loader from loading.io

The Code of Honor: Embracing Ethics in Cybersecurity - Ed Skoudis - PSW #846

Paul's Security Weekly (Audio)

Release Date: 10/10/2024

Threat Actors With A Thousand Names - PSW #856 show art Threat Actors With A Thousand Names - PSW #856

Paul's Security Weekly (Audio)

DNA sequencer vulnerabilities, threat actor naming conventions, new CNAs and problems, backdoors are not secrets (again), The RP2350 is hacked!, they know where your car is, treasury department hacked, what if someone hacked license plate cameras? Tenable CEO passes away, and very awkwardly, a Nessus plugin update causes problems, who needs fact-checking anyhow (And how people steal stuff and put it on Facebook), when you are breached, make sure you tell the victims how to be more secure, Salt Typhoon - still no real details other than more people were hacked and they are using the word...

info_outline
Hacker Heroes - Haroon Meer - PSW Vault show art Hacker Heroes - Haroon Meer - PSW Vault

Paul's Security Weekly (Audio)

Unraveling Cybersecurity Complexity: A Conversation with Haroon Meer Haroon Meer, an influential figure in the world of cybersecurity, takes center stage in this podcast interview. With a deep reservoir of knowledge and a track record of tackling complex security challenges, Haroon has established himself as a key player in the InfoSec domain. As the founder of Thinkst Applied Research, Haroon brings a wealth of practical experience to the table. Join us as we explore his professional journey, from early forays into cybersecurity to pioneering innovations that have reshaped how organizations...

info_outline
When Public Payphones Become Smart Phones - Inbar Raz - PSW #855 show art When Public Payphones Become Smart Phones - Inbar Raz - PSW #855

Paul's Security Weekly (Audio)

If you've ever wondered how attackers could go after payphones that are "smart" we got you covered! Inbar has done some amazing research and is here to tell us all about it! Segment Resources: XSS is the number one threat?, fix your bugs faster, hacking VoIP systems, AI and how it may help fuzzing, hacker gift guides, new DMA attacks, hacking InTune, Rhode Island gets hacked, OpenWrt supply chain issues, we are being spied on, Germans take down botnet, Bill and Larry are speaking at Shmoocon!, and TP-Link bans. Visit for all the latest episodes! Show Notes:

info_outline
Navigating Regulations in Supply Chain Security - Eric Greenwald - PSW #854 show art Navigating Regulations in Supply Chain Security - Eric Greenwald - PSW #854

Paul's Security Weekly (Audio)

Join us for this segment as we discuss government regulations and certifications as they apply to supply chain security and vulnerability management, and how understanding the mumbo jumbo can enable organizations to improve their cyber security. In the security news, the crew, (minus Paul) get to gather to discus hacks causing disruptions, in healthcare, donuts and vodka, router and OpenWRT hacks (and the two are not related), Salt/Volt Typhoon means no more texting and 10 year old vulnerabilities and more! Visit for all the latest episodes! Show Notes:

info_outline
Hacker Gadgets - PSW #853 show art Hacker Gadgets - PSW #853

Paul's Security Weekly (Audio)

The hosts discuss hacker gadgets! We'll cover what we've been hacking on lately and discuss gadgets we want to work on in the future and other gadgets we want to get our hands on. Paul has been working with some M5Stack devices, a guide can be found here: We will cover the Clockwork PI "uConsole" (RPI CM4) - We want the RPI Pico 2 W and the RPI CM5 () Paul upgraded one of his Flipper Zeros with Momentum Firmware () Paul and Larry have the new Crowview Note () Larry's List: Cheap Yellow Display - KV4P HT - Lilygo T-Deck - Helltec LoRa32 NRF52840-DK - NRF52840 Dongle - MakerDialry...

info_outline
Hacker Heroes - Aaron Turner - PSW Vault show art Hacker Heroes - Aaron Turner - PSW Vault

Paul's Security Weekly (Audio)

In this Hacker Heroes episode, we sit down with Aaron Turner, a highly respected figure in the realm of cybersecurity. With a career spanning decades, Aaron has established himself as a thought leader and authority on various aspects of information security. As a seasoned cybersecurity professional, Aaron has navigated the evolving landscape of digital threats, contributing significantly to the development of strategies and solutions for protecting sensitive information. With a comprehensive understanding of the intricacies of cybersecurity, he brings a wealth of knowledge to our discussion....

info_outline
Confessions of a Cyber Criminal Stalker - Ken Westin - PSW #852 show art Confessions of a Cyber Criminal Stalker - Ken Westin - PSW #852

Paul's Security Weekly (Audio)

