
The Black Hat USA 2025 session titled “From Prompts to Pwns” examined how modern AI agents—especially those powered by large language models—can be both powerful assistants and vulnerable attack surfaces. Speakers Becca and Rich from NVIDIA’s AI Red Team introduced a three‑tier autonomy framework, ranging from deterministic inference endpoints to fully autonomous agents that control their own toolchains, to help audiences gauge risk exposure. They identified a “universal anti‑pattern” underlying AI attacks: untrusted data reaches the agent, the LLM processes it, and the resulting instructions are passed to downstream tools with elevated privileges. Prompt injection, whether embedded in user prompts, retrieved documents, or even hidden white‑on‑white email text, can subvert system prompts and force agents to execute malicious actions. Demonstrations included hijacking Microsoft Copilot via crafted emails, exploiting the open‑source Pandanda AI to run arbitrary Python code, and manipulating a computer‑use agent that loops between client‑side tool execution and server‑side decision making. Concrete examples underscored the severity: a Copilot injection redirected payroll queries to a phishing site, prompting credential exfiltration; Pandanda’s CVE allowed a base‑64 payload to spawn a reverse shell despite guardrails; and a computer‑use agent could be coerced into taking screenshots, navigating browsers, and writing files without user oversight. The presenters emphasized that once an attacker’s payload reaches the LLM, they can potentially control any downstream capability. The talk concluded with practical mitigations: enforce strict input sanitization, isolate agents in sandboxed containers, implement robust guardrails that cannot be bypassed by prompt injection, and limit tool access based on the principle of least privilege. As enterprises integrate AI agents into critical workflows, overlooking these safeguards could expose sensitive data, internal systems, and corporate reputation to novel, automated exploits.

The video walks viewers through a step‑by‑step deployment of the n8n workflow automation platform on a Hostinger virtual private server, emphasizing a low‑cost, one‑click installation that becomes production‑ready by the end. Dan begins by urging users to sign up through an...

The CIO Talk Network episode examines whether SAP HANA can withstand rigorous scrutiny, featuring SAP’s VP of product strategy Jeff W. and HP’s CTO Chris Ninwit. They frame HANA as a purpose‑built, in‑memory platform that unifies transactional (OLTP) and analytical...

The episode questions whether AI agents must be truly intelligent or simply effective at completing tasks. It highlights the ongoing debate over AI’s “understanding” versus its role as a practical workflow engine in enterprises. Real‑world use cases—document drafting, ticket routing,...

Temenos is positioning its Money Movement and Management platform as the backbone for the accelerating global payments ecosystem, promising banks, fintechs and non‑bank payment service providers a unified solution to handle everything from instant domestic transfers to complex cross‑border settlements. The...

Episode 1076 of the "Top Cyber News NOW!" series provides a concise roundup of the day’s most relevant cybersecurity developments for professionals. The episode spotlights ThreatLocker’s Zero Trust platform as a ransomware mitigation tool and promotes educational resources such as...

The Kubernetes Steering Committee announced that the Ingress NGINX controller – a core ingress solution for roughly half of cloud‑native deployments – will be officially retired at the end of March, six weeks from the announcement. After that date the...

Plakar is an open‑source backup solution aimed at DevOps engineers who need enterprise‑level data resilience. The video explains how traditional object storage like S3 lacks point‑in‑time recovery and built‑in encryption, leaving critical workloads exposed to accidental deletion, ransomware, or corruption. Plakar...

Vanta uses a public trust center that displays real-time security control status with green check marks tied directly to internal continuous monitoring. Simple configuration checks—such as whether encryption is enabled—are automatically run and reflected on the external site so prospects...

Google casts itself as an agnostic ecosystem enabler for fintechs, supplying cloud infrastructure and developer tools so firms can focus on product rather than core operations. Its Google Cloud Marketplace helps B2B fintechs onboard and gain access to tier‑1 through...

In the video, Derek Lamartin dismantles the blanket claim that the outbox pattern, CQRS, and event sourcing are inherently over‑engineered solutions. He argues that the real question is whether these patterns address a concrete business need, not whether they belong...

Ryan Emmens presented at DEF CON 33 a case study on discovering and weaponising an unauthenticated vulnerability in Synology’s DiskStation Manager (DSM) operating system, culminating in a $40,000 Pwn2Own win. By instrumenting the login flow with eBPF tracing and inotify, he...

The speaker argues that Revenue Operations (RevOps) is the central function that enables scalable, strategic marketing by ensuring data integrity, compliance, segmentation, and automated orchestration without sacrificing brand authenticity. At their company, a marketing manager doubles as the RevOps specialist,...

