Paul's Security Weekly (Audio)

Paul's Security Weekly (Audio)

Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.

Episodes

July 24, 2025 131 mins

We chat with Material Security about protecting G Suite and MS365. How else are you monitoring the most commonly used cloud environments and applications?

In the security news:

  • Google Sues Badbox operators
  • Authenticated or Unauthenticated, big difference and my struggle to get LLMs to create exploits for me
  • Ring cameras that were not hacked
  • Malicous AURs
  • Killing solar farms
  • Weak passwords are all it takes
  • Microsoft's UEFI keys...
Mark as Played

In the security news:

  • The train is leaving the station, or is it?
  • The hypervisor will protect you, maybe
  • The best thing about Flippers are the clones
  • Also, the Flipper Zero as an interrogation tool
  • Threats are commercial and open-source
  • Who is still down with FTP?
  • AI bug hunters
  • Firmware for Russian drones
  • Merging Android and ChromOS
  • Protecting your assets with CVSS?
  • Patch Citrixbleed 2
  • Rowhammer comes to NVIDIA GPUs
  • I hear Mi...
Mark as Played

This week in the security news:

  • Citrixbleed 2 and so many failures
  • Ruckus leads the way on how not to handle vulnerabilities
  • When you have no egress
  • Applocker bypass
  • So you bought earbuds from TikTok
  • More gadgets and the crazy radio
  • Cheap drones and android apps
  • Best Mario Kart controller ever
  • VSCode: You're forked
  • Bluetooth earbuds and vulnerabilities
  • Do you remember Sound blaster cards?
  • NFC passport chips
  • Whack-a-disk

...

Mark as Played

This week, we dive into the world of Meshtastic and LoRa—two technologies empowering secure, long-range, and infrastructure-free communication. We'll talk about the origins of Meshtastic, how LoRa radio works, and why mesh networking is revolutionizing off-grid messaging for adventurers, hackers, emergency responders, and privacy advocates alike. We break down the available hardware, walk you through firmware installation, and shar...

Mark as Played

This conversation explores the intersection of cybersecurity and emerging technologies, focusing on innovative hacking techniques, the evolution of vulnerability management, and the critical importance of asset discovery. The discussion also delves into the implications of cyber warfare, the persistent threat of default passwords, and the integration of open source tools in enhancing security measures. The conversation delves into ...

Mark as Played
June 19, 2025 123 mins

This week: * The true details around Salt Typhoon are still unknown * The search for a portable pen testing device * Directories named "hacker2" are suspicious * Can a $24 cable compete with a $180 cable? * Hacking Tesla wall chargers * Old Zyxel exploits are new again * Hacking Asus drivers * Stealing KIAs - but not like you may think * Fake articles * Just give everything to LLMs, like Nmap * Retiring Floppy disks * An intern lea...

Mark as Played
June 12, 2025 130 mins

This week:

  • You got a Bad box, again
  • Cameras are expose to the Internet
  • EU and connected devices
  • Hydrophobia
  • NVRAM variables
  • Have you heard about IGEL Linux?
  • SSH and more NVRAM
  • AI skeptics are nuts, and AI doesn't make you more efficient
  • Trump Cybersecurity orders
  • I think I can root my Pixel 6
  • Decentralized Wordpres plugin manager
  • Threat actor naming conventions
  • I have the phone number linked to your Google account
  • Fortinet fla...
Mark as Played

Two parts to this episode:

  • Tech Segment: Updating Linux Systems - Beyond apt-get upgrade * Custom scripts for ensuring your Linux systems are up-to-date * topgrade - tutorial for using topgrade to update Linux systems on various Linux distributions

  • Discussion Topic: Anti-Malware and/or EDR on Linux Platforms * PCI calls for scanning Linux systems * What tools exist for analyzing Linux systems? (AIDE, uac, chkrootkit) * Best...

Mark as Played
May 29, 2025 122 mins

In the security news:

  • Vicious Trap - The malware hiding in your router
  • Hacking your car
  • WSL is open-source, but why?
  • Using AI to find vulnerabilities - a case study
  • Why you should not build your own password manager
  • The inside scoop behind Lumma Infostealer
  • Hacking a smart grill
  • Hardcoded credentials on end of life routers and "Alphanetworks"
  • SIM swapping is still happening
  • LoRa for C2
  • Russian drones use Telegram
  • Flipper Zero ...
Mark as Played

This week in the security news:

  • Malware-laced printer drivers
  • Unicode steganography
  • Rhode Island may sue Deloitte for breach. They may even win.
  • Japan's active cyber defense law
  • Stop with the ping
  • LLMs replace Stack Overflow - ya don't say?
  • Aggravated identity theft is aggravating
  • Ivanti DSM and why you shouldn't use it
  • EDR is still playing cat and mouse with malware
  • There's a cellular modem in your solar gear
  • Don't slack on s...
Mark as Played
May 15, 2025 118 mins

This week in the security news:

  • Android catches up to iOS with its own lockdown mode
  • Just in case, there is a new CVE foundation
  • Branch privilege injection attacks
  • My screen is vulnerable
  • The return of embedded devices to take over the world - 15 years later
  • Attackers are going after MagicINFO
  • Hacking Starlink
  • Mitel SIP phones can be hacked
  • Reversing with Hopper
  • Supercharge your Ghidra with AI
  • Pretending to be an anti-virus to...
Mark as Played
May 8, 2025 124 mins

