Black Hat 2025: Latest news and insights

Tags:

Black Hat USA
August 2-7, 2025
Las Vegas, NV

Black Hat USA 2025 returns to the Mandalay Bay Convention Center in Las Vegas on August 2-7. The annual event is a perennial magnet for cybersecurity professionals, researchers, vendors and others

The week kicks off on August 2 with four days of cybersecurity training courses. The courses cover a range of topics from reverse engineering malware to penetration testing. The main conference runs August 6 amd 7 amd featires presentations by security researchers and industry experts who offer insight into the latest vulnerabilities, hacks, and defense strategies.

Expect Black Hat USA 2025 to focus on the dual nature of AI as both a powerful tool for cyberdefense and a new weapon for threat actors.

Latest Black Hat news, insights, and analysis

5 key takeaways from Black Hat USA 2025

Aug. 12, 2025: The industry’s biggest annual get together offers CISOs insights into security researcher’s latest findings. From cloud security to AI vulnerabilities, here are the most noteworthy security issues from ‘hacker summer camp.’

Researchers demonstrate zero-click prompt injection attacks in popular AI agents

Aug. 8, 2025: Researchers from Zenity have found multiple ways to inject rogue prompts into agents from mainstream vendors to extract sensitive data from linked knowledge sources.

Black Hat 2025 Recap: A look at new offerings announced at the show

Aug. 7, 2025: AI dominated the conversation at Black Hat 2025, from the rise of autonomous agents and shadow AI to surging identity-based attacks and hardware-level exploits, and product announcements reflected that trend.

Beef up AI security with zero trust principles

Aug. 7, 2025: Many CSOs worry about their firm’s AI agents spitting out advice to users on how to build a bomb, or citing non-existent legal decisions. But those are the least of their worries, said a security expert at this week’s Black Hat security conference in Las Vegas. Systems using large language models (LLMs) that connect to enterprise data contain other vulnerabilities that will be leveraged in dangerous ways unless developers and infosec leaders tighten security.

Researchers uncover RCE attack chains in popular enterprise credential vaults

Aug. 6, 2025: Researchers have found 14 logic flaws in various components of HashiCorp Vault and CyberArk Conjur, two open-source credential management systems, allowing attacks that could bypass authentication checks, access secrets, impersonate identities and execute arbitrary code.

ReVault flaws let attackers bypass Windows login or place malware implants on Dell laptops

Aug. 6, 2025: Vulnerabilities in the ControlVault3 (CV) firmware in Dell laptops, discovered by security researchers from Cisco Talos, allow attackers with physical access to bypass Windows login on vulnerable laptops or let a local user gain admin privileges. The most serious of the five vulnerabilities affects the Windows API associated with ControlVault3 and creates a means for attackers to install persistent malware capable of surviving even an operating system reinstallation.

HPE unveils AI-powered network security and data protection technology

Aug. 5, 2025: HPE has unveiled a secure access service edge (SASE) copilot to help networking teams make faster, better decisions using artificial intelligence as well as a new integration hub that lets third-party applications access HPE Zerto data to streamline operations.

2024 Black Hat news

Black Hat Europe 2024: Key takeaways for cybersecurity pros

Dec. 16, 2024: Technical talks and policy discussions took centre stage, including ERP in the crosshairs, problems with CVSS, and AI’s impact on cybercops.

SAP systems increasingly targeted by cyber attackers

Dec. 13, 2024: Long viewed as an opaque black box, attackers are increasingly focused upon hacking into enterprise systems from SAP, according to research presented at Black Hat Europe 2024.

Security researchers find deep flaws in CVSS vulnerability scoring system

Dec. 12, 2024: Cybersecurity experts from financial giant JPMorganChase say the cybersecurity community is being misled about the severity of vulnerabilities by the CVSS, which threatens to seriously hinder remediation efforts.

Microsoft Windows ‘Best Fit’ character conversion ‘ripe for exploitation’

Dec. 12, 2024: Security researchers warn that the Windows ANSI API contains a hidden trap that could lead to arbitrary code execution — a new attack surface dubbed ‘WorstFit.’

KeyTrap DNSSEC: The day the internet (almost) stood still

Dec. 12, 2024: Black Hat conference attendees heard a post-mortem on the KeyTrap DNSSEC vulnerability, which could have widely impacted browsing, email, TLS, and other key web services.

Black Hat Europe preview: Cryptographic protocol attacks and AI in the spotlight

Dec. 10, 2024: This week in London Black Hat Europe will feature a diverse range of talks and presentations covering the latest developments in cybersecurity. Here are the most notable keynotes and sessions for cybersecurity leaders and professionals.

AMD CPUs impacted by 18-year-old SMM flaw that enables firmware implants

Aug. 9, 2024: Security reseachers estimate the ‘Sinkclose’ vulnerability affects ‘hundreds of millions of laptops, desktops, and servers,’ allowing attackers to execute malicious code on the most privileged execution mode on a computer. They will present their findings at this year’s DEF CON.

5 key takeaways from Black Hat USA 2024

Aug. 9, 2024: The industry’s biggest annual get together offers CISOs a chance to chart industry trends. From cloud security to AI, here’s what’s notable about this year’s ‘hacker summer camp.’

S3 shadow buckets leave AWS accounts open to compromise

Aug. 8, 2024: Attackers can gain access to AWS accounts or sensitive data by creating in advance S3 storage buckets with predictable names that will be automatically used by various services and tools.

Back to the future: Windows Update is now a trojan horse for hackers

Aug. 8, 2024: SafeBreach security researcher Alon Leviev has unveiled at Black Hat a technique that lets malicious actors manipulate the Windows Update process to downgrade critical system components, rendering security patches useless.

Top new cybersecurity products at Black Hat USA 2024

Aug. 8, 2024: Find out the top cybersecurity tools, platforms, features, services, and technologies unveiled at Black Hat USA 2024 that you need to know about, with our rolling coverage of conference announcements.

Generative AI takes center stage at Black Hat USA 2024

Aug. 8, 2024: Top gen AI-driven cybersecurity tools, platforms, features, services, and technologies unveiled at Black Hat 2024 that you need to know about. Read about them here.

APT groups increasingly attacking cloud services to gain command and control

Aug. 7, 2024: Nation-state threat groups are piling on attack techniques seen as successful in exploiting free cloud services, Symantec reports, with findings to be presented today in a talk at the Black Hat USA security conference.

Black Hat preview: AI and cloud security in the spotlight

Aug. 6, 2024: This year’s Black Hat USA sees LLMs in the crosshairs, rising attacks against hyperscale cloud vendors, and CISOs in need of advice for legal liabilities. Find out more with CSO Online’s conference preview.

North Korean group infiltrated 100-plus companies with imposter IT pros: CrowdStrike report

Aug. 6, 2024: Released at Black Hat, CrowdStrike’s Threat Hunting Report outlines a DPRK group’s attempts to exfiltrate data and install RMM tools by posing as US IT workers, along with several other examples that show cross-domain analysis is needed to tackle rising identity-based attacks.

Categories

No Responses

Leave a Reply

Your email address will not be published. Required fields are marked *