Black Hat

Black Hat

Creator
0 followers

Cutting-edge enterprise security research talks

SecTor 2025 | Sharing Is Caring About an RCE Attack Chain on Quick Share
VideoApr 14, 2026

SecTor 2025 | Sharing Is Caring About an RCE Attack Chain on Quick Share

At SecTor 2025, SafeReach researchers Orya and Cohen unveiled a sophisticated remote‑code‑execution (RCE) attack chain targeting Google’s Quick Share, now available on Windows. The talk detailed how the team reverse‑engineered the Nearby Connections protocol, built a custom "QuickSniff" logger, and leveraged...

By Black Hat
SecTor 2025 | Leading Across the Generations
VideoApr 14, 2026

SecTor 2025 | Leading Across the Generations

The talk at SecTor 2025 focused on leading across generations in cybersecurity, emphasizing that technical expertise alone isn’t enough; leaders must grasp the cultural and motivational traits of each age cohort. The speaker highlighted how adoption timelines for technologies have shrunk—from...

By Black Hat
SecTor 2025 | One Agent to Rule Them All: How One Malicious Agent Hijacks A2A System
VideoApr 13, 2026

SecTor 2025 | One Agent to Rule Them All: How One Malicious Agent Hijacks A2A System

The SecTor 2025 talk highlighted a growing security dilemma: multi‑agent generative‑AI systems, exemplified by Google’s A2A (Agent‑to‑Agent) protocol, can be weaponized by a single malicious agent that hijacks an entire automation ecosystem. The presenters, senior AI security researchers from Zenity...

By Black Hat
Black Hat USA 2025 | ReVault! Compromised by Your Secure SoC
VideoApr 10, 2026

Black Hat USA 2025 | ReVault! Compromised by Your Secure SoC

At Black Hat USA 2025, Cisco Talos senior researcher Firo Verity presented his findings on Dell’s Control Vault secure‑on‑chip (SoC) and how it can be compromised. Verity showed that the Broadcom‑based BCM58202 chip, used in over 100 Dell Latitude and Precision models,...

By Black Hat
Black Hat USA 2025 | LLM-Driven Reasoning for Automated Vulnerability Discovery Behind Hall-of-Fame
VideoApr 8, 2026

Black Hat USA 2025 | LLM-Driven Reasoning for Automated Vulnerability Discovery Behind Hall-of-Fame

The Black Hat USA 2025 talk introduced “Whisper,” a large‑language‑model‑driven system that automatically discovers vulnerabilities in stripped ARM64 binaries. The presenter, a researcher guiding an undergraduate team, explained how the tool earned a Hall of Fame award at Samsung...

By Black Hat
Black Hat USA 2025 | Leveraging Jamf for Red Teaming in Enterprise Environments
VideoApr 7, 2026

Black Hat USA 2025 | Leveraging Jamf for Red Teaming in Enterprise Environments

The Black Hat USA 2025 session highlighted how adversary emulation teams can weaponize Jamf Pro—Apple’s enterprise‑device management platform—to conduct red‑team operations in Fortune‑500 environments. Speakers Lance Kane and Dan Mayer described Jamf’s prevalence in developer‑heavy organizations, its default “set‑and‑forget” configuration,...

By Black Hat
Black Hat USA 2025 | 2 Cops 2 Broadcasting: TETRA End-To-End Under Scrutiny
VideoApr 7, 2026

Black Hat USA 2025 | 2 Cops 2 Broadcasting: TETRA End-To-End Under Scrutiny

Midnight Blue, a Dutch cyber‑security consultancy, presented at Black Hat USA 2025 a deep dive into the end‑to‑end encryption layer of the Tetra terrestrial trunked radio standard. Tetra, widely adopted for police, military and SCADA communications, has long kept its...

By Black Hat
Black Hat USA 2025 | The 5G Titanic
VideoApr 6, 2026

Black Hat USA 2025 | The 5G Titanic

The presentation likened the 5G architecture to the Titanic, arguing that, like the ship’s supposedly watertight compartments, 5G’s control‑plane and user‑plane are assumed to be isolated but in practice lack vertical sealing. The speaker outlined how the network’s design—AMF, SMF...

By Black Hat
Black Hat USA 2025 | AI Agents for Offsec with Zero False Positives
VideoApr 5, 2026

Black Hat USA 2025 | AI Agents for Offsec with Zero False Positives

Brendan Dolan‑Gavitt opened his Black Hat USA 2025 talk by warning that the promise of AI‑driven offensive security is haunted by a spectre of false positives. Drawing on his decade‑long experience in software security and recent work on GitHub Copilot,...

By Black Hat
Black Hat USA 2025 | Protecting Small Organizations in the Era of AI Bots
VideoApr 5, 2026

Black Hat USA 2025 | Protecting Small Organizations in the Era of AI Bots

The presentation at Black Hat USA 2025 focused on defending small, resource‑constrained organizations against the surge of AI‑driven bots. Citing the Impreva 2025 BadBot report, the speaker highlighted that 51% of all internet traffic is now non‑human, and that 80%...

By Black Hat
Black Hat USA 2025 | Kernel-Enforced DNS Exfiltration Security
VideoApr 4, 2026

Black Hat USA 2025 | Kernel-Enforced DNS Exfiltration Security

The presentation by independent researcher Vang Parnes focuses on the growing threat of DNS‑based command‑and‑control (C2) and tunneling techniques targeting Linux systems, especially in cloud environments. He outlines why DNS is the favored back‑door for advanced persistent threats (APTs), citing...

By Black Hat
Black Hat USA 2025 | Burning, Trashing, Spacecraft Crashing
VideoApr 4, 2026

Black Hat USA 2025 | Burning, Trashing, Spacecraft Crashing

The Black Hat USA 2025 session, led by Mileno Star and Andre of Vision Space, highlighted the growing cyber‑risk landscape for space systems. With commercial constellations such as Starlink and OneWeb proliferating alongside renewed military satellite launches, the orbital environment now presents a...

By Black Hat
Black Hat USA 2025 | Universal and Context-Independent Triggers for Precise Control of LLM Outputs
VideoApr 4, 2026

Black Hat USA 2025 | Universal and Context-Independent Triggers for Precise Control of LLM Outputs

The Black Hat presentation introduced a novel class of prompt‑injection attacks called universal adversarial triggers, which allow attackers to hijack large language model (LLM) outputs with a single, reusable token sequence. By decoupling the malicious payload from the trigger,...

By Black Hat
Black Hat Stories | Or Yair, Security Research Team Lead at SafeBreach
VideoApr 2, 2026

Black Hat Stories | Or Yair, Security Research Team Lead at SafeBreach

Ori Yair, security research team lead at SafeBreach, reflects on his Black Hat experiences, from his first nerve‑wracking speaking slot to his ongoing focus on Windows‑based vulnerability research. He frames the conference as a catalyst for turning technical curiosity into...

By Black Hat
Black Hat | Pulse