
Black Hat USA 2025 | Protecting Small Organizations in the Era of AI Bots
The presentation at Black Hat USA 2025 focused on defending small, resource‑constrained organizations against the surge of AI‑driven bots. Citing the Impreva 2025 BadBot report, the speaker highlighted that 51% of all internet traffic is now non‑human, and that 80% of malicious bot IPs evade popular blocklists, leaving tiny nonprofits vulnerable to overwhelming automated scraping. Using the Community Science Institute as a case study, the talk illustrated how a single server received 150,000 page hits in 20 days—over 7,000 daily—most of which were traced to AI crawlers gathering data for model training. Conventional defenses such as throttling, public blocklists, and basic log tools proved ineffective; rate‑limiting trimmed traffic by only about 33% while bots adapted to stay within limits. The speaker introduced a non‑AI visual analytics method: plotting time versus IP to expose repetitive, mechanical patterns akin to sonar readings. By aggregating these patterns with human‑behavioral metrics—daily hit counts, session length, and consecutive‑day activity—a scoring algorithm was built. Hierarchical IP hashing then collapsed individual addresses into subnets, allowing the system to block entire data‑center ranges that exhibited bot‑like cadence. The result is a practical, low‑cost framework that small organizations can deploy to differentiate human users from automated agents, dramatically reducing server strain and preserving service quality. The approach demonstrates how blending behavioral science with hierarchical network analysis can outpace traditional blocklists, offering a scalable defense as AI‑generated traffic continues to dominate the web.

Long-Term Data Storage for Home Users
The video from explainingcomputers.com examines long‑term data storage options for home users, borrowing enterprise concepts of backup versus archive, and aims to guide individuals on preserving photos, videos, and legal documents. It reviews five media categories—internal/external HDDs, SSDs, USB/flash cards, writable...

Black Hat USA 2025 | Kernel-Enforced DNS Exfiltration Security
The presentation by independent researcher Vang Parnes focuses on the growing threat of DNS‑based command‑and‑control (C2) and tunneling techniques targeting Linux systems, especially in cloud environments. He outlines why DNS is the favored back‑door for advanced persistent threats (APTs), citing...

How to Find Out if Your Computer Is Part of a Botnet—And What to Do About It
Off‑brand gadgets like streaming sticks or digital frames often arrive pre‑loaded with residential proxy software, a hidden tool that turns home routers into nodes of a massive botnet—over two million devices reported. The video warns shoppers to scrutinize unknown brands...

Black Hat USA 2025 | Burning, Trashing, Spacecraft Crashing
The Black Hat USA 2025 session, led by Mileno Star and Andre of Vision Space, highlighted the growing cyber‑risk landscape for space systems. With commercial constellations such as Starlink and OneWeb proliferating alongside renewed military satellite launches, the orbital environment now presents a...

How Attackers Bypass MFA Today
The video explains current techniques attackers use to defeat multi‑factor authentication (MFA), focusing on the AITM (Authentication‑In‑The‑Middle) attack and abuse of the device‑code OAuth flow. In the AITM scenario, threat actors intercept the Microsoft identity API response, extract the one‑time MFA...

Techstrong TV - April 3, 2026
At RSAC, Techstrong’s host sat down with longtime security analyst Rich Vogle to discuss his recent move to the Cloud Security Alliance (CSA) as chief analyst. The conversation centered on Vogle’s new mandate: expanding CSA’s reach beyond vendors to serve...

Black Hat USA 2025 | Universal and Context-Independent Triggers for Precise Control of LLM Outputs
The Black Hat presentation introduced a novel class of prompt‑injection attacks called universal adversarial triggers, which allow attackers to hijack large language model (LLM) outputs with a single, reusable token sequence. By decoupling the malicious payload from the trigger,...

NPM Axious Hack: Popular Applications Potentially Infected by a RAT?
The video examines a recent supply‑chain compromise of the widely‑used NPM package Axios, which was hijacked to distribute a remote‑access tool (RAT) that briefly infected an estimated 100 million computers. The malicious payload is delivered in three platform‑specific variants—a Windows PowerShell script,...

Handing Over The Keys to Your Kingdom: AI-Driven Security Woes
The video warns that AI agents and DevSecOps tools, despite holding extensive permissions, suffer from weak oversight, creating a "credential‑drift" crisis. Recent supply‑chain attacks have compromised popular utilities such as Trivy, Axios, LiteLLM, OpenAI Codex, and Claude Code. The speaker...

