Understanding China [ML B-Side]

Understanding China [ML B-Side]

Should The U.S. Ban Chinese and Russian Technology?

Every year, seemingly, there’s a new story of some software – like ‘Tik Tok’ or ‘FaceApp’ – from a hostile country that may or may not be a security threat to us in the west. So what should be done in cases like this? What if the U.S. just banned all technology from Russia and Ch ...  Show more

Jack Rhysider, Darknet Diaries [ML B-Side]

Darknet Diaries, Jack Rhysider’s show, is the most popular cyber security podcast – and one of the most successful tech podcasts in the US in general. Eliad Kimhy spoke with Jack about the origins of Darknet Diaries, his heroes and role models, and the effect the show’s success h ...  Show more

The Tesla Hack

It’s every company’s nightmare: a mysterious stranger approached an employee of Tesla’s Gigafactory in Nevada, and offered him 1 million dollars to do a very simple job – insert a malware-laden USB flash drive into a computer in the company, and keep it running for 8 hours. 

John McAfee

What do you get when you take a hypersexual, drug enthusiast gun-toting paranoid – and add some serious amounts of money to the mix? You get a life so bizarre, so unbelievably extreme, that people will tell its story even after you’re long gone. Murder, rape, drugs, lies and a po ...  Show more

RSA Breach FollowUp: Are We Doing Security Right? [ML B-Side]

Nate Nelson talks to Art Coviello, Former CEO of RSA Security, and Malcolm Harkins, Vice President & Chief Security Officer at Intel, about the current cyber security landscape – 10 years after the RSA Breach. 

DeadRinger [ML B-Side]

Nate Nelson talks to Assaf Dahan, Sr. Director and Head of Threat Research at Cybereason’s Nocturnus team about a recent attack they uncovered, on multiple major Telecommunication companies. 

The Jester

The Jester is a patriotic, pro-American Hacktivist that since 2010 has waged a personal cyberwar against an array of targets he considers to be “the bad guys.” But detractors have insinuated that some of the Jester’s operations were little more than internet sleight-of-hand. So, ...  Show more

The State of Credit Card Security [ML B-Side]

In 2005, when Albert Gonzalez was hacking his way into the networks of many retail chains in the US, credit cards were still very insecure: magnetic stripes and signed receipts did little to stop smart hackers such as Gonzalez and his crew. Sherri Davidoff talks to Nate Nelson ab ...  Show more

Albert Gonzalez, Part 3

In early 2007, a Secret Service agent operating out of San Diego takes a flight halfway across the world. He’s going to meet with Europe’s most prolific stolen card salesman. It is this meeting that will be the beginning of the end for Albert Gonzalez and his ‘All Star’ crew of h ...  Show more

DerbyCon – Dave Kennedy [ML B-Side]

DerbyCon was all about making the community – a family. Dave Kennedy, one of the founders of DerbyCon, talks about the unique vibe of the conference, his fear of clowns, and why he’ll never – NEVER – listen to a Busta Rhymes album again. 

Albert Gonzalez, Part 2

Working with the Secret Service, Albert Gonzalez was outstanding. He was such a good employee, in fact, that they had him do seminars, and speak at government conferences. At one point he met personally with the then Director of the Secret Service. Albert gave a presentation, and ...  Show more

Jeff Moss: DEF CON [ML B-Side]

Jeff Moss, founder of the DEF CON Hacker convention (and also the BlackHat convention), talks to Eliad about the origins of DEF CON, its “interesting” relationship with law enforcement agencies, and some of the notable shenanigans the conference attendees pulled off over the year ...  Show more

Albert Gonzalez, Part 1

It was as a teenager that Albert Gonzalez–one of the few greatest cybercriminals in history–developed the obsession that would go on to ruin his life. Gonzalez and some of his friends would go on to pull off some of the most remarkable crimes in the history of computers – but the ...  Show more

The History of THOTCON Hacking Conference [Malicious B-Side]

THOTCON is not your ordinary, run-of-the-mill security conference – and it’s even obvious from the moment you browse their website. How did a local, small-scale event in Chicago, grow to become a major cybersecurity conference, and what is its connection to The Matrix movie? Prod ...  Show more

China’s Unrestricted Warfare, Part 3

For more than a decade, China orchestrated a sophisticated espionage campaign against Nortel Networks, using Huawei, Chinese civilians working in Canada, and even organized crime gangs to steal important technical and operational information. When Nortel finally fell, the Chinese ...  Show more

Colonial Pipeline & DarkSide: Assaf Dahan [B-Side]

On Friday, May 7th, 2021, Colonial Pipeline suffered a cyberattack that forced the company to shut down its operations. As a result, gasoline outages were reported in many East Coast states. The entity behind the attack is a criminal group known as DarkSide. Nate Nelson, our Sr. ...  Show more

RSA Breach, Part 2

In the wake of RSA’s disclosure of the breach, the company cyber analysts chose not to boot the attackers off their network – but followed their activities closely, trying to figure out their identities and motives. For the first time since the actual breach, a decade ago, we’ll ...  Show more

RSA Breach: The Untold Story, Part 1

In March 2011, RSA was facing a terrible dilemma. An attacker siphoned data relating to SecureID, the company’s flagship product used by thousands of high-profile clients around the world – but it was unknown whether the attacker also stole the cryptographic key needed to deciphe ...  Show more

China’s Unrestricted Warfare, Part 2

In the early 2000s, Nortel was consciously, intentionally, aggressively positioning itself as a partner and a friend of China. At the same time, it was China’s number one target for corporate espionage – and an early victim of its new ‘Unrestricted Warfare’ doctrine.