Black Hats & White Collars: We know criminal hacking is big business because we've spied on them! Ken comes on the show to talk about chasing and stalking criminals, even if it means sacrificing some of your own personal safety. Fast cars kill people, Apple 0-Days, memory safety, poisoning the well, babble babble and malware that tries really hard to be stealthy, Palto Alto and Fortinet have some serious new vulnerabilities, open-source isn't free, but neither is commercial software, get on the TPM bus, find URLs with stealth, stealing credentials with more Palto Alto and Fortinet, the...

info_outline
No CVE and No Accountability - Ed Skoudis - PSW #851 show art No CVE and No Accountability - Ed Skoudis - PSW #851

Paul's Security Weekly (Audio)

Alright, so we dove deep into some pretty wild stuff this week. We started off talking about zip files inside zip files. This is a variation of old-school zip file tricks, and the latest method described here is still causing headaches for antivirus software. Then we geeked out about infrared signals and the Flipper Zero, which brought back memories of the TV-B-Gone. But the real kicker was our discussion on end-of-life software and the whole CVE numbering authority mess. Avanti's refusal to issue a CVE for their end-of-life product sparked a heated debate about cybersecurity accountability...

info_outline
Cybersecurity For Schools - Kayne McGladrey - PSW #850 show art Cybersecurity For Schools - Kayne McGladrey - PSW #850

Paul's Security Weekly (Audio)

We chatted with Kayne about education systems security, funding for cyber tools and services, and what the future of education might look like to fill more cyber roles. In the news: Pacific Rim, Linux on Windows for attackers, one of the worst cases of a former employee's retaliation, Zery-Day FOMO, we predicted that, hacking for fun, working hard for no PoC, an LLM that discovers software vulnerabilities, absurd fines, long usernames and Okta, and paying a ransom with dough! Visit for all the latest episodes! Show Notes:

info_outline
Shadow IT and Security Debt - Dave Lewis - PSW #849 show art Shadow IT and Security Debt - Dave Lewis - PSW #849

Paul's Security Weekly (Audio)

We had the pleasure of finally having Dave Lewis on the show to discuss shadow IT and security debt. Dave shared some fascinating insights from his long career in cybersecurity, emphasizing the importance of addressing fundamental security issues and the human aspect of security. We delved into the challenges of managing shadow IT, the complexities of security debt, and the need for organizations to prioritize security practices. Overall, it was a great conversation that highlighted the ongoing struggles in our industry and the importance of learning from past mistakes to build a more secure...

info_outline
 
More Episodes

"Code of Honor: Embracing Ethics in Cybersecurity" by Ed Skoudis is a book that explores the ethical challenges faced by cybersecurity professionals in today's digital landscape. The book delves into the complex moral dilemmas that arise in the field of cybersecurity, offering guidance on how to navigate these issues while maintaining integrity. The authors provide practical advice and real-world examples to help readers develop a strong ethical framework for decision-making in their cybersecurity careers.

Segment Resources:

Get ready for a wild ride in this week's podcast episode, where we dive into the latest security shenanigans!

  • Default Credentials Gone Wild: We’ll kick things off with a look at how default credential scanners are like that friend who shows up to the party but never brings snacks. They're everywhere, but good luck finding one that actually works!
  • Critical Vulnerabilities in Tank Gauges: Next, we’ll discuss how automated tank gauges are now the new playground for hackers. With vulnerabilities that could lead to environmental disasters, it’s like giving a toddler a box of matches—what could possibly go wrong?
  • Cisco Routers: The Forgotten Gear: Cisco's small business routers are like that old car in your driveway—still running but definitely not roadworthy. We’ll explore why you should check your network before it becomes a digital junkyard.
  • Firmware Updates: A Love Story: Richard Hughes has dropped some juicy updates on fwupd 2.0.0, making firmware updates as easy as ordering takeout. But let’s be real, how many of us actually do it?
  • Stealthy Linux Malware: We’ll also uncover Perfctl, the stealthy malware that’s been creeping around Linux systems since 2021. It’s like that one relative who overstays their welcome—hard to get rid of and always looking to borrow money!
  • PrintNightmare Continues: And yes, the PrintNightmare saga is still haunting Windows users. It’s like a horror movie that just won’t end—grab your popcorn!
  • Cyber Shenanigans at Comcast and Truist: We'll wrap up with a juicy breach involving Comcast and Truist Bank that compromised data for millions. Spoiler alert: they didn’t have a great plan for cleaning up the mess.

Tune in for all this and more as we navigate the wild world of security news with a wink and a nudge!

Visit https://www.securityweekly.com/psw for all the latest episodes!

Show Notes: https://securityweekly.com/psw-846