When Vendors Skip Linux Support
The video discusses why many hardware vendors choose not to provide Linux drivers, contrasting the open‑source freedoms of Linux with the practical challenges users face when support is absent. The speaker emphasizes that Linux’s free, modifiable nature—often described as “Libre” or...

Practical Security for AI-Generated Code
Milan Williams, product manager at Segrep, opened the session by warning that AI‑driven code generators are no longer limited to single‑line suggestions; they now produce thousands of lines of code and execute shell commands with elevated credentials. He framed the...

AI Configures Vulnerabilities for You
Claude, Anthropic’s large language model, is being used to automate the configuration of vulnerable instances across a range of security appliances—SonicWall, Fortinet, F5, Citrix—so analysts can focus on testing rather than manual setup. The speaker demonstrates asking Claude to “enable”...

From Gut to Gold Standard: The Admiralty System in CTI
The presentation introduces the Admiralty Scale, a century‑old British Navy framework, as a rigorous method for evaluating source credibility and information reliability in cyber threat intelligence (CTI). Freddy argues that modern CTI suffers from opaque reporting, unverified claims, and bias,...

Hunting North Korea’s Contagious Interview Operation
The presentation by senior threat analyst Kir Boyenko details North Korea’s state‑sponsored “contagious interview” campaign, which masquerades as recruiter outreach, test assignments, or take‑home exams to trick developers into executing malicious code. By targeting open‑source ecosystems—primarily npm, but also Python,...

Black Hat Stories | Or Yair, Security Research Team Lead at SafeBreach
Ori Yair, security research team lead at SafeBreach, reflects on his Black Hat experiences, from his first nerve‑wracking speaking slot to his ongoing focus on Windows‑based vulnerability research. He frames the conference as a catalyst for turning technical curiosity into...

Does DNSSEC Give You Encrypted DNS?
The video clarifies a common misconception: DNSSEC does not provide encrypted DNS traffic. Instead, it adds cryptographic signatures to DNS resource records, allowing resolvers to verify that the data originated from the authoritative source and has not been altered. Implementing DNSSEC...

🔴 Apr 2's Top Cyber News NOW! - Ep 1102
The episode’s headline story is Apple’s unexpected decision to back‑port a security fix for iOS 18, targeting the Darksword exploit that silently hijacks iPhones through compromised web pages. While Apple typically forces users onto the latest OS to streamline development, the...

Black Hat USA 2025 | Ghost Calls: Abusing Web Conferencing for Covert Command & Control
The Black Hat USA 2025 talk introduced “ghost calls,” a technique that hijacks commercial web‑conferencing platforms to create covert, short‑term command‑and‑control (C2) channels. Presenter Adam Crosser explained that traditional C2 methods—socks proxies, long‑term implants, or peer‑to‑peer tunnels—often suffer from latency,...

No More Routers In The US - Threat Wire
The episode covers a wave of supply‑chain compromises by the threat actor known as Team PCP, alongside a sweeping FCC decision to ban foreign‑made consumer routers and a scandal involving compliance startup Delve. Alli Diamond walks through each incident, highlighting...

They're Selling Your Address to ICE Right Now
The video exposes a hidden industry that aggregates billions of personal data points—addresses, income, vehicle registrations, health conditions, and even ethnicity—into commercial dossiers sold to private litigators, debt collectors, and government agencies. Platforms such as Thomson Reuters Clear, LexisNexis Accurant,...

David Brin on Agentic AI, Accountability and the Fight Ahead
David Brin, celebrated sci‑fi author and AI thinker, opened a session at RSAC by framing today’s AI surge as an evolutionary leap. He contrasted the historic symbolic‑logic path to artificial general intelligence with the rapid ascendancy of large language models...

Why Vector Databases Are Becoming an AI Security Blind Spot | Nicolas Dupont of Cyborg
At RSA 2024, Nicolas Dupont of Cyborg warned that vector databases—core to enterprise AI inference—are becoming a hidden security blind spot as organizations centralize proprietary data for retrieval. He explained that vector databases operate on raw embeddings in plaintext because distance...