Addy Osmani, working to bridge Google DeepMind research with product and developer teams, urges builders to move beyond one-off demos toward production-ready AI systems. He frames development on a spectrum from “wild west” solo experiments to enterprise-grade setups with quality...

In a sponsored session at the conference, Grafana Labs’ Developer Programs Director Ted Young—also a co‑founder of the OpenTelemetry project—outlined the current state of installing OpenTelemetry and previewed the roadmap for simplifying the process. He emphasized that the guidance applies...

Mike Manos, CTO of Dun & Bradstreet, described a five-year modernization push to transform the 186-year-old data company into a cloud-first, AI-enabled enterprise. He said D&B now ingests and processes north of five exabytes of data nightly across more than...

The CIO Talk Network episode spotlights the permanence of remote work and the need for scalable, reliable, and secure operations. Host Sanjal interviews Sisha Mandawa, CIO of Greenpath Financial Wellness, a nonprofit that has navigated the shift to a distributed workforce...

The video explores how domain‑driven design (DDD) is reshaping platform engineering, arguing that future internal developer platforms must be built around business domains rather than generic infrastructure abstractions. AJ Chunkermath explains that traditional platform teams often deliver one‑size‑fits‑all services, which...

Mauricio Monroy, senior executive at Equisoft, spoke at ITC LATAM 2023 in Miami, highlighting the Canadian firm’s end‑to‑end software solutions tailored for the insurance sector. Equisoft’s portfolio spans CRM, illustration and quoting engines, electronic applications, policy‑admin systems, customer portals and a...

Speakers warned that cloud upgrade projects often promise “fit‑to‑standard” implementations but fail because vendors and integrators do not adequately engage frontline staff to redesign work, leading teams to re‑create legacy processes in new systems and negate expected benefits. Poor requirements...

The video features Eric Kimberling interviewing Bonnie Tinder of Raven Intelligence about the critical role of system integrators in digital transformations and Raven’s data-driven, peer-review platform for rating integrators. Tinder explains that while buyers obsess over consumer reviews for small...

The video outlines an intelligence‑driven approach to blue‑team operations, arguing that modern cyber‑threat intelligence (CTI) must evolve from static reports into an operational pipeline that turns external threat feeds and internal telemetry into concrete defensive actions. The speaker, who credits...

Researchers from Palo Alto Networks' Cortex team demonstrated how attackers can weaponize fine-tuning of large language models to build stealthy command-and-control channels that live inside popular AI models. They show attackers already using LLMs for reconnaissance, social engineering and coding,...

Anthony Switzer argues for “first-principle purple teaming,” a methodology that converts red-team and pentest findings into actionable business risk and mission impact. He stresses translating technical detections (e.g., Active Directory exploits, MITRE mappings) into language executives and auditors understand, and...

The talk explains how modern attackers achieve long-term cloud persistence without malware by abusing legitimate cloud-native features—OAuth app consent, stolen or replayed tokens, mismanaged service principal credentials, long-lived API keys, mailbox rules and automated connectors. These malicious activities blend into...

The European Parliament has ordered the disabling of built‑in artificial‑intelligence functions on corporate tablets and other work devices used by members and staff, citing unresolved privacy and cybersecurity risks. An internal email obtained by Politico explains that many AI features...

In Episode 261 of Transformation Ground Control, hosts Eric Kimberling and Darian Fiacusky discuss practical guidance for digital transformations, urging annual roadmap reviews and the need to pivot mid-implementation when business realities change. They advocate measured, pilot-based adoption of AI...

The presentation at Black Hat USA 2025 detailed how attackers can move laterally from a fully compromised on‑premises Active Directory into Microsoft Entra ID in hybrid environments. Speaker Dian of Outsider Security explained that once domain‑admin rights are obtained on‑prem,...

The discussion centers on how Fortune 100 enterprises are actually implementing knowledge graphs, contrasting idealized, organization‑wide visions with the pragmatic routes companies are taking today. Two adoption patterns emerge. Large firms often build an “enterprise knowledge graph” that mirrors portions of their...

Loomis Pay used its NRF 2025 stage to unveil a unified payments solution that combines cash, card and digital transactions into a single, end‑to‑end package. The fintech arm of the Loomis group, celebrating its fifth anniversary, highlighted its presence in...

The video outlines Microsoft Azure’s layered sovereignty options for keeping AI, compute and data within required jurisdictions. At the base level customers can use Azure regions to confine workloads geographically. Azure Local extends Azure’s cloud control plane into on‑premises or...

KPMG and Google Cloud detailed a deepening partnership focused on enterprise AI, multimodal capabilities and practical agent deployments. They highlighted collaborative projects ranging from the immersive Wizard of Oz Sphere production and computer-vision work with the U.S. ski team to...

