Paul's Security Weekly (Audio) cover image

Paul's Security Weekly (Audio)

Latest episodes

undefined
Mar 6, 2025 • 2h 5min

Don't Hack Russia - PSW #864

Hacking your mattress, Taylor Swift all the time, DNS sinkholes, throwing parties at rental properties, detect jamming, it took 18 years to hack, airtag hacks, undetectable weapons, RIP Skype, Cellebrite targets, upgrade ALL the things, Kali, Raspberry PIs, and M.2 hats, pirating music through a supply chain attack, Cisco small business and why you shouldn't use it, stop hacking Russia, Badbox is back, but it likely never left, and AI still Hallucinates! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-864
undefined
Feb 27, 2025 • 1h 49min

Zero Days Are Not Just Fiction - PSW #863

This discussion dives into cybersecurity's pressing issues, like Apple's data protection and Australia's Kaspersky ban. Outdated software poses significant risks, and emerging tech like topological qubits could change the game. Ransomware chat logs reveal dark hacking techniques, while vulnerabilities in UEFI and Grub add to the challenge. The conversation highlights the need for quantum-resistant encryption and critiques a recent series on cybersecurity. Finally, it stresses the importance of robust authentication over insecure SMS options.
undefined
Feb 20, 2025 • 1h 3min

Live from ZTW - PSW #862

The discussion kicks off with excitement around the return of in-person conferences and insights from Zero Trust World. Listeners learn about current cybersecurity threats and the significance of Managed Service Providers. Humorous anecdotes about aging tech and personal experiences keep it lively. There's a deep dive into firmware security vulnerabilities and the challenges of timely updates. Plus, the exploration of access risks associated with AI tools offers a thought-provoking look at evolving security needs.
undefined
Feb 13, 2025 • 2h 5min

Prompt Injection, CISA, Patch Tuesday - PSW #861

This week, tune in to hear about the intriguing possibility of installing Linux in PDFs and the serious security measures taken by TP-Link. The discussion dives into the latest Patch Tuesday updates affecting major companies like Intel and Microsoft. Ever thought of hacking your space heater for kicks? They cover it! Explore the quirks of smart homes and the security risks tied to them. Plus, get insights on prompt injection attacks and vulnerabilities associated with medical devices, all while balancing humor and critical cybersecurity themes.
undefined
14 snips
Feb 6, 2025 • 2h 7min

Deepseek, AMD, and Forgotten Buckets - PSW #860

Discover the challenges of Deepseek and the latest in AI model security. Explore AMD's microcode vulnerabilities and the risks posed by abandoned AWS S3 buckets. Dive into the world of 3D printing with innovative tips and tricks. Learn about password management weaknesses and the hidden dangers of cheap USB-to-Ethernet adapters. The discussion also highlights the evolving landscape of cybersecurity and the importance of data privacy in AI development.
undefined
Jan 30, 2025 • 2h 6min

Cred Vaults, Cheap AI, and Hacking Devices - Matt Bishop - PSW #859

Matt Bishop is the Principal Architect at Bitwarden, specializing in password management and security solutions. He discusses the evolution of password vaults, emphasizing their expanded use beyond mere password storage, including SSH key management for developers. The conversation also covers the latest cybersecurity threats, from vulnerabilities in Palo Alto networks to the implications of AI in security. Bishop highlights the importance of multi-factor authentication and the benefits of open-source solutions in ensuring data security.
undefined
Jan 23, 2025 • 2h 19min

Vulnerability Prioritization In The Real World - Andy Jaquith - PSW #858

Andy Jaquith, Managing Director at MarkerBench and seasoned CISO, dives into the challenges of vulnerability prioritization and real-world asset management. He shares insights on the complexities of navigating cybersecurity in large organizations, emphasizing the need for a risk-based approach. The discussion also touches on the political implications of cybersecurity policies, the struggles of hardware security detection, and the unexpected role of adult platforms in education. With humor and expertise, Jaquith paints a vivid picture of today’s cybersecurity landscape.
undefined
Jan 16, 2025 • 2h 34min

Stopping The Bad Things - Rob Allen - PSW #857

Rob from ThreatLocker discusses innovative strategies to disrupt attacker techniques, including zero trust and privilege escalation. The conversation highlights the security risks of unmanaged devices, particularly in home networks filled with unpatched smart gadgets. Humorous anecdotes from events like SchmooCon capture the camaraderie within the hacking community. The episode also delves into the importance of logging, automation in threat detection, and the vulnerabilities posed by outdated technology, all while reflecting on the necessity for continuous improvement in cybersecurity practices.
undefined
Jan 9, 2025 • 2h 7min

Threat Actors With A Thousand Names - PSW #856

Discover the vulnerabilities lurking in DNA sequencers and the urgent need for better security measures. The complexities of naming threat actors reveal both chaos and confusion in cybersecurity. Reflecting on a CEO's unexpected passing adds a emotional layer to industry discussions. Explore how stolen bicycles link to social media accountability. A peculiar bug causes printing woes on Tuesdays, while hackers continue to exploit weaknesses in technologies like Bitlocker and Bluetooth. Plus, get hype for ShmooCon and hear about the latest tech threats!
undefined
Dec 25, 2024 • 1h 17min

Hacker Heroes - Haroon Meer - PSW Vault

Haroon Meer, founder of Thinkst Applied Research, brings a wealth of cybersecurity knowledge to the discussion. He reflects on his journey from South Africa's tech landscape post-apartheid to innovative product development in security. The conversation explores the practical applications of honeypots, the need for a customer-centric culture, and the shortcomings of current EDR solutions. With humorous anecdotes from his university days, Haroon emphasizes simplifying cybersecurity processes and enhancing user experiences through tools like Canary Tokens.

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode