Focusing on Proactive Controls in the Face of LLM-Assisted Malware - Rob Allen - ASW #368

Focusing on Proactive Controls in the Face of LLM-Assisted Malware - Rob Allen - ASW #368

Author: Security Weekly Productions February 3, 2026 Duration: 1:07:11

Everyone is turning to LLMs to generate code, including attackers. Thus, it's no great surprise that there are now examples of malware generated by LLMs. We discuss the implications of more malware with Rob Allen and what it means for orgs that want to protect themselves from ransomware.

Resources

This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them!

Show Notes: https://securityweekly.com/asw-368


Dive into the ever-evolving world of digital defense with the Security Weekly Podcast Network (Video). Produced by Security Weekly Productions, this network isn't a single perspective but a comprehensive hub where different facets of cybersecurity come into focus through distinct, dedicated shows. You'll find episodes from series like Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News, all curated in one feed. This structure means that whether you're analyzing code, shaping corporate policy, or managing infrastructure, there's relevant content for you. The discussions move beyond headlines, offering practical analysis and expert insights that help make sense of complex threats and solutions. By blending technology deep dives with timely news commentary, this video podcast provides a multi-dimensional view of the field, suitable for professionals who need to stay informed and enthusiasts curious about how security shapes our digital lives. It’s a consistent resource for anyone looking to understand not just what is happening in cybersecurity, but why it matters and how to respond.
Author: Language: English Episodes: 100

Security Weekly Podcast Network (Video)
Podcast Episodes
Scanning The Internet with Linux Tools - PSW #919 [not-audio_url] [/not-audio_url]

Duration: 1:03:26
In this segment, we will explore some pretty awesome tools for scanning the Internet, with a focus on network edge devices. We'll bring it all together with Claude Code and look at some sample results. Tools include: Sho…
Say Easy, Do Hard - Crypto-Agility - BSW #440 [not-audio_url] [/not-audio_url]

Duration: 52:28
With Q-day getting closer, regulatory guidance pushing firms to migrate to quantum security in the next five years, and an extensive remediation backlog waiting to be discovered, security leaders must start their quantum…
Hacking IP KVMs & Reversing with Radare2 - Sergi Àlvarez - PSW #918 [not-audio_url] [/not-audio_url]

Duration: 2:10:49
In this episode, we sit down with the Radare community leader, Pancake, the creator of the Radare2 reverse engineering framework. Whether you've never heard of Radare, already use it daily, or are thinking about contribu…