The Latest Black Hat Videos
- WorstFit: Unveiling Hidden Transformers in Windows ANSI!by Black Hat on May 19, 2025 at 7:23 pm
- WiFi Calling: Revealing Downgrade Attacks and Not-so-private private Keysby Black Hat on May 19, 2025 at 7:23 pm
- The CVSS Deception: How We’ve Been Misled on Vulnerability Severityby Black Hat on May 19, 2025 at 7:22 pm
- The Bugs in Your Bootloaders: Embedded Device Secure Boot Fails and How to Fix Themby Black Hat on May 19, 2025 at 7:22 pm
- The Double (AI) Agent: Flipping a GenAI Agent Behaviorby Black Hat on May 15, 2025 at 5:00 pm
- Unmasking State-Sponsored Mobile Surveillance Malware from Russia, China, and North Koreaby Black Hat on May 15, 2025 at 5:00 pm
- UNC1860 and The Temple of Oats – Iran’s hidden hand in Middle Eastern Networksby Black Hat on May 15, 2025 at 4:59 pm
- When (Remote) Shells Fall Into The Same Hole: Rooting DrayTek Routers Before Attackers Canby Black Hat on May 14, 2025 at 6:08 pm
- Vulnerabilities in the eSIM download protocolby Black Hat on May 14, 2025 at 6:07 pm
- The Black Hat Europe Network Operations Center (NOC) Reportby Black Hat on May 13, 2025 at 4:58 pm
- Security analysis of Residential Gateways and ISPs: global network domination is (sneakily) possibleby Black Hat on May 13, 2025 at 4:57 pm
- Redefining the Origin of Secrecy in a Post-Quantum Worldby Black Hat on May 13, 2025 at 4:57 pm
- Reasonable Regs vs Red Tape: How Should Governments Tackle the Cyber Intrusion Marketby Black Hat on May 12, 2025 at 5:02 pm
- Parse Me, Baby, One More Time: Bypassing HTML Sanitizer via Parsing Differentialsby Black Hat on May 12, 2025 at 5:02 pm
- Over the Air: Compromise of Modern Volkswagen Group Vehiclesby Black Hat on May 12, 2025 at 5:01 pm
We are an ethical website cyber security team and we perform security assessments to protect our clients.