Quick Overview: What would happen if I simply logged in to this internal Microsoft application with my own Microsoft account? Surely that would not ... Over the past 5 years, we have employed active open-source intelligence (OSINT) techniques to test the question of how our ... Palo Alto Networks' GlobalProtect is a widely adopted remote access solution used by major organisations worldwide — but how ...

Black Hat Usa 2025 Abusing - Detailed Overview & Context

What would happen if I simply logged in to this internal Microsoft application with my own Microsoft account? Surely that would not ... Over the past 5 years, we have employed active open-source intelligence (OSINT) techniques to test the question of how our ... Palo Alto Networks' GlobalProtect is a widely adopted remote access solution used by major organisations worldwide — but how ... Red team operators frequently struggle with establishing interactive command and control (C2) over traditional C2 channels. Control Flow Integrity (CFI) has emerged as the definitive defense against code-reuse attacks, enforcing strict execution flow ... Many security incidents today don't occur due to a lack of alerts—they happen because the right ones are ignored. In this talk, we ...

In our highly rated 2023 talk "Evil Digital Twin", we warned that large language models (LLMs) were exploiting the cognitive ... Hackers Dropping Mid-Heist Selfies: LLM Identifies Information Stealer Infection Vector and Extracts IoCs Information stealer ... Is there a security boundary between Active Directory and Entra ID in a hybrid environment? The answer to this question, while ... Anti-cheat is a gold mine of interesting, novel defenses—battle-hardened from years of attrition in a defender's worst nightmare. For nearly a decade, traffic distribution systems (TDSs) have enabled cybercriminals to hide the true nature of their operations. The flexibility and power of large language models (LLMs) are now well understood, driving their integration into a wide array of ...

The overwhelming majority of AI applications run on NVIDIA hardware and software and use NVIDIA tools to containerize and ... Large language models are increasingly helping to automate vulnerability discovery and exploit development in real-world ... Catastrophic hardware failures. From an aging I/O device to cosmic ray bit flips, memory degradation to CPU fires. When an ... Supply chain compromises like the 2020 SolarWinds breach have shown how devastating and stealthy these attacks can be. Windows Hello is the flagship of Microsoft's passwordless strategy. It is used to authenticate users, not just at login but also in new ... You get what you optimize for. The current trajectory of major AI research labs emphasizes training large language models (LLMs) ...

Photo Gallery

Black Hat USA 2025 | Abusing Entra OAuth for Fun and Access to Internal Microsoft Applications
Black Hat USA 2025 | Use and Abuse of Personal Information -- Politics Edition
Black Hat USA 2025 | Use and Abuse of Palo Alto's Remote Access Solution
Black Hat USA 2025 | Ghost Calls: Abusing Web Conferencing for Covert Command & Control
Black Hat USA 2025 | Breaking Control Flow Integrity by Abusing Modern C++
Black Hat USA 2025 | Death by Noise: Abusing Alert Fatigue to Bypass the SOC (EDR Edition)
Black Hat USA 2025 | The First 30 Months of Psychological Manipulation of Humans by AI
Black Hat USA 2025 | Hackers Dropping Mid-Heist Selfies
Black Hat USA 2025 | Advanced Active Directory to Entra ID Lateral Movement Techniques
Black Hat USA 2025 | Watching the Watchers: Exploring and Testing Defenses of Anti-Cheat Systems
Black Hat USA 2025 | No Hoodies Here: Organized Crime in AdTech
Black Hat USA 2025 | From Prompts to Pwns: Exploiting and Securing AI Agents
Sponsored
Sponsored
View Main Result
Sponsored
Sponsored