Black Hat USA 2025 | Practical Attacks on Nostr, a Decentralized Censorship-Resistant Protocol
The Black Hat USA 2025 session, led by HKuma of NICT Japan, examined practical attacks on Nostr, a decentralized, censorship‑resistant social networking protocol. The talk highlighted how Nostr shifts trust to client devices, eliminating central servers, and presented the researchers’...

Course Overview - Web Security
The video introduces Stanford’s advanced cyber‑security program, co‑directed by Neil Dwani with professors Dan Bonet and Zakir Demerich, to train professionals in defending web applications against today’s most damaging threats. It positions the course as essential for anyone who builds,...

Why Hide My Email FAILS
The video examines Apple’s claim of being a privacy‑first company against a recent court filing that shows the tech giant handed the FBI the real iCloud address behind its “Hide My Email” feature. The disclosure occurred during an investigation of...

Black Hat USA 2025 | Uncovering and Responding to the Tj-Actions Supply Chain Breach
The presentation detailed a supply‑chain breach that hit the popular TJ‑actions/change‑files GitHub Action. On March 14, an automated alert flagged an unexpected outbound request, leading the Step Security team to discover that the action’s release tags had been repointed to a...

Executive Interview: Securing Healthcare's Hidden Attack Surface with James Winebrenner
In this Unhack executive interview, Drex Deford sits down with James Weinbrenner, co‑founder of Elicity, to discuss the company’s approach to securing the hidden attack surface that pervades modern healthcare environments. Weinbrenner outlines how Elicity leverages an identity‑graph platform to...

Millions of JS Devs Just Got Penetrated by a RAT…
The video reports a supply‑chain breach affecting the popular JavaScript HTTP client Axios, where two malicious versions were uploaded to the npm registry, embedding a precision‑guided remote access Trojan (RAT). The attack inserts a rogue dependency called plain‑crypto‑js that runs a...

AI Cyber Defense Ops Course Launch!
Just Hacking Training used a livestream to unveil a new AI Cyber Defense Ops course led by instructor Anton, spotlighting practical blue-team techniques that incorporate AI tools like Claude. The platform emphasized its hands-on, affordable model—on-demand labs, free and extended...
![Ethical Hacking Full Course 2026 [FREE] | Ethical Hacking Tutorial For Beginners | Simplilearn](/cdn-cgi/image/width=1200,quality=75,format=auto,fit=cover/https://i.ytimg.com/vi/TfRNS7aRVqI/maxresdefault.jpg)
Ethical Hacking Full Course 2026 [FREE] | Ethical Hacking Tutorial For Beginners | Simplilearn
The video introduces Simplilearn’s Certified Ethical Hacker (CEH) v13 program, positioning it as a response to the staggering frequency of cyber attacks—one every 39 seconds—and the growing demand for skilled security professionals. It outlines the course’s structure, from foundational modules...

FireMon Brings Clarity to Firewall Rule Chaos (Sponsored)
The sponsored episode of Packet Protector spotlights FireMon, a policy‑control platform that aims to tame the growing chaos of firewall rules across on‑prem, cloud and micro‑segmentation environments. Jody Brazil explains that while firewalls have evolved—from ACLs to application‑aware and native cloud...

The WORST Hack of 2026
The video exposes what the creator calls the "worst hack of 2026," a supply‑chain breach of the popular JavaScript HTTP library Axios. An attacker seized the lead maintainer’s long‑lived npm token, altered the package’s package.json to add a single‑line dependency that...

Black Hat USA 2025 | More Flows, More Bugs: Empowering SAST with LLMs and Customized DFA
The Black Hat USA 2025 talk, presented by Yuan of Tencent Security Winding Lab, detailed a novel approach to strengthening static application security testing (SAST) by marrying large language models (LLMs) with a customized data‑flow analysis (DFA) engine. The session...

Can Small LLMs Solve Security Flaws?
The video examines whether compact language models can address the security vulnerabilities that plague larger AI systems, citing an OpenAI paper that claims small models can be engineered to never hallucinate. It argues that eliminating hallucinations would make it easier...

HOW the NSA Monitors Your VPN
The video highlights growing concerns that commercial VPN use may expose Americans to NSA surveillance, prompting six Democratic lawmakers to request clarification from the Director of National Intelligence about whether VPN users lose constitutional protections against warrantless spying. It explains that...

