Paul Asadoorian

Paul Asadoorian

Creator
0 followers

Paul Asadoorian is the founder of Security Weekly and a former pentester who blends deep technical insight with media savvy, now a security evangelist at Eclypsium.

When One Person Is the Plan
VideoApr 14, 2026

When One Person Is the Plan

The video stresses that zero‑trust security is built on the premise of an inevitable breach, not on the hope that defenses will never be penetrated. It argues that organizations must pair preventive controls with a clearly documented, rehearsed incident‑response plan...

By Paul Asadoorian
AI Breaks Identity Models
VideoApr 14, 2026

AI Breaks Identity Models

The video argues that artificial‑intelligence workloads no longer fit traditional identity paradigms. Historically, systems distinguished between human users and predictable service accounts—batch jobs, scripts, or headless services—each with a stable, well‑defined identity. The speaker points out that AI agents behave unpredictably,...

By Paul Asadoorian
Too Many Vulnerabilities to Fix
VideoApr 13, 2026

Too Many Vulnerabilities to Fix

Organizations are increasingly unable to apply patches because maintaining uptime takes precedence, making remediation disruptive. The sheer volume of disclosed vulnerabilities creates a paralysis that prevents teams from prioritizing effectively. As a result, critical flaws often stay unpatched, undermining overall...

By Paul Asadoorian
FCC Can’t Define a Router
VideoApr 10, 2026

FCC Can’t Define a Router

The Federal Communications Commission released a fact sheet that conspicuously omits any clear definition of a “consumer router,” leaving manufacturers and consumers uncertain about regulatory boundaries. The agency later amended its FAQ to state that a cell‑phone hotspot does not...

By Paul Asadoorian
AI Can Catch Malicious Updates
VideoApr 9, 2026

AI Can Catch Malicious Updates

An emerging solution uses artificial intelligence to compare each software update against its previous version, flagging anomalies that may indicate malicious code insertion. The approach runs a diff on every patch, feeds the changes to an LLM, and asks whether the...

By Paul Asadoorian
LLMs vs Machine Learning for Security
VideoApr 8, 2026

LLMs vs Machine Learning for Security

The video contrasts the roles of large language models (LLMs) and traditional machine‑learning (ML) techniques in cybersecurity, emphasizing that while both fall under the AI umbrella, their practical applications differ markedly. The speaker argues that ML, with its statistical rigor,...

By Paul Asadoorian
Your Behavior Can Expose Fraud
VideoApr 6, 2026

Your Behavior Can Expose Fraud

The video explains how behavioral biometrics and device fingerprinting are being leveraged to expose fraud in digital payment ecosystems. Rather than tracking a person directly, the technology records a user’s interaction patterns—typing cadence, screen pressure, hand orientation, and device handling—to...

By Paul Asadoorian
Social Engineering Fraud Explodes
VideoApr 6, 2026

Social Engineering Fraud Explodes

The video highlights a dramatic surge in social‑engineering fraud, noting that roughly 98% of all fraud attempts now rely on manipulating people rather than exploiting system vulnerabilities. This shift reflects attackers’ preference for low‑cost, high‑yield tactics that bypass traditional security...

By Paul Asadoorian
How Attackers Bypass MFA Today
VideoApr 4, 2026

How Attackers Bypass MFA Today

The video explains current techniques attackers use to defeat multi‑factor authentication (MFA), focusing on the AITM (Authentication‑In‑The‑Middle) attack and abuse of the device‑code OAuth flow. In the AITM scenario, threat actors intercept the Microsoft identity API response, extract the one‑time MFA...

By Paul Asadoorian
When Vendors Skip Linux Support
VideoApr 3, 2026

When Vendors Skip Linux Support

The video discusses why many hardware vendors choose not to provide Linux drivers, contrasting the open‑source freedoms of Linux with the practical challenges users face when support is absent. The speaker emphasizes that Linux’s free, modifiable nature—often described as “Libre” or...

By Paul Asadoorian
AI Configures Vulnerabilities for You
VideoApr 2, 2026

AI Configures Vulnerabilities for You

Claude, Anthropic’s large language model, is being used to automate the configuration of vulnerable instances across a range of security appliances—SonicWall, Fortinet, F5, Citrix—so analysts can focus on testing rather than manual setup. The speaker demonstrates asking Claude to “enable”...

By Paul Asadoorian
Leadership or Career Risk
VideoApr 1, 2026

Leadership or Career Risk

The video explores the dilemma faced by CISOs with risk‑management backgrounds: whether to step into visible leadership roles that could expose them to heightened scrutiny during cyber or AI crises. The speaker argues that crises should be framed as opportunities rather...

By Paul Asadoorian
When Crisis Plans Fail to Act
VideoApr 1, 2026

When Crisis Plans Fail to Act

The video spotlights a growing weakness in corporate crisis management: governance structures that do not grant decisive authority when a fast‑moving incident erupts. Ann Marie explains that while most firms maintain detailed incident‑response, communications, and business‑continuity plans, those plans collapse...

By Paul Asadoorian
Can Small LLMs Solve Security Flaws?
VideoMar 31, 2026

Can Small LLMs Solve Security Flaws?

The video examines whether compact language models can address the security vulnerabilities that plague larger AI systems, citing an OpenAI paper that claims small models can be engineered to never hallucinate. It argues that eliminating hallucinations would make it easier...

By Paul Asadoorian