BH Asia 2025 Trainings and Briefings 30 sec Vertical March Regular Registration Rate Deadline
Black Hat
460 views1 month ago
Keynote - Securing Our Cyberspace Together
Black Hat
3.1K views6 months ago
Fireside Chat: Jeff Moss and Ruimin He
Black Hat
872 views6 months ago
LinkDoor: A Hidden Attack Surface in the Android Netlink Kernel Modules
Black Hat
1.8K views6 months ago
Emerging Frontiers: Insights from the Black Hat Asia Review Board
Black Hat
753 views6 months ago
What the TrustZone-M Doesn't See, the MCU Does Grieve Over: Lessons Learned
Black Hat
937 views6 months ago
Black Hat Europe 2023: Why Attend the World's Premier Technical Cybersecurity Conference
Black Hat
19K views1 year ago
Black Hat Europe 2023 Highlights
Black Hat
2K views1 year ago
Black Hat Europe 2023 Highlights
Black Hat
2.2K views1 year ago
A Security RISC? The State of Microarchitectural Attacks on RISC-V
Black Hat
2.9K views1 year ago
REDIScovering HeadCrab - A Technical Analysis of a Novel Malware and the Mind Behind It
Black Hat
1.4K views1 year ago
TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers
Black Hat
973 views1 year ago
Black Hat USA 2023 Highlights
Black Hat
51K views1 year ago
Black Hat USA 2023 Preview Video
Black Hat
29K views1 year ago
Chained to Hit: Discovering New Vectors to Gain Remote and Root Access in SAP Enterprise Software
Black Hat
2.5K views1 year ago
Zero-Touch-Pwn: Abusing Zoom's Zero Touch Provisioning for Remote Attacks on Desk Phones
Black Hat
1.6K views1 year ago
ODDFuzz: Hunting Java Deserialization Gadget Chains via Structure-Aware Directed Greybox Fuzzing
Black Hat
1.2K views1 year ago
Reflections on Trust in the Software Supply Chain
Black Hat
1.3K views1 year ago
Black Hat Asia 2023 Highlights
Black Hat
84K views1 year ago
A New Attack Interface in Java Applications
Black Hat
5.4K views1 year ago
A Run a Day Won't Keep the Hacker Away: Inference Attacks in Fitness Tracking Social Networks
Black Hat
2.2K views1 year ago
Abusing Azure Active Directory: From MFA Bypass to Listing Global Administrators
Black Hat
4.7K views1 year ago
Alice in Kernel Land: Lessons Learned From the eBPF Rabbit Hole
Black Hat
5.2K views1 year ago
Attacking the WebAssembly Compiler of WebKit
Black Hat
1.9K views1 year ago
Ochko123 - How the Feds Caught Russian Mega-Carder Roman Seleznev
626K views7 years ago
Pulling Back the Curtain on Airport Security: Can a Weapon Get Past TSA?
466K views10 years ago
Breaking the x86 Instruction Set
365K views7 years ago
GOD MODE UNLOCKED - Hardware Backdoors in x86 CPUs
311K views6 years ago
Hacking the Wireless World with Software Defined Radio - 2.0
283K views10 years ago
Black Hat Asia 2025 Video
205K views2 months ago
Black Hat Europe 2022, ExCel London
Black Hat
98K views2 years ago
Android Parcels: The Bad, the Good and the Better - Introducing Android's Safer Parcel
Black Hat
12K views2 years ago
Breaking Kerberos' RC4 Cipher and Spoofing Windows PACs
Black Hat
6.6K views2 years ago
Back-connect to the Connected Car. Search for Vulnerabilities in the VW Electric Car.
Black Hat
5.3K views2 years ago
Bridging the Gap Between Research and Practice in Intelligently Bypassing WAF
Black Hat
1.5K views2 years ago
Choo Choo, Network Train - The One to Rule Your Perimeter
Black Hat
1.1K views2 years ago
Leveraging the Apple ESF for Behavioral Detections
Black Hat
15K views2 years ago
Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS
Black Hat
6.5K views2 years ago
Kubernetes Privilege Escalation: Container Escape == Cluster Admin?
Black Hat
12K views2 years ago
Is WebAssembly Really Safe? -- Wasm VM Escape and RCE Vulnerabilities Have Been Found in New Way
Black Hat
3.9K views2 years ago
Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Devices
Black Hat
3.4K views2 years ago
Internal Server Error: Exploiting Inter-Process Communication in SAP's HTTP Server
Black Hat
3.3K views2 years ago
Bypass CFG in Chrome
Black Hat
4.9K views2 years ago
AMSI & Bypass: Review of Known AMSI Bypass Techniques and Introducing a New One
Black Hat
5.7K views2 years ago
Hunting and Exploiting Recursive MMIO Flaws in QEMU KVM
Black Hat
1.5K views2 years ago
The Virtual Battlefield in 2022: Russia Ukraine War & Its Policy Implications
Black Hat
2.1K views2 years ago
Taking Kernel Hardening to the Next Level
Black Hat
2.3K views2 years ago
Start Arbitrary Activity App Components as the System User Vulnerability Affecting Samsung Android
Black Hat
1K views2 years ago
Back in Black Hat: The 7th Annual Black Hat USA NOC Report
Black Hat
16K views3 years ago
Keynote: Hacking the Cybersecurity Puzzle
Black Hat
10K views3 years ago
The Kitten that Charmed Me: The 9 Lives of a Nation State Attacker
Black Hat
6.1K views3 years ago
Can You Hear Me Now? Remote Eavesdropping Vulnerabilities in Mobile Messaging Applications
Black Hat
6.3K views3 years ago
HTTP/2: The Sequel is Always Worse
Black Hat
7.5K views3 years ago
Keynote: Supply Chain Infections and the Future of Contactless Deliveries
Black Hat
3.4K views3 years ago
Keynote: Clocking On
Black Hat
4K views3 years ago
Securing the Public, who is in Charge?
Black Hat
1.8K views3 years ago
Locknote: Conclusions and Key Takeaways from Black Hat Europe 2021
Black Hat
946 views3 years ago
Keynote: Embedding a Human-Centric Approach Into a Global Cyber Security Program
Black Hat
2.1K views3 years ago
Hardware Security Module - Executing Unsigned Code in HSM TEE
Black Hat
1.8K views3 years ago
The Data Distribution Service (DDS) Protocol is Critical: Let's Use it Securely!
Black Hat
3K views3 years ago
Windows Downdate: Downgrade Attacks Using Windows Updates
2K views6 days ago
We R in a Right Pickle With All These Insecure Serialization Formats
1K views6 days ago
How Hackers Changed the Media (and the Media Changed Hackers)
1.4K views13 days ago
Attacking Samsung Galaxy A* Boot Chain, and Beyond
1.7K views13 days ago
Main Stage: Understanding and Reducing Supply Chain and Software Vulnerability Risks
831 views2 weeks ago