Security news for this week:

  • RDP and credentials that are not really revoked, and some RDP bitmap caching fun
  • Some magic info on MagicINFO
  • Vulnerability Management Zombies
  • There is a backdoor in your e-commerce
  • Airborne: vulnerabilities in AirPlay
  • Bring your own installer - crafty EDR bypass
  • The Signal clone used by US government officials: shocker: has been hacked
  • AI slop vulnerability reporting
  • Bricking iPhones with a single...
Mark as Played

The PSW crew discusses tips, tricks, and traps for using AI and LLMs. We discuss a wide range of AI-related topics, including how to utilize AI tools for writing, coding, data analysis, website design, and more! Some key takeaways include:

  • AI has rapidly shifted from novelty to an essential tool in security and other fields.
  • Paid AI versions offer significant advantages for professionals.
  • Legal, ethical, and copyright question...
Mark as Played

The crosswalk is talking to me man!, don't block my website without due process, Florida is demanding encryption backdoors, attacking boilers and banning HackRF Ones, time to update your flipper zero, using AI to create working exploits, what happens when you combine an RP2350 and an ESP32? Hopefully good hackery things!, more evidence that patching is not enough, auditing the PHP source code, reading the MEGA advisories, threat ac...

Mark as Played

Govt Unravelling, AI Hijinx, Bot Chaos, Recall, Oracle, Slopesquatting, Tycoon 2FA, College, who knows, a lot more... On Paul's Security Weekly.

Visit https://www.securityweekly.com/psw for all the latest episodes!

Show Notes: https://securityweekly.com/psw-870

Mark as Played
April 10, 2025 125 mins

In the security news this week: You should really just patch things, the NVD backlog, Android phones with malware pre-installed, so convenient, keyloggers and a creepy pharmacist, snooping on federal workers, someone stole your browser history, NSA director fired, deputy director of NSA also fired, CrushFTP the saga continues, only steal the valid credit cards, another post that vanished from the Internet, hiding in NVRAM, protecti...

Mark as Played

Rob Allen, Chief Product Officer at Threatlocker joins us for an interview segment on using AI in security products: What works and what's not fully baked! Then in the security news, There are more holes in your boot...loader according to Microsoft, related: Secure Boot is in danger and no one is really talking about it (still), Dear Microsoft: I don't want to send you my data, I don't grant you remote access, and I don't want to c...

Mark as Played

How do we handle scope creep for vulnerabilities?, find the bugs before it hits the real world, risk or hype vulnerabilities, RTL-SDR in a browser, using AI to hack AI and protect AI, 73 vulnerabilities of which 0 patches have been issued, Spinning Cats, bypassing WDAC with Teams and JavaScript, Rust will solve all the security problems, did you hear some Signal chats were leaked?, ingress nginx, robot dogs, what happens to your 23...

Mark as Played
March 20, 2025 134 mins

This week: Compliance, localization, blah blah, the Greatest Cybersecurity Myth Ever Told, trolling Microsoft with a video, Github actions give birth to a supply chain attack, prioritizing security research, I'm tired of 0-Days that are not 0-Days, sticking your head in the sand and believing everything is fine, I'm excited about AI crawlers, but some are not, Room 641A, a real ESP32 vulnerability, do we need a CVE for every defaul...

Mark as Played

Sounil Yu joins us to kick things off with AI defenses: Enterprise AI search tools like Copilot for Microsoft 365 lack the in-depth access controls required to ensure that query responses align with the user’s need-to-know boundaries. Without proper controls, these tools accelerate the discovery of improperly secured sensitive files within the organization. Knostic’s solution ensures that enterprise data is safeguarded without slow...

Mark as Played

Popular Podcasts

    Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations. Special Summer Offer: Exclusively on Apple Podcasts, try our Dateline Premium subscription completely free for one month! With Dateline Premium, you get every episode ad-free plus exclusive bonus content.

    The Breakfast Club

    The World's Most Dangerous Morning Show, The Breakfast Club, With DJ Envy, Jess Hilarious, And Charlamagne Tha God!

    Crime Junkie

    Does hearing about a true crime case always leave you scouring the internet for the truth behind the story? Dive into your next mystery with Crime Junkie. Every Monday, join your host Ashley Flowers as she unravels all the details of infamous and underreported true crime cases with her best friend Brit Prawat. From cold cases to missing persons and heroes in our community who seek justice, Crime Junkie is your destination for theories and stories you won’t hear anywhere else. Whether you're a seasoned true crime enthusiast or new to the genre, you'll find yourself on the edge of your seat awaiting a new episode every Monday. If you can never get enough true crime... Congratulations, you’ve found your people. Follow to join a community of Crime Junkies! Crime Junkie is presented by audiochuck Media Company.

    The Clay Travis and Buck Sexton Show

    The Clay Travis and Buck Sexton Show. Clay Travis and Buck Sexton tackle the biggest stories in news, politics and current events with intelligence and humor. From the border crisis, to the madness of cancel culture and far-left missteps, Clay and Buck guide listeners through the latest headlines and hot topics with fun and entertaining conversations and opinions.

    The Megyn Kelly Show

    The Megyn Kelly Show is your home for open, honest and provocative conversations with the most interesting and important political, legal and cultural figures today. No BS. No agenda. And no fear.

Advertise With Us
Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.