Stop the AI Cyber Threat?
7 months, 2 weeks ago |
malicious.life
Is Generative AI Dangerous?
7 months, 4 weeks ago |
malicious.life
Why aren't there more bug bounty programs?
8 months, 1 week ago |
malicious.life
The Voynich Manuscript
8 months, 3 weeks ago |
malicious.life
Roman Seleznev: Did the Punishment Fit the Crime?
9 months, 1 week ago |
malicious.life
Sony BMG's Rootkit Fiasco
9 months, 3 weeks ago |
malicious.life
Ad Fraud, Part 2
10 months, 1 week ago |
malicious.life
Ad Fraud, Part 1
10 months, 2 weeks ago |
malicious.life
The Economics Of Cybersecurity
11 months ago |
malicious.life
The Reason You Don’t Have Data Privacy
11 months, 2 weeks ago |
malicious.life
The Reason You Don’t Have Data Privacy
11 months, 2 weeks ago |
malicious.life
How Entire Countries Can Lose the Internet
1 year ago |
malicious.life
Olympic Destroyer
1 year ago |
malicious.life
The Lawerence Berkeley Hack, Part 2
1 year ago |
malicious.life
The Lawerence Berkeley Hack, Part 1
1 year, 1 month ago |
malicious.life
The Lawerence Berkeley Hack, Part 1
1 year, 1 month ago |
malicious.life
Russian Propaganda, Explained [ML B-Side]
1 year, 1 month ago |
malicious.life
Russian Propaganda, Explained [ML B-Side]
1 year, 1 month ago |
malicious.life
Operation Ivy Bells
1 year, 1 month ago |
malicious.life
Why Do NFTs Disappear? [ML B-Side]
1 year, 2 months ago |
malicious.life
Why Do NFTs Disappear? [ML BSide]
1 year, 2 months ago |
malicious.life
The (Other) Problem with NFTs
1 year, 2 months ago |
malicious.life
The (Other) Problem with NFTs
1 year, 2 months ago |
malicious.life
SIM Swapping Follow Up [ML B-Side]
1 year, 2 months ago |
malicious.life
SIM Swapping Follow Up [ML B-Side]
1 year, 2 months ago |
malicious.life
You Should Be Afraid of SIM Swaps
1 year, 2 months ago |
malicious.life
You Should Be Afraid of SIM Swaps
1 year, 2 months ago |
malicious.life
FBI vs. REvil [ML BSide]
1 year, 3 months ago |
malicious.life
Cyberbunker, Part 2
1 year, 3 months ago |
malicious.life
Cyberbunker, Part 1
1 year, 3 months ago |
malicious.life
How Netflix Learned Cloud Security [ML B-Side]
1 year, 3 months ago |
malicious.life
How Netflix Learned Cloud Security
1 year, 3 months ago |
malicious.life
Fred Cohen: The Godfather of Computer Viruses [ML B-Side]
1 year, 4 months ago |
malicious.life
Fred Cohen: The Godfather of Computer Viruses [ML B-Side]
1 year, 4 months ago |
malicious.life
Top (last 7 days)
The Y2K Bug, Part 2
3 days, 4 hours ago |
malicious.life
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Information Security Engineers
@ D. E. Shaw Research | New York City
Security Solution Architect
@ Civica | London, England, United Kingdom
Information Security Officer (80-100%)
@ SIX Group | Zurich, CH
Cloud Information Systems Security Engineer
@ Analytic Solutions Group | Chantilly, Virginia, United States
SRE Engineer & Security Software Administrator
@ Talan | Mexico City, Spain