Paul's Security Weekly (Audio) Hackers Steal Your Car and Vulnerabilities - Rob Allen - PSW #889
Aug 28, 2025
Rob Allen, a seasoned security researcher, joins the discussion to emphasize the critical role of security research teams. He shares fascinating insights into offensive tooling, ransomware demonstrations, and the misuse of legitimate tools like 7-Zip. The conversation dives into the democratization of wireless attacks through devices like Flipper Zero and the risks posed by AI-powered ransomware. Additionally, Rob highlights the importance of threat analysts in breach investigations and the evolving landscape of vehicle vulnerabilities and exploitation techniques.
AI Snips
Chapters
Books
Transcript
Episode notes
Invest In Focused Security Research
- Build and staff dedicated security research teams to convert threat research into product, marketing, and demos.
- Give researchers cycles and authority so they can produce reproducible attacks and defensive detections for customers.
PowerShell Screenshot Post‑Exploitation Example
- Rob described a CEO who used PowerShell to capture screenshots from hospital machines instead of installing malware.
- The special projects team adapted that script for demos to show how trivial such post-exploitation can be.
Local LLMs Remove Guardrails
- Local LLMs can be run on modest hardware and enable uncensored code generation, including malicious scripts.
- That increases risk because attackers can evade public-model guardrails by using local models.

