Paul Asadoorian

Paul Asadoorian

Creator
0 followers

Paul Asadoorian is the founder of Security Weekly and a former pentester who blends deep technical insight with media savvy, now a security evangelist at Eclypsium.

What Are You Giving Up?
VideoMar 28, 2026

What Are You Giving Up?

The video stresses the importance of pausing and breathing before entering any transaction, urging viewers to engage their critical faculties rather than reacting impulsively. It frames decision‑making as a moment to assess not just price tags but the broader price...

By Paul Asadoorian
Spot Scam Red Flags Fast
VideoMar 27, 2026

Spot Scam Red Flags Fast

The video centers on practical tips for spotting common scam warning signs, aimed at consumers who encounter suspicious offers online or via phone. Speakers emphasize that offers that appear “too good to be true,” especially steep discounts such as 90% off,...

By Paul Asadoorian
LLMs Solve Firmware Upgrade Chaos
VideoMar 26, 2026

LLMs Solve Firmware Upgrade Chaos

The video highlights how large language models (LLMs) are being deployed to untangle the notoriously chaotic process of firmware upgrades across diverse hardware ecosystems. Operators must first locate each device, determine its exact hardware revision, identify the firmware version it...

By Paul Asadoorian
Don't Rely on Hope for Firmware Security
SocialMar 26, 2026

Don't Rely on Hope for Firmware Security

This is how many view firmware updates. Wishing for the best is not the best security strategy... https://t.co/MnyAcBQT6u

By Paul Asadoorian
AI Expands the Scam Target Pool
VideoMar 25, 2026

AI Expands the Scam Target Pool

The video discusses how artificial intelligence is reshaping fraudulent schemes, allowing scammers to produce flawless, grammatically correct communications that mimic legitimate business correspondence. Historically, scammers relied on obvious errors—misspellings, broken grammar—to filter for the most gullible victims. With AI tools like...

By Paul Asadoorian
When Virtual Machines Fail You
VideoMar 24, 2026

When Virtual Machines Fail You

The video warns that virtual machines are not a panacea for security; a malicious actor can break out of a VM and gain control of the underlying host. The speaker stresses that relying solely on a locally‑run virtual box or...

By Paul Asadoorian
Your Attack Surface Just Expanded
VideoMar 24, 2026

Your Attack Surface Just Expanded

Security leaders are redefining the attack surface beyond traditional endpoints, incorporating identities, applications, cloud workloads, and even IoT devices into asset inventories. The video explains how modern security platforms—whether marketed as attack surface management or exposure management—are broadening the asset...

By Paul Asadoorian
The Hardest Part of Security
VideoMar 24, 2026

The Hardest Part of Security

The video tackles what the speaker calls the "hardest part of security" – remediation – within the broader context of proactive security programs. It outlines the traditional three‑step framework: identifying assets, gaining visibility, and then prioritizing risks based on the...

By Paul Asadoorian
Why One-Time Pen Testing Isn’t Enough
VideoMar 23, 2026

Why One-Time Pen Testing Isn’t Enough

The video argues that traditional, once‑a‑year penetration testing is obsolete in today’s fast‑moving tech environment. Adrian emphasizes the shift toward continuous, offensive testing that mirrors real‑world attacks, providing organizations with up‑to‑date visibility into exploitable weaknesses. Key points include the need for...

By Paul Asadoorian
AI-First Security Is Mostly Hype
VideoMar 23, 2026

AI-First Security Is Mostly Hype

The video argues that the buzz around “AI‑first” security is largely a marketing veneer rather than a genuine market shift. Speakers contend that vendors are simply tacking AI buzzwords onto traditional security products—email filtering, DNS protection, and fraud detection—without fundamentally...

By Paul Asadoorian
AI Reinforces Your Bias
VideoMar 18, 2026

AI Reinforces Your Bias

The video highlights how generative AI assistants tend to mirror and amplify the language users feed them, effectively reinforcing personal biases. Using a simple coding example, the speaker demonstrates that when they repeatedly praise “for loops,” the model begins to...

