Malicious Life Wins Big at the 17th Annual People's Choice Podcast Awards
The Malicious Life Podcast Team is excited to announce that we won the This Week in Tech Technology Category honor at the 17th Annual People's Choice Podcast Awards...

Lital Asher-Dotan
Discovering just one component of an attack can help an organization find additional components of the campaign, eventually leading to the entire hacking operation being revealed. A Cybereason customer used this method to discover an advanced persistent threat that had infiltrated its environment more than a year earlier. The organization assumed it had been hacked, but couldn’t find evidence to support this hypothesis.
By deploying Cybereason, the company was able to discover that the attackers had used legitimate processes to carry out malicious behavior. These tactics created a trail of evidence that, when followed, unraveled the entire attack. Ultimately, hackers managed to compromise 12 machines, including a domain name controller, giving them access to all the organization’s user names and passwords.
Lital is a Marketing Team Leader, Storyteller, Technology Marketing Expert. She joined Cybereason as the first marketing hire and built a full marketing department. Specializing in brand building, product marketing, communication and content. Passionate about building ROI-driven marketing teams.
The Malicious Life Podcast Team is excited to announce that we won the This Week in Tech Technology Category honor at the 17th Annual People's Choice Podcast Awards...
Alexey Ivanov thought he had a brilliant idea: hack American corporations and then blackmail them to force them to contract his services as a security consultant - so what could go wrong? Check it out...
The Malicious Life Podcast Team is excited to announce that we won the This Week in Tech Technology Category honor at the 17th Annual People's Choice Podcast Awards...
Alexey Ivanov thought he had a brilliant idea: hack American corporations and then blackmail them to force them to contract his services as a security consultant - so what could go wrong? Check it out...
Get the latest research, expert insights, and security industry news.
Subscribe