• Hacking Washing Machines - PSW #885
    Jul 31 2025

    In the security news:

    • Hacking washing machines, good clean fun!
    • Hacking cars via Bluetooth
    • More Bluetooth hacking with Breaktooth
    • Making old vulnerabilities great again: exploiting abandoned hardware
    • Clorox and Cognizant point fingers
    • AI generated Linux malware
    • Attacking Russian airports
    • When user verification data leaks
    • Turns out you CAN steal cars with a Flipper Zero, so we're told
    • The UEFI vulnerabilities - the hits keep coming
    • Hijacking Discord invites
    • The Raspberry PI laptop
    • The new Hack RF One Pro
    • Security appliances still fail to be secure
    • Person Re-Identification via Wi-Fi

    Visit https://www.securityweekly.com/psw for all the latest episodes!

    Show Notes: https://securityweekly.com/psw-885

    Show More Show Less
    1 hr and 58 mins
  • Protecting G-Suite/MS365 and Security News - Abhishek Agrawal - PSW #884
    Jul 24 2025

    We chat with Material Security about protecting G Suite and MS365. How else are you monitoring the most commonly used cloud environments and applications?

    In the security news:

    • Google Sues Badbox operators
    • Authenticated or Unauthenticated, big difference and my struggle to get LLMs to create exploits for me
    • Ring cameras that were not hacked
    • Malicous AURs
    • Killing solar farms
    • Weak passwords are all it takes
    • Microsoft's UEFI keys are expiring
    • Kali Linux and Raspberry PI Wifi updates
    • Use lots of electricity, get a visit from law enforcement
    • Sharepoint, vulnerabilities, nuclear weapons, and why you should use the cloud
    • The time to next exploit is short
    • Sonicwall devices are getting exploited
    • How not to vibe code
    • SMS blasters

    This segment is sponsored by Material Security. Visit https://securityweekly.com/materialsecurity to see purpose-built Google Workspace and Office 365 security in action!

    Visit https://www.securityweekly.com/psw for all the latest episodes!

    Show Notes: https://securityweekly.com/psw-884

    Show More Show Less
    2 hrs and 11 mins
  • Hackers On A Train - PSW #883
    Jul 17 2025

    In the security news:

    • The train is leaving the station, or is it?
    • The hypervisor will protect you, maybe
    • The best thing about Flippers are the clones
    • Also, the Flipper Zero as an interrogation tool
    • Threats are commercial and open-source
    • Who is still down with FTP?
    • AI bug hunters
    • Firmware for Russian drones
    • Merging Android and ChromOS
    • Protecting your assets with CVSS?
    • Patch Citrixbleed 2
    • Rowhammer comes to NVIDIA GPUs
    • I hear Microsoft hires Chinese spies
    • Gigabyte motherboards and UEFI vulnerabilities
    • McDonald's AI hiring bot: you want some PII with that?

    Visit https://www.securityweekly.com/psw for all the latest episodes!

    Show Notes: https://securityweekly.com/psw-883

    Show More Show Less
    2 hrs and 2 mins
  • Citrixbleed 2, Hardware Hacking, and Failed Bans - PSW #882
    Jul 10 2025

    This week in the security news:

    • Citrixbleed 2 and so many failures
    • Ruckus leads the way on how not to handle vulnerabilities
    • When you have no egress
    • Applocker bypass
    • So you bought earbuds from TikTok
    • More gadgets and the crazy radio
    • Cheap drones and android apps
    • Best Mario Kart controller ever
    • VSCode: You're forked
    • Bluetooth earbuds and vulnerabilities
    • Do you remember Sound blaster cards?
    • NFC passport chips
    • Whack-a-disk

    Visit https://www.securityweekly.com/psw for all the latest episodes!

    Show Notes: https://securityweekly.com/psw-882

    Show More Show Less
    2 hrs and 6 mins
  • Exploring Meshtastic and LoRa Mesh Networks - Rob Allen - PSW #881
    Jul 3 2025

    This week, we dive into the world of Meshtastic and LoRa—two technologies empowering secure, long-range, and infrastructure-free communication. We'll talk about the origins of Meshtastic, how LoRa radio works, and why mesh networking is revolutionizing off-grid messaging for adventurers, hackers, emergency responders, and privacy advocates alike. We break down the available hardware, walk you through firmware installation, and share real-world use cases of LoRa to create decentralized, encrypted networks. Whether you’re a hacker, a prepper, or just curious about the future of resilient communication, this episode is packed with insights and practical tips you won’t want to miss!