By Paul Asadoorian
AI Hallucinations Become Security’s Problem
VideoMar 16, 2026

AI Hallucinations Become Security’s Problem

The video highlights growing concern that AI hallucinations are no longer just a model‑performance issue but a security risk that falls on security teams. Security leaders are pushing back, refusing to take ownership of model reliability, while red‑team exercises now routinely...

By Paul Asadoorian
Why Cyber Attribution Gets Complicated
VideoMar 16, 2026

Why Cyber Attribution Gets Complicated

The video examines why attributing cyber attacks to nation‑states, particularly the United States, has become a tangled problem. The author, writing a book on cyber threats, treats the U.S. as a distinct adversary alongside China and Russia, but notes that...

By Paul Asadoorian
Will AI Make Senior Developers Obsolete?
SocialMar 15, 2026

Will AI Make Senior Developers Obsolete?

Senior developers with experience use AI and create great things, but will we reach a point where we have no more senior developers, and everyone is using AI to code? https://t.co/C2oY6RLIbe

By Paul Asadoorian
Anthropic Refused Pentagon AI Request
VideoMar 13, 2026

Anthropic Refused Pentagon AI Request

The Pentagon approached Anthropic, requesting its Claude AI system for autonomous weapon targeting and mass surveillance of U.S. citizens and allies. Anthropic declined, drawing a firm line against using its technology for lethal or intrusive purposes. In response, the Department of...

By Paul Asadoorian
Linux Community Deems New CA Law Ridiculous, Unenforceable
SocialMar 13, 2026

Linux Community Deems New CA Law Ridiculous, Unenforceable

As I read and listen to responses to the new CA law, a theme emerged: the Linux community thinks this is ridiculous and is unlikely to comply (and compliance would be next to impossible to enforce...) https://t.co/hiQJkTfESN

By Paul Asadoorian
States Can't Handle Nation-State Cyber Attacks
VideoMar 12, 2026

States Can't Handle Nation-State Cyber Attacks

Organizations increasingly rely on federal threat intelligence to spot emerging nation‑state cyber campaigns. Without coordinated intel from national agencies, state and local entities often lack the visibility needed to defend against sophisticated ransomware and targeted attacks. Early warnings enable hardening...

By Paul Asadoorian
Balancing LLMs and SLMs for Data Security
VideoMar 11, 2026

Balancing LLMs and SLMs for Data Security

Large language models (LLMs) provide powerful data enrichment but suffer from imprecise predictions and hallucinations. Small language models (SLMs), fine‑tuned for specific tasks, offer higher reliability and lower risk of data leakage. Combining LLMs and SLMs lets enterprises harness broad...

By Paul Asadoorian
3 New Actively Exploited Flaws to Patch
VideoMar 10, 2026

3 New Actively Exploited Flaws to Patch

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) announced on Monday that three new vulnerabilities have been added to its Known Exploited Vulnerabilities (KEV) catalog, confirming that threat actors are actively exploiting these flaws in the wild. The inclusion in...

By Paul Asadoorian
Stop Credential Stealers With This
VideoMar 9, 2026

Stop Credential Stealers With This

The video addresses the growing threat of credential‑stealing malware and asks how organizations can both detect and neutralize such attacks before they compromise sensitive accounts. It emphasizes that many infections appear benign to end users, making proactive controls essential for...

By Paul Asadoorian
CMMC Is Now In Contracts
VideoMar 9, 2026

CMMC Is Now In Contracts

The video announces that the Cybersecurity Maturity Model Certification (CMMC) has moved from draft status to an enforceable clause in U.S. defense contracts. After the final rule was published in November 2025, the Department of Defense began a phased, multi‑year...

By Paul Asadoorian
Ransomware Before Windows Even Starts
VideoMar 6, 2026

Ransomware Before Windows Even Starts

The video demonstrates a proof‑of‑concept ransomware that infects a system at the bootloader level, allowing malicious code to execute before Windows even begins loading. By compromising the bootloader and bypassing Secure Boot, the attacker can establish a foothold that sidesteps...

