Security Weekly Podcast Network (Audio)

Security Weekly Productions
undefined
Nov 18, 2025 • 35min

Cloudflare, Gh0stRAT, npm, North Koreans, Arch, Steam, Documentaries, Aaran Leyland.. - SWN #530

Cloudflare, Gh0stRAT, npm, North Korean Employees, Arch Linux Steam Machine, Documentaries, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-530
undefined
Nov 18, 2025 • 1h 4min

Secure Coding as Critical Thinking Instead of Vulnspotting - Matias Madou - ASW #357

Secure code should be grounded more in concepts like secure by default and secure by design than by "spot the vuln" thinking. Matias Madou shares his experience in secure coding training and the importance of teaching critical thinking. He also discusses why critical thinking is so closely related to threat modeling and how LLMs can be a tool for helping developers get beyond the superficial advice of, "Think like an attacker." Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-357
undefined
Nov 17, 2025 • 1h 57min

Year of the (Clandestine) Linux Desktop, topic, and the news - Rob Allen - ESW #433

Segment 1: Interview with Rob Allen It’s the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren’t enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a custom reverse shell and reverse proxy. In this segment, we’ll discuss strategies and mitigations to battle this novel technique with Rob Allen from Threatlocker. Segment Resources: Pro-Russian Hackers Use Linux VMs to Hide in Windows Russian Hackers Abuse Hyper-V to Hide Malware in Linux VMs Qilin ransomware abuses WSL to run Linux encryptors in Windows This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them! Segment 2: Topic - Threat Modeling Humanoid Robots We're entering the age of human-shaped robots, so it seems like a good time to talk about the fact that they ALREADY HAVE CVEs assigned to them. I guess this isn't a terrible thing - John Connor might have had an easier time if he could simply hack the terminators from a distance... Resources https://www.unitree.com/H2 (watch the video!) China’s humanoid robots get factory jobs as UBTech’s model scores US$112 million in orders The big reveal: Xpeng founder unzips humanoid robot to prove it’s not human Exploit Allows for Takeover of Fleets of Unitree Robots - Security researchers find a wormable vulnerability 100-page Paper: The Cybersecurity of a Humanoid Robot 5-page Paper: Cybersecurity AI: Humanoid Robots as Attack Vectors Amazingly, $300 smart vacuums have some of the same exact vulnerabilities and backdoors built into them as the $16,000 humanoid robots! The Day My Smart Vacuum Turned Against Me Segment 3: Weekly News Finally, in the enterprise security news, A $435M venture round A $75M seed round a few acquisitions the producer of the movie Half Baked bought a spyware company AI isn’t going well, or is it? maybe we just need to adopt it more slowly and deliberately? ad-blockers are enterprise best practices firewalls and VPNs are security risks, according to insurance claims could you power an entire house with disposable vapes? All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-433
undefined
10 snips
Nov 14, 2025 • 29min

Augustus De Morgan, Doordash, Fortiweb, Typosquatting, Vista, Ransomware, AI, More... - SWN #529

The discussion dives into a DoorDash breach, revealing a troubling 19-day notification delay on a social engineering attack. Attention shifts to a critical Fortinet vulnerability that could allow admin exploits. Europol's success in dismantling over 1,000 malware servers showcases international cooperation. The podcast highlights alarming trends in the ransomware landscape, with 85 active groups. It also addresses legal challenges stemming from AI-generated defamation and explores innovative quantum technology advancements.
undefined
Nov 13, 2025 • 2h 6min

Going Around EDR - PSW #900

In this engaging discussion, Jeff Mann, a cybersecurity expert, shares insights on the recent SonicWall breach, highlighting the risks for device manufacturers. Lee Neely delves into creative hardware hacks, even running Minecraft on a lightbulb. Mandy Logan discusses vulnerabilities in the construction sector, emphasizing IoT risks. Sam Bound addresses the implications of Google’s Gemini research on privacy and data access. Together, they explore trends in EDR evasion and the evolving landscape of cybersecurity challenges.
undefined
Nov 12, 2025 • 59min

Securing Model Context Protocol as Companies Plan to Replace Entry Roles with AI - Rahul Parwani - BSW #421

Rahul Parwani, Head of Product at ARIA and an expert in AI security, dives into the intricacies of the Model Context Protocol (MCP). He explains how MCP, while revolutionary for AI integration, has led to a security 'wild west', with threats like prompt injection emerging. The discussion includes strategies for balancing security and developer velocity, the importance of effective identity management, and how CISO burnout affects the industry. Rahul warns against replacing entry roles with AI, emphasizing the need to preserve career pathways in technology.
undefined
Nov 11, 2025 • 40min

Miles, 10/8 time, Lost Phones, Whisper Leak, Quantum Route, AI Galore, Rob Allen... - Rob Allen - SWN #528

Miles Davis, Jimmy Buffet, 10/8 time, Lost Phones, Phishing, Whisper Leak, Quantum Route Redirect, AI Galore, Rob Allen, and more on the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/how-a-ransomware-gang-encrypted-nevada-governments-systems/ This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-528
undefined
Nov 11, 2025 • 1h 11min

Ransomware, Defaults, and Proactive Defenses - Rob Allen - ASW #356

Just how bad can things get if someone clicks on a link? Rob Allen joins us again to talk about ransomware, why putting too much attention on clicking links misses the larger picture of effective defenses, and what orgs can do to prepare for an influx of holiday-infused ransomware targeting. Segment resources https://www.bleepingcomputer.com/news/security/how-a-ransomware-gang-encrypted-nevada-governments-systems/ https://www.darkreading.com/endpoint-security/pro-russian-hackers-linux-vms-hide-windows https://www.threatlocker.com/blog/how-to-build-a-robust-lights-out-checklist This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-356
undefined
Nov 10, 2025 • 1h 38min

OT Security Doesn't Have to be a Struggle, Spotting Red Flags, Enterprise News - Joshua Hay, Todd Peterson - ESW #432

Segment 1: OT Security Doesn’t Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don’t care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals’ plans nicely. In this interview, we discuss the challenge of securing OT systems with Todd Peterson and Joshua Hay from Junto Security. This segment is sponsored by Junto Security. Visit https://securityweekly.com/junto to learn more! Segment 2: Topic - Spotting Red Flags in Online Posts This week's topic segment is all about tuning your 'spidey sense' to spot myths and misconceptions online so we can avoid amplifying AI slop, scams, and other forms of Internet bunk. It was inspired by this LinkedIn post, but we've got a cybersecurity story in the news that we could have easily used for this as well (the report from MIT). Segment 3: Weekly Enterprise News Finally, in the enterprise security news, Some interesting fundings Some more interesting acquisitions a new AI-related term has been coined: cyberslop the latest insights from cyber insurance claims The AI security market isn’t nearly as big as it might seem cybercriminals are targeting trucking and logistics to steal goods Sorry dads, science says the smarts come from mom All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-432
undefined
21 snips
Nov 7, 2025 • 45min

AI-Obfuscating Malware, China Influence Ops, and Meta’s Fraud Fortune and Jason Wood - SWN #527

Join Jason Wood, an experienced cybersecurity practitioner, as he dives into the dark waters of AI-obfuscating malware and the growing threat landscape. He discusses the alarming trend of fake AI tools distributing mature malware and explores how China-linked intrusion tactics are compromising U.S. organizations. Wood also sheds light on Meta’s staggering ad revenue linked to fraudulent content and the societal risks posed by deepfake technology like Sora 2, which is blurring the lines of reality in alarming ways.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app