

Security Weekly Podcast Network (Audio)
Security Weekly Productions
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape.
Tune in for in-depth panel discussions, expert guest interviews, and breaking news on the latest hacking techniques, vulnerabilities, and industry trends. Stay informed and secure with the most trusted voices in cybersecurity!
Tune in for in-depth panel discussions, expert guest interviews, and breaking news on the latest hacking techniques, vulnerabilities, and industry trends. Stay informed and secure with the most trusted voices in cybersecurity!
Episodes
Mentioned books
Nov 24, 2025 • 1h 39min
Aligning teams for effective remediation, Anthropic's latest report, and the news - Ravid Circus - ESW #434
Interview with Ravid Circus Ravid will discuss why security and engineering misalignment is the biggest barrier to fast, effective remediation, using data from Seemplicity’s 2025 Remediation Operations Report. This is costing some teams days of unnecessary exposure, which can lead to major security implications for organizations. Segment Resources: https://seemplicity.io/papers/the-2025-remediation-operations-report/ https://seemplicity.io/news/seemplicity-releases-2025-remediation-operations-report-91-of-organizations-experience-delays-in-vulnerability-remediation/ https://seemplicity.io/blog/2025-remediation-operations-report-organizations-still-struggle/ Topic Segment: Thoughts on Anthropic's latest security report Ex-SC Media journalist Derek Johnson did a great job writing this one up over at Cyberscoop: China’s ‘autonomous’ AI-powered hacking campaign still required a ton of human work There are a number of interesting questions that have been raised here. Some want more technical details and question the report's conclusions. How automated was it, really? I found it odd that Anthropic's CEO was on 60 minutes the same week, talking about how dangerous AI is (which is his company's primary and only product). I think one of the more interesting things to discuss is how Anthropic has based its identity and brand on AI safety. While so many other SaaS companies appear to be doing the bare minimum to stop attacks against their customers, Anthropic is putting significant resources into testing for future threats and discovering active attacks. News Segment Finally, in the enterprise security news, vendor layoffs have started again the sins of security vendor research the pillars of the Internet are burning selling out to North Korea isn’t worth what they’re paying you ransom payments, in 24 easy installments? a breach handled the right way we probably shouldn’t be putting LLMs into kids toys ordering coffee from the terminal All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-434
Nov 21, 2025 • 34min
Emoticons, Sonicwall, Global Protect, Pop ups, WhatsApp, 7Zip, Roblox, Josh Marpet... - SWN #531
Join security professional Josh Marpet as he dives into the intriguing world of voice-activated AI, highlighting the risks of voice prompt injection and its potential exploitation. He also tackles the implications of ransomware groups shifting to cloud tools. Other hot topics include the alarming vulnerabilities of SonicWall and WhatsApp’s profile data leak, revealing critical privacy risks. Plus, discover how Roblox plans to use AI for chat safety amidst growing concerns over child protection. A discussion full of timely insights awaits!
Nov 20, 2025 • 2h 10min
Give Me Liberty or Linux, Badge Hacking Interview - Bryce Owen - PSW #901
Dive into the chaos of recent tech security news, from a Cloudflare outage to Logitech's alarming breach. Discover the irony of hacking Linux through malware scanners and explore the potential of robotic vacuums as hacking platforms. High school junior Bryce Owen shares his journey in creating a unique DEF CON Space Badge that features mesh networking and gameplay mechanics. Learn about the challenges of badge production, and the exciting future of Linux desktops. It's a wild ride through tech, security, and innovation!
