Paul's Security Weekly (Video)
In the security news: Cloudflare was down, it was not good Logitech breached The largest data breach in history? Fortinet Fortiweb - the saga continues Hacking Linux through your malware scanner, oh the irony I never stopped hating systemd The ASUS exploit that never existed If iRobot fails, can we deploy our own hacker bot army? Firmware encryption is a bitch Threat actors deply Claude Code Remembering the Viasat hack and why we can't have nice things Hacking re-entry sensors Sending signals in the wrong direction A File Format Uncracked for 20 Years And 2026 is the year of the Linux...
info_outlinePaul's Security Weekly (Video)
This week: Minecraft on your lightbulb Sonicwall breached, who's next? Ditch Android, install Linux Hacking your face Thermostat freedom Pen test fails HackRF hacking times 2 Going around EDR Hackers in your printer Chinese data breach NFC relays and PCI Constructive construction hacks FlipperZero firmware update ICS, PLCs, and attacks Bayesian Swiss Cheese, taste good? Do you want to hack back? Keeping secrets Enforcing CMMC OWASP top ten gets a make over Android Spyware makes a LANDFALL Gemini's deep research into your documents Slopguard and AI datacenters in space! Show Notes:
info_outlinePaul's Security Weekly (Video)
This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPNs are a target Show Notes:
info_outlinePaul's Security Weekly (Video)
In the security news this week: Cybersecurity is dead, and AI killed it Exploiting the patching system Apple makes it easier for spyware Who is patching Cisco ASA? Shove that DMCA somewhere HTTPS - a requirement Russia wants to own all the exploits Abandonware challenges Reversing at its hardest with Lua Hacking team is back, and leetspeak malware When you forget to authenticate your API Jamming with cool tech GoSpoof and After 35 Years, a Solution to the CIA’s Kryptos Puzzle Has Been Found! Show Notes:
info_outlinePaul's Security Weekly (Video)
In the security news: When in doubt, blame DNS, you're almost always correct How to Make Windows 11 great, or at least suck less CSRF is the least of your problems Shady exploits Linux security table stakes (not steaks) The pill camera Give AI access to your UART Security products that actually try to be secure? Firmware vulnerabilities, lots of them Teams is spying on you More details on PolarEdge VSCode, marketplaces, and developers at risk Cisco SNMP flaw used to deploy malware The 90's called, they want their exploits back This segment is sponsored by ThreatLocker. Visit to learn more...
info_outlinePaul's Security Weekly (Video)
First up is a technical segment on UEFI shells: determining if they contain dangerous functionality that allows attackers to bypass Secure Boot. Then in the security news: Your vulnerability scanner is your weakest link Scams that almost got me The state of EDR is not good You don't need to do that on a phone or Raspberry PI Hash cracking and exploits Revisiting LG WebOS Hardening Docker images Hacking Moxa NPort Shoddy academic research The original sin of computing Bodycam hacking A new OS for ESP32 The AI bubble is going to burt Mobile VPNs are not always secure Show Notes:
info_outlinePaul's Security Weekly (Video)
This week we kick things off with a special interview: Kieran Human from Threat Locker talks about EDR bypasses and other special projects. In the security news: Hacking TVs Flushable wipes are not the only problem People just want to spy on their pets, except the devices can be hacked Linux EDR is for the birds What does my hat say we love exploits and hashes ESP32s in your router RF signal generator on a PI Zero Mic-E-Mouse and other things that will probably never happen, until they do Hacking with money Uninitialized variables and other things the compiler should catch Breaking out of the...
info_outlinePaul's Security Weekly (Video)
In addition to some fun news, we get a Mary Ann Davidson as a surprise guest. We even get a great quote from her of "You're never going to have enough cybersecurity people to defend what was never built to be defensible.". Show Notes:
info_outlinePaul's Security Weekly (Video)
Broadcom, LastPass, Brickstone, SEO Poisoning, QR codes, H1B visas, Distributed Computing, and More... Show Notes:
info_outlinePaul's Security Weekly (Video)
This week's technical segment is all about the T-Lora Pager from Lilygo, and really cool Meshtastic device that can also be used for some hacking tasks! In the security news: Your safe is not safe Cisco ASA devices are under attack VMScape HybridPetya and UEFI attacks in the wild Eveything is a Linux terminal Hackers turns 30 Hosting websites on disposable vapes NPM worms and token stealing Attackers make mistakes too AI podcasts Show Notes:
info_outlineSecurity news for this week:
- RDP and credentials that are not really revoked, and some RDP bitmap caching fun
- Some magic info on MagicINFO
- Vulnerability Management Zombies
- There is a backdoor in your e-commerce
- Airborne: vulnerabilities in AirPlay
- Bring your own installer - crafty EDR bypass
- The Signal clone used by US government officials: shocker: has been hacked
- AI slop vulnerability reporting
- Bricking iPhones with a single line of code
- Hacking planet technology
- Vibe hacking for the win?
- Cybersecurity CEO arrested for deploying malware
- Hello my perverted friend
- FastCGI - fast, but vulnerable
Chapters:
0:00 Opening and introductions
2:43 Panel introductions and conference recaps
4:46 Conference announcements and Corncon discussion
8:05 RSAC 2025 recap and vulnerability management trends
15:44 RDP credential revocation flaw in Windows 11
34:57 Apple AirPlay "wormable" vulnerabilities and third-party device risks
44:10 Signal clone breach used by US officials (TeleMessage incident)
55:38 Supply chain attack: Magento extensions backdoor
66:12 "Hello my perverted friend": Sextortion scam analysis
72:10 Security culture and phishing awareness at home
75:25 Digital signage vulnerabilities: Samsung MagicInfo
81:41 Threat hunting tradecraft and blue team operations
88:38 AI slop in vulnerability reporting and vibe hacking
98:59 Apple notification DoS and sandbox bypass
101:24 VMware licensing controversy and alternatives
107:14 CEO arrested for planting malware in hospital systems
116:06 FastCGI vulnerabilities in embedded/IoT systems
122:12 Rooting Android phones and device locking
124:08 Closing and outro
Show Notes: https://securityweekly.com/psw-873