By Paul Asadoorian
AI Is Supercharging Phishing
VideoMar 4, 2026

AI Is Supercharging Phishing

The video warns that artificial intelligence is dramatically amplifying phishing threats, turning what was once a low‑tech nuisance into a high‑precision weapon against corporate inboxes. By scraping publicly available data and social‑media profiles, AI can generate hyper‑personalized lures at minimal cost....

By Paul Asadoorian
Revolutionizing Linux Maintenance with Update Scripts
VideoMar 4, 2026

Revolutionizing Linux Maintenance with Update Scripts

Paul outlines major upgrades to the update.sh script, now automating cache cleaning, package updates, and kernel management in a single workflow. He also unveils a new utility that scans Linux supply‑chain security and hardware configurations, reporting vulnerabilities and verifying package...

By Paul Asadoorian
Who’s Really in Control of AI?
VideoMar 4, 2026

Who’s Really in Control of AI?

Automation and AI-driven playbooks are reshaping IT and security operations, but ensuring humans stay in control remains a core governance challenge. Structured decision paths and predefined validation steps allow systems to operate within known routes, escalating to operators when encountering...

By Paul Asadoorian
Can LLMs Really Prioritize AppSec?
VideoMar 3, 2026

Can LLMs Really Prioritize AppSec?

The video questions whether large language models (LLMs) can effectively prioritize application security findings, contrasting them with established static analysis scanners. The speaker notes that LLM tools often generate high‑quality code suggestions but fall short on triaging vulnerabilities. Developers typically ignore...

By Paul Asadoorian
An App That Detects Smart Glasses
VideoMar 2, 2026

An App That Detects Smart Glasses

An emerging app claims to alert users when smart glasses are nearby, scanning for Bluetooth Low Energy (BLE) advertisement frames emitted by devices such as Ray‑Band and Meta glasses. The tool relies on the brief BLE broadcast that occurs when the...

By Paul Asadoorian
Compliant or Facing Federal Fines
VideoFeb 28, 2026

Compliant or Facing Federal Fines

The video warns government contractors that false claims about cybersecurity compliance can trigger severe penalties under the False Claims Act, especially as the Department of Defense’s CMMC framework becomes contractually mandatory. In 2025, whistleblower‑driven actions resulted in $6.8 billion in fines across...

By Paul Asadoorian
Governing AI with Security Fundamentals
VideoFeb 25, 2026

Governing AI with Security Fundamentals

AI governance need not reinvent the wheel; it can rely on proven security fundamentals. The video draws a parallel to early cloud migration, showing how organizations extended existing controls to protect data beyond the perimeter. It recommends applying third‑party risk...

By Paul Asadoorian
Signal vs WhatsApp: Privacy Choice
VideoFeb 24, 2026

Signal vs WhatsApp: Privacy Choice

The video contrasts the privacy architectures of Signal and WhatsApp, emphasizing that both platforms employ end‑to‑end encryption for calls and messages. The presenter’s focus is on how each service handles metadata and what that means for user privacy. While encryption protects...

By Paul Asadoorian
Unseen Devices in Your Network
VideoFeb 23, 2026

Unseen Devices in Your Network

The video highlights how organizations routinely overlook a significant portion of devices on their networks, exposing a blind spot in cybersecurity defenses. Speakers reveal that roughly 10‑12% of assets are completely unknown, and among the known inventory, about 12% lack endpoint...

By Paul Asadoorian
AI Is Only as Good as Your Data
VideoFeb 23, 2026

AI Is Only as Good as Your Data

The video stresses that AI’s value in asset intelligence is directly tied to the quality of the data feeding it. While AI hype dominates headlines, the speaker reminds viewers that without clean, current data, even the most sophisticated models will...

By Paul Asadoorian
Hidden Risk of Expired Support Contracts
VideoFeb 19, 2026

Hidden Risk of Expired Support Contracts

The video highlights a hidden security risk: devices operating on expired or nonexistent support contracts cannot receive the latest firmware updates, leaving them vulnerable to exploitation. This issue is especially acute for organizations that purchase second‑hand networking equipment, which often...