Nov 19, 2025 • 57min
Health and Wellness of the CISO as They Crack Under Pressure and Need a BISO to Scale - Dr. Yonesy Núñez - BSW #422
It's a topic we discuss often on Business Security Weekly: CISO Burnout. It's real, but how should you manage it? Dr. Yonesy Núñez, Global Cybersecurity Executive at Chain Bridge Bank and former Managing Director, Chief Cybersecurity Risk Officer, and Chief Information Security Officer at The Depository Trust & Clearing Corporation (DTCC), joins Business Security Weekly to share his personal insights. An advocate of CISO Health and Wellness, Yonesy will discuss how we can "Optimize the Operator" by creating harmony with mind and spirit. Segment Resources: https://councils.forbes.com/profile/Yonesy-Nunez-Global-Cybersecurity-Executive-Chain-Bridge-Bank/e79e72a5-4b18-48b1-b5ab-8a0afd47d782 In the leadership and communications segment, CISOs are cracking under pressure, How BISOs enable CISOs to scale security across the business, Great Leaders Empower Strategic Decision-Making Across the Organization, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-422
Nov 18, 2025 • 35min
Cloudflare, Gh0stRAT, npm, North Koreans, Arch, Steam, Documentaries, Aaran Leyland.. - SWN #530
Cloudflare, Gh0stRAT, npm, North Korean Employees, Arch Linux Steam Machine, Documentaries, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-530
Nov 18, 2025 • 1h 4min
Secure Coding as Critical Thinking Instead of Vulnspotting - Matias Madou - ASW #357
Secure code should be grounded more in concepts like secure by default and secure by design than by "spot the vuln" thinking. Matias Madou shares his experience in secure coding training and the importance of teaching critical thinking. He also discusses why critical thinking is so closely related to threat modeling and how LLMs can be a tool for helping developers get beyond the superficial advice of, "Think like an attacker." Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-357
Nov 17, 2025 • 1h 57min
Year of the (Clandestine) Linux Desktop, topic, and the news - Rob Allen - ESW #433
Segment 1: Interview with Rob Allen It’s the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren’t enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a custom reverse shell and reverse proxy. In this segment, we’ll discuss strategies and mitigations to battle this novel technique with Rob Allen from Threatlocker. Segment Resources: Pro-Russian Hackers Use Linux VMs to Hide in Windows Russian Hackers Abuse Hyper-V to Hide Malware in Linux VMs Qilin ransomware abuses WSL to run Linux encryptors in Windows This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them! Segment 2: Topic - Threat Modeling Humanoid Robots We're entering the age of human-shaped robots, so it seems like a good time to talk about the fact that they ALREADY HAVE CVEs assigned to them. I guess this isn't a terrible thing - John Connor might have had an easier time if he could simply hack the terminators from a distance... Resources https://www.unitree.com/H2 (watch the video!) China’s humanoid robots get factory jobs as UBTech’s model scores US$112 million in orders The big reveal: Xpeng founder unzips humanoid robot to prove it’s not human Exploit Allows for Takeover of Fleets of Unitree Robots - Security researchers find a wormable vulnerability 100-page Paper: The Cybersecurity of a Humanoid Robot 5-page Paper: Cybersecurity AI: Humanoid Robots as Attack Vectors Amazingly, $300 smart vacuums have some of the same exact vulnerabilities and backdoors built into them as the $16,000 humanoid robots! The Day My Smart Vacuum Turned Against Me Segment 3: Weekly News Finally, in the enterprise security news, A $435M venture round A $75M seed round a few acquisitions the producer of the movie Half Baked bought a spyware company AI isn’t going well, or is it? maybe we just need to adopt it more slowly and deliberately? ad-blockers are enterprise best practices firewalls and VPNs are security risks, according to insurance claims could you power an entire house with disposable vapes? All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-433
10 snips
Nov 14, 2025 • 29min
Augustus De Morgan, Doordash, Fortiweb, Typosquatting, Vista, Ransomware, AI, More... - SWN #529
The discussion dives into a DoorDash breach, revealing a troubling 19-day notification delay on a social engineering attack. Attention shifts to a critical Fortinet vulnerability that could allow admin exploits. Europol's success in dismantling over 1,000 malware servers showcases international cooperation. The podcast highlights alarming trends in the ransomware landscape, with 85 active groups. It also addresses legal challenges stemming from AI-generated defamation and explores innovative quantum technology advancements.
Nov 13, 2025 • 2h 6min
Going Around EDR - PSW #900
In this engaging discussion, Jeff Mann, a cybersecurity expert, shares insights on the recent SonicWall breach, highlighting the risks for device manufacturers. Lee Neely delves into creative hardware hacks, even running Minecraft on a lightbulb. Mandy Logan discusses vulnerabilities in the construction sector, emphasizing IoT risks. Sam Bound addresses the implications of Google’s Gemini research on privacy and data access. Together, they explore trends in EDR evasion and the evolving landscape of cybersecurity challenges.
Nov 12, 2025 • 59min
Securing Model Context Protocol as Companies Plan to Replace Entry Roles with AI - Rahul Parwani - BSW #421
Rahul Parwani, Head of Product at ARIA and an expert in AI security, dives into the intricacies of the Model Context Protocol (MCP). He explains how MCP, while revolutionary for AI integration, has led to a security 'wild west', with threats like prompt injection emerging. The discussion includes strategies for balancing security and developer velocity, the importance of effective identity management, and how CISO burnout affects the industry. Rahul warns against replacing entry roles with AI, emphasizing the need to preserve career pathways in technology.