    This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them!

    Visit https://www.securityweekly.com/psw for all the latest episodes!

    Show Notes: https://securityweekly.com/psw-881

    Show More Show Less
    1 hr and 8 mins
  • Is Vuln Management Dead? - HD Moore - PSW #880
    Jun 26 2025

    This conversation explores the intersection of cybersecurity and emerging technologies, focusing on innovative hacking techniques, the evolution of vulnerability management, and the critical importance of asset discovery. The discussion also delves into the implications of cyber warfare, the persistent threat of default passwords, and the integration of open source tools in enhancing security measures. The conversation delves into various aspects of cybersecurity, focusing on aircraft tracking, data filtering, the evolution of vulnerability management, and the role of AI in enhancing security measures. The speakers discuss the challenges posed by default credentials and the shared responsibility model in cloud infrastructure. They also explore the limitations of AI in cybersecurity and the potential for future advancements, particularly in localized LLMs. The conversation delves into the intersection of technology, cybersecurity, and privacy, exploring the implications of AI on energy demands, vulnerabilities in telecom infrastructure, the complexities of network maintenance, and the challenges of ransomware negotiations. The discussion also touches on privacy concerns related to data tracking by major tech companies like Meta and Apple, as well as the evolving landscape of legal implications in the face of cyber threats.

    This segment is sponsored by runZero. Get complete visibility across your total attack surface in literally minutes - no agents, no authentication required. Start a free trial or access the free Community Edition at https://securityweekly.com/runzero.

    HD Moore joins us to discuss finding all the things and how vulnerability management has changed. In the security news:

    • Hacking from a light bulb
    • Reverse engineering, the easy ways
    • Detecting Jitter
    • FCC probes into Cyber Trust Mark
    • Bluetooth Jamming
    • New Wifi Apple features: What could go wrong?
    • Just turn off the Internet for the entire country
    • Meta's Localhost tracking
    • Hacking printers, for realz this time
    • Are we not patching 2023 CVEs?
    • Cleaning up legacy drivers
    • One of the Best Hackers in the Country is an AI Bot

    Visit https://www.securityweekly.com/psw for all the latest episodes!

    Show Notes: https://securityweekly.com/psw-880

    Show More Show Less
    2 hrs and 16 mins
  • Hacking Drivers - PSW #879
    Jun 19 2025

    This week: * The true details around Salt Typhoon are still unknown * The search for a portable pen testing device * Directories named "hacker2" are suspicious * Can a $24 cable compete with a $180 cable? * Hacking Tesla wall chargers * Old Zyxel exploits are new again * Hacking Asus drivers * Stealing KIAs - but not like you may think * Fake articles * Just give everything to LLMs, like Nmap * Retiring Floppy disks * An intern leaked secrets * Discord link hijacking * Cray vs. Raspberry PI * More car hacking with BMW

    Visit https://www.securityweekly.com/psw for all the latest episodes!

    Show Notes: https://securityweekly.com/psw-879

    Show More Show Less
    2 hrs and 3 mins
  • UEFI Vulnerabilities Galore - PSW #878
    Jun 12 2025

    This week:

    • You got a Bad box, again
    • Cameras are expose to the Internet
    • EU and connected devices
    • Hydrophobia
    • NVRAM variables
    • Have you heard about IGEL Linux?
    • SSH and more NVRAM
    • AI skeptics are nuts, and AI doesn't make you more efficient
    • Trump Cybersecurity orders
    • I think I can root my Pixel 6
    • Decentralized Wordpres plugin manager
    • Threat actor naming conventions
    • I have the phone number linked to your Google account
    • Fortinet flaws exploited in ransomeware attacks (and how lack of information sharing is killing us)
    • retiring floppy disks
    • fault injection for the masses
    • there is no defender
    • AI blackmails

    Visit https://www.securityweekly.com/psw for all the latest episodes!

    Show Notes: https://securityweekly.com/psw-878

    Show More Show Less
    2 hrs and 11 mins