Black Hat
222K subscribers
47:58
Locknote: Conclusions and Key Takeaways from Day 2
Black Hat
533 views • 12 days ago
48:02
Locknote: Conclusions and Key Takeaways from Day 1
Black Hat
351 views • 12 days ago
1:05:00
Keynote: My Lessons from the Uber Case
Black Hat
1.9K views • 12 days ago
41:02
Keynote: Industrialising Cyber Defence in an Asymmetric World
Black Hat
960 views • 13 days ago
38:03
The Black Hat Europe Network Operations Center (NOC) Report
Black Hat
840 views • 13 days ago
40:39
My Invisible Adversary: Burnout
Black Hat
2K views • 2 weeks ago
44:30
The Magnetic Pull of Mutable Protection: Worked Examples in Cryptographic Agility
Black Hat
596 views • 2 weeks ago
28:23
A World-View of IP Spoofing in L4 Volumetric DoS Attacks - and a Call to Enable BCP38
Black Hat
824 views • 2 weeks ago
35:58
Collide+Power: The Evolution of Software-based Power Side-Channels Attacks
Black Hat
747 views • 2 weeks ago
26:36
Through the Looking Glass: How Open Source Projects See Vulnerability Disclosure
Black Hat
735 views • 2 weeks ago
31:20
New Techniques for Split-Second DNS Rebinding
Black Hat
1.1K views • 2 weeks ago
40:27
Something Rotten in the State of Data Centers
Black Hat
7.4K views • 2 weeks ago
36:13
When The Front Door Becomes a Backdoor: The Security Paradox of OSDP
Black Hat
663 views • 2 weeks ago
35:22
The Pool Party You Will Never Forget: New Process Injection Techniques Using Windows Thread Pools
Black Hat
1.4K views • 3 weeks ago
29:33
Kidnapping Without Hostages: Virtual Kidnapping and the Dark Road Ahead
Black Hat
988 views • 3 weeks ago
23:13
TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers
Black Hat
616 views • 3 weeks ago
30:14
One Million ASUS Routers Under Control: Exploiting ASUS DDNS to MITM Admin Credentials
Black Hat
1K views • 3 weeks ago
39:50
Off The Record - Weaponizing DHCP DNS Dynamic Updates
Black Hat
1.5K views • 3 weeks ago
34:17
Breaching the Perimeter via Cloud Synchronized Browser Settings
Black Hat
674 views • 3 weeks ago
38:19
Hiding in the Clouds: Abusing Azure DevOps Services to Bypass Microsoft Sentinel Analytic Rules
Black Hat
1.4K views • 3 weeks ago
39:28
Vulnerabilities in Old Third-Party Software Components- Importance of Having SBoM for IoT/OT Devices
Black Hat
1.5K views • 3 weeks ago
28:21
Indirect Prompt Injection Into LLMs Using Images and Sounds
Black Hat
763 views • 3 weeks ago
41:17
VoBERT: Unstable Log Sequence Anomaly Detection: Introducing Vocabulary-Free BERT
Black Hat
730 views • 4 weeks ago
22:13
HODOR: Reducing Attack Surface on Node.js via System Call Limitation
Black Hat
478 views • 4 weeks ago
39:25
How We Taught ChatGPT-4 to Break mbedTLS AES With Side-Channel Attacks
Black Hat
2K views • 1 month ago
43:32
Unmasking APTs: An Automated Approach for Real-World Threat Attribution
Black Hat
1.2K views • 1 month ago
0:19
Black Hat USA 2024 - Short Reel
Black Hat
65K views • 1 month ago
0:42
Black Hat USA 2024
Black Hat
32K views • 1 month ago
41:00
Illegitimate Data Protection Requests - To Delete or to Address?
Black Hat
468 views • 1 month ago
23:27
Breaking Theoretical Limits: The Gap Between Virtual NICs and Physical Network Cards
Black Hat
600 views • 1 month ago
Load More