Paul's Security Weekly (Audio)

FIRESTARTER - PSW #924

Apr 30, 2026
Deep dives into a new malware family that targets VPN appliances and steals credentials. Technical breakdowns of a Linux CopyFail privilege escalation and how page cache manipulation enables attacks. Demos of BadUSB builds, the Banshee hardware hacker device, and HDMI/fiber eavesdropping risks. Debates on AI agents in security, supply-chain credential stealers, and internet scanning that foreshadows disclosures.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
ADVICE

Sandbox AI Agents And Limit Credentials

  • Isolate AI agents in sandboxes and give them minimal access to reduce data-exfiltration risk.
  • Sam and Paul run agents in VMs and feed them forwarded mail accounts or ProtonMail to avoid exposing primary credentials.
INSIGHT

CopyFail Logic Bug Enables Broad Linux LPE

  • CopyFail is a logic bug in Linux kernel subsystems (af_alg, splice, page cache) enabling unprivileged escalation without memory corruption.
  • Paul reproduced it on Kali; success varies by kernel config and some systems resist it, implying mitigations depend on builds.
ANECDOTE

NCSC Silent Glass Between Computer And Monitor

  • Paul describes the NCSC 'Silent Glass' hardware that inspects HDMI/DisplayPort traffic as a pass-through monitor firewall.
  • He and others debate whether it mitigates TEMPEST leakage versus firmware/monitor tampering like Monitor Darkly research.
Get the Snipd Podcast app to discover more snips from this episode
Get the app