Sam Barlien, community organizer for the Platform Engineering community, reveals that most failing platform initiatives stem from a lack of product thinking, not technology gaps. He argues that treating internal platforms as products—complete with user research, documentation, and a dedicated...

Hosts debated a top-10 enterprise software ranking and focused on which ERP is most AI-driven, naming Oracle Cloud ERP (Fusion) as runner-up and SAP S/4HANA as the winner. SAP’s lead was attributed to a broad, embedded AI fabric across finance,...

Now Secure CEO Alan Snyder told Techstrong TV that mobile is now ubiquitous and the primary interface for customers and employees, driving revenue and growing share of digital interactions each year. He says AI has made app development dramatically easier—he...

In a roundup of leading ERP platforms, Microsoft Dynamics 365 was named best for Microsoft‑centric organizations, praised for seamless integration with Azure, Power Platform, Teams and Office; NetSuite finished as runner‑up. For upper small and lower mid‑market companies, Epicor won...

The Heavy Networking podcast episode introduces Cisco Crosswork Workflow Manager (CWM), a sponsored discussion that positions the product as an execution engine for designing, running, and automating network workflows—from VLAN provisioning to large‑scale device upgrades. Hosts Ethan Banks and Drew Conrey...

The video spotlights a SmartStream deployment at a large European bank, focusing on how the platform streamlines the notoriously time‑consuming reconciliation process. Roque Martinez explains that the bank sought to shrink the duration of reconciliations and improve overall workflow efficiency. SmartStream...

The CIO Talk Network episode spotlights Tim Woods, VP of Technology Alliances at FireMon, discussing how continuous visibility can turn cloud security from an “oxymoron” into a manageable discipline. Woods argues that native cloud controls are insufficient without ongoing, real‑time monitoring....

The video explains how platform engineering can alleviate the hidden but costly cognitive load that developers bear in large, regulated enterprises. Ainas Sabat traces the evolution from early DevOps, where developers owned the entire lifecycle, through role‑based scaling with dedicated...

The video argues that a well‑engineered revenue system, not merely a high‑level strategy, is the engine of growth. It distinguishes between revenue strategy – the intent and goals set by leadership – and the revenue system – the operational plumbing...

The briefing introduced Lexoft’s latest T3 platform, highlighting how the company blends two decades of legal‑tech expertise with generative AI to modernize knowledge management for Spanish‑speaking law firms and corporate legal departments. Lexoft’s solution centers on creating “extended knowledge profiles” that...

The video walks through Databricks’ Intelligent Document Processing (IDP) solution, demonstrating how to build an end‑to‑end pipeline that extracts key financial data from PDF invoices. Using a fictitious company, Green Sheen, the presenter shows how raw PDF files are uploaded...

Episode 260 of Transformation Ground Control examines major shifts in enterprise tech and transformation risk, opening with reports that Oracle may cut up to 30,000 jobs and discussing market unease over Microsoft’s aggressive AI push and Copilot integrations. Hosts stress...

Industry judges named NetSuite the best ERP for small and mid-sized businesses, with Acumatica as runner-up, citing NetSuite’s broad out-of-the-box functionality, extensive third-party ecosystem and Oracle’s investments in global capabilities and maintainability via SuiteCloud. For large, complex enterprises SAP S/4HANA...

At the Software Architecture Superstream, leading architects discussed how AI is reshaping enterprise architecture. They highlighted the shift toward AI‑ready, code‑first designs that support continuous innovation while maintaining governance, security, and observability. Speakers covered architecture as code, agentic value streams,...

The Network Automation Nerds podcast episode features host Eric Cho and senior engagement manager Matt Rimkkey of Network to Code, discussing real‑world network automation projects and the bridge between technical execution and business objectives. Rimkkey explains his role as a “project...

The episode of Simply Cyber’s Daily Cyber Threat Brief, hosted by Dr. Gerald Ogier, delivers the day’s top eight cybersecurity headlines while fostering a lively community of professionals. After a brief welcome and sponsor shout‑outs, the show pivots to the...

The episode of Supply Chain Now spotlights the chronic warehouse execution gaps that cripple small‑ and medium‑sized businesses. Host Scott Lewton interviews Kurt Huesner, CEO of Endpoint Automation Solutions, to explore why warehouse automation matters for the SMB market and...

The podcast features Clay’s co‑founder outlining how the platform unifies inbound, outbound, and AI‑driven sales workflows to turn raw prospect data into qualified leads and personalized outreach. By aggregating global data providers, applying large language models, and exposing unique signals—such...