Paul Asadoorian - Latest News and Information
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Technology Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
Paul Asadoorian

Paul Asadoorian

Creator
0 followers

Paul Asadoorian is the founder of Security Weekly and a former pentester who blends deep technical insight with media savvy, now a security evangelist at Eclypsium.

Recent Posts

Detecting AI Backdoors
Video•Feb 17, 2026

Detecting AI Backdoors

The Microsoft Security blog recently published a technical note on detecting backdoor language models at scale. The report focuses on model‑poisoning attacks that embed hidden triggers in open‑weight LLMs, allowing an adversary to manipulate model output when a specific prompt is presented. By analyzing the internal attention maps of these models, the team identified a distinctive, repeatable pattern that signals a backdoor’s presence. The researchers demonstrated that backdoor‑injected models exhibit a predictable attention signature that can be captured with a lightweight scanner. The scanner not only flags suspicious weight configurations but can also reverse‑engineer the exact trigger phrase that activates the malicious behavior. Their methodology was applied across dozens of models hosted on public repositories such as Hugging Face, proving that the approach scales beyond a single vendor’s ecosystem. A notable observation from the paper is the description of the backdoor as an “attention pattern” that emerges consistently regardless of the model’s architecture. The authors cite examples where a seemingly innocuous prompt—e.g., a specific sequence of tokens—causes the model to output disallowed content or reveal hidden data. The scanner’s ability to reconstruct these triggers underscores the feasibility of automated forensic analysis for open‑source AI assets. The findings carry significant implications for enterprises that integrate third‑party LLMs into products or services. Detecting and mitigating backdoors before deployment can prevent data leakage, brand damage, and regulatory violations. Moreover, the work pushes the industry toward standardized security vetting of open‑weight models, encouraging developers to adopt proactive scanning tools as part of their AI governance frameworks.

By Paul Asadoorian
India's New Deep Fake Laws
Video•Feb 14, 2026

India's New Deep Fake Laws

India has introduced a sweeping set of regulations targeting synthetic‑media, commonly known as deep fakes, that impose unprecedented takedown deadlines on online platforms. Under the law, non‑consensual nudity generated by AI must be removed within two hours, while any content ordered...

By Paul Asadoorian
Command Injection Risks
Video•Feb 12, 2026

Command Injection Risks

The video warns that unauthenticated command injection is among the most dangerous vulnerability classes because it works universally, regardless of platform or deployment model. Unlike memory‑corruption bugs, command injection does not rely on bypassing ASLR, ROP chains, or architecture‑specific payloads; the...

By Paul Asadoorian
AI's Role in Vendor Risk
Video•Feb 12, 2026

AI's Role in Vendor Risk

The video explores how artificial intelligence can reshape vendor risk management, moving beyond simple automation toward fundamental process redesign. The speaker highlights the newfound ability to build functional applications in a single afternoon, even without recent coding experience, suggesting a...

By Paul Asadoorian
Quantum Security Urgency
Video•Feb 11, 2026

Quantum Security Urgency

The video underscores a growing urgency for organizations to adopt quantum‑resistant security measures as regulators set definitive timelines for compliance. By establishing a clear due date, policymakers are forcing enterprises to confront the reality that data collected today could be...

By Paul Asadoorian
FanDuel and a $3M Fraud Case
Video•Feb 10, 2026

FanDuel and a $3M Fraud Case

Two Connecticut residents have been indicted on federal fraud charges for siphoning roughly $3 million from online sports‑betting platforms. Prosecutors allege the duo orchestrated a multi‑year scheme that leveraged stolen personal data to open and fund thousands of gambling accounts. The indictment...

By Paul Asadoorian
Beyond Vendor Risk: Real-Time GRC, AI, and Protecting App User Data - Jadee Hanson - CSP #221
Video•Feb 9, 2026

Beyond Vendor Risk: Real-Time GRC, AI, and Protecting App User Data - Jadee Hanson - CSP #221

The episode centers on Vanta’s Agentic Trust platform and its role in protecting application user data through real‑time governance, risk, and compliance (GRC). Host Jessica Hoffman interviews JD Hanson, Vanta’s security and technology lead, who explains how the company uses...

By Paul Asadoorian
Your Phone Remembers Everything
Video•Jan 7, 2026

Your Phone Remembers Everything

The video titled “Your Phone Remembers Everything” highlights how modern smartphones continuously record user activity, debunking the myth that incognito or private modes erase digital footprints. The presenter demonstrates unified logs that capture everything from opened files to physical movement across...

By Paul Asadoorian

Page 2 of 2

← Prev12