Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
don't worry if you don't have an account with us, we'll create one
[{"meta":{"author":"Malicious Life","authorlink":""},"src":"https:\/\/media.blubrry.com\/security_all_in\/api.podcache.net\/episodes\/7794ad9f-87ff-42ce-ba06-cf27c1fa77d1\/stream.mp3","thumb":{"src":"https:\/\/images.lystnfm.com\/tr:n-app_thumbnail_medium\/podcastsnw-202203\/d0ad46-45c9-5f55-89fd09_800.png"},"title":"Ghost In The Machine","link":"javascript:;","id":"item-749170"},{"meta":{"author":"Malicious Life","authorlink":""},"src":"https:\/\/pscrb.fm\/rss\/p\/audio3.redcircle.com\/episodes\/7794ad9f-87ff-42ce-ba06-cf27c1fa77d1\/stream.mp3","thumb":{"src":"https:\/\/images.lystnfm.com\/tr:n-app_thumbnail_medium\/podcastsnw-202307\/34050e-d6a1-6150-e33dff_800.png"},"title":"Ghost In The Machine","link":"javascript:;","id":"item-158135496"},{"meta":{"author":"Malicious Life","authorlink":""},"src":"https:\/\/audio3.redcircle.com\/episodes\/7794ad9f-87ff-42ce-ba06-cf27c1fa77d1\/stream.mp3","thumb":{"src":"https:\/\/images.lystnfm.com\/tr:n-app_thumbnail_medium\/podcastsnw-202307\/34050e-d6a1-6150-e33dff_800.png"},"title":"Ghost In The Machine","link":"javascript:;","id":"item-74174674"}]