By Paul Asadoorian
Transparency in Security Controls
VideoFeb 19, 2026

Transparency in Security Controls

Vanta uses a public trust center that displays real-time security control status with green check marks tied directly to internal continuous monitoring. Simple configuration checks—such as whether encryption is enabled—are automatically run and reflected on the external site so prospects...

By Paul Asadoorian
Cloud Password Vault Weakness
VideoFeb 18, 2026

Cloud Password Vault Weakness

A team of security researchers at ETH Zurich examined the resilience of popular cloud‑based password managers by modeling an extreme threat: a server that is entirely malicious. Using this worst‑case assumption, they evaluated Bitwarden, LastPass and Dashlane. The tests showed a...

By Paul Asadoorian
DNS Click Fix Threat
VideoFeb 17, 2026

DNS Click Fix Threat

The video discusses a newly reported threat – the first known DNS ClickFix attack – in which cyber‑criminals use a seemingly innocuous nslookup command to deliver malicious payloads. Microsoft’s security team identified the technique, marking a shift from traditional email‑based...

By Paul Asadoorian
Detecting AI Backdoors
VideoFeb 17, 2026

Detecting AI Backdoors

The Microsoft Security blog recently published a technical note on detecting backdoor language models at scale. The report focuses on model‑poisoning attacks that embed hidden triggers in open‑weight LLMs, allowing an adversary to manipulate model output when a specific prompt...

By Paul Asadoorian
India's New Deep Fake Laws
VideoFeb 14, 2026

India's New Deep Fake Laws

India has introduced a sweeping set of regulations targeting synthetic‑media, commonly known as deep fakes, that impose unprecedented takedown deadlines on online platforms. Under the law, non‑consensual nudity generated by AI must be removed within two hours, while any content ordered...

By Paul Asadoorian
Command Injection Risks
VideoFeb 12, 2026

Command Injection Risks

The video warns that unauthenticated command injection is among the most dangerous vulnerability classes because it works universally, regardless of platform or deployment model. Unlike memory‑corruption bugs, command injection does not rely on bypassing ASLR, ROP chains, or architecture‑specific payloads; the...

By Paul Asadoorian
AI's Role in Vendor Risk
VideoFeb 12, 2026

AI's Role in Vendor Risk

The video explores how artificial intelligence can reshape vendor risk management, moving beyond simple automation toward fundamental process redesign. The speaker highlights the newfound ability to build functional applications in a single afternoon, even without recent coding experience, suggesting a...

By Paul Asadoorian
Quantum Security Urgency
VideoFeb 11, 2026

Quantum Security Urgency

The video underscores a growing urgency for organizations to adopt quantum‑resistant security measures as regulators set definitive timelines for compliance. By establishing a clear due date, policymakers are forcing enterprises to confront the reality that data collected today could be...

By Paul Asadoorian
FanDuel and a $3M Fraud Case
VideoFeb 10, 2026

FanDuel and a $3M Fraud Case

Two Connecticut residents have been indicted on federal fraud charges for siphoning roughly $3 million from online sports‑betting platforms. Prosecutors allege the duo orchestrated a multi‑year scheme that leveraged stolen personal data to open and fund thousands of gambling accounts. The indictment...

By Paul Asadoorian
Beyond Vendor Risk: Real-Time GRC, AI, and Protecting App User Data - Jadee Hanson - CSP #221
VideoFeb 9, 2026

Beyond Vendor Risk: Real-Time GRC, AI, and Protecting App User Data - Jadee Hanson - CSP #221

The episode centers on Vanta’s Agentic Trust platform and its role in protecting application user data through real‑time governance, risk, and compliance (GRC). Host Jessica Hoffman interviews JD Hanson, Vanta’s security and technology lead, who explains how the company uses...

By Paul Asadoorian
Your Phone Remembers Everything
VideoJan 7, 2026

Your Phone Remembers Everything

The video titled “Your Phone Remembers Everything” highlights how modern smartphones continuously record user activity, debunking the myth that incognito or private modes erase digital footprints. The presenter demonstrates unified logs that capture everything from opened files to physical movement across...

By Paul Asadoorian