Utility Resilience And Security I CIO Talk Network
The CIO Talk Network episode spotlights utility resilience and security, featuring Ma Chamari, CMS Energy’s vice‑president and chief information officer. The conversation frames the smart‑grid rollout as a catalyst for new physical and cyber threats that utilities must confront. Chamari identifies three...

AWS AI Practitioner Question 32
The video addresses an AWS AI Practitioner exam scenario where a company builds a customer‑support chatbot on Amazon Bedrock and must block unrelated topics, profanity, and prompt‑injection attempts. It highlights the need for a safety mechanism that can enforce content...

Newsday: Hackers Outpace Healthcare Resilience and Surviving a Merger with Drex and Bill
The episode centers on the looming Sutter‑Alina merger and a recent wave of cyber‑attacks, using the two topics to illustrate how health‑system consolidation and security resilience intersect. Bill Russell and Drex unpack the practical realities of merging two large providers,...

Security Engineer Roadmap 2026 | How To Become A Security Engineer In 2026 | #Shorts | #Simplilearn
The video outlines a step‑by‑step career roadmap for aspiring DevOps engineers targeting the 2026 job market, emphasizing that demand for these roles is surging globally according to Statista data. It argues that beginners should first master foundational infrastructure skills—Linux command...

What Are You Giving Up?
The video stresses the importance of pausing and breathing before entering any transaction, urging viewers to engage their critical faculties rather than reacting impulsively. It frames decision‑making as a moment to assess not just price tags but the broader price...

Windows 10 Is Gone - Upgrade, Switch, or Get Hacked?
The video warns that Microsoft officially ended support for Windows 10 on October 14, 2025, meaning the operating system will no longer receive security patches or bug fixes. The creator emphasizes that while many users still run Windows 10—roughly half of a surveyed 200‑plus...

Spot Scam Red Flags Fast
The video centers on practical tips for spotting common scam warning signs, aimed at consumers who encounter suspicious offers online or via phone. Speakers emphasize that offers that appear “too good to be true,” especially steep discounts such as 90% off,...

Live From #RSAC 📍 The Future of Human Risk Is Here — Defending Against Scattered Spider Type Attacks
At RSA, Kitron and Theo highlighted the emerging “human risk” landscape, focusing on Scattered Spider‑type attacks that blend email phishing, phone calls, SMS and deep‑fake visual lures. They explained that adversaries are increasingly leveraging omni‑channel social engineering, using AI‑generated deep‑fakes to...

Cyber Week 2026 Wrap Up with Palo Alto Networks: Agents, Prisma AIRS and NGTS (Sponsored)
The podcast recaps Palo Alto Networks’ RSA 2026 announcements, spotlighting AI‑security guidance and the launch of Next‑Gen Trust Security (NGTS). Executives Ian Swanson and Rich Kana explain why enterprises must secure AI models, agents, and skills throughout the supply chain and...

Upgrade Now!
Apple has issued an urgent iOS 26.4 update for iPhone 11 and newer models, citing 37 critical security flaws that could allow remote compromise. The patch addresses six WebKit vulnerabilities that enable cross‑site scripting, a full‑chain “Dark Sword” exploit leveraging multiple...

Drex Drill 20260324
The video highlights the recent takedown of Hendala, an Iranian‑backed hacking group, by the FBI and Department of Justice after its wiper attack on medical‑technology firm Striker. The operation removed the group’s public‑facing websites, which serve as a propaganda and...

Key Trends Shaping Modern Information Security (5 Minutes)
The five‑minute briefing outlines the most consequential trends reshaping information security, from service‑based ransomware to evolving regulatory pressures, and explains why organizations must rethink traditional defenses. It highlights ransomware‑as‑a‑service democratizing attacks, the explosion of insecure IoT endpoints, the shift toward zero‑trust...

Black Hat USA 2025 | Evaluating Autonomous Vehicle Resilience
The Black Hat USA 2025 presentation from Zuks engineers focused on the resilience of autonomous‑driving vehicles through a human‑in‑the‑loop teleoperation model. Jan Hu and Shane Gupta explained how a remote operator can intervene when the AI’s confidence drops, sending waypoint...

The Cold Wallet Myth
The video titled "The Cold Wallet Myth" argues that the conventional wisdom of securing crypto with a single hardware wallet and a 24‑word seed is dangerously flawed. It opens with a UK case where a man allegedly lost $176 million because...