Channel Avatar

Black Hat @UCJ6q9Ie29ajGqKApbLqfBOg@youtube.com

249K subscribers - no pronouns :c

Black Hat is the most technical and relevant information sec


40:34
Bridging the Gap: Type Confusion and Boundary Vulnerabilities Between WebAssembly and JavaScript
47:09
The Oversights Under the Flow: Discovering the Vulnerable Tooling Suites From Azure MLOps
37:40
ObfusQate: Where Quantum Magic Meets Code Security – Say Goodbye to Easy Cracking!
30:24
vCenter Lost: How the DCERPC Vulnerabilities Changed the Fate of ESXi
38:39
QuickShell: Sharing is Caring About an RCE Attack Chain on Quick Share
36:35
DriveThru Car Hacking: Fast Food, Faster Data Breach
01:16:41
The Black Hat USA 2025 Startup Spotlight Competition
41:14
How to Get the Most Out of the Python Decompilers Uncompyle6 and Decompyle3
39:45
WorstFit: Unveiling Hidden Transformers in Windows ANSI!
38:15
WiFi Calling: Revealing Downgrade Attacks and Not-so-private private Keys
31:37
The CVSS Deception: How We've Been Misled on Vulnerability Severity
38:12
The Bugs in Your Bootloaders: Embedded Device Secure Boot Fails and How to Fix Them
39:39
The Double (AI) Agent: Flipping a GenAI Agent Behavior
42:46
Unmasking State-Sponsored Mobile Surveillance Malware from Russia, China, and North Korea
27:39
UNC1860 and The Temple of Oats - Iran's hidden hand in Middle Eastern Networks
38:30
When (Remote) Shells Fall Into The Same Hole: Rooting DrayTek Routers Before Attackers Can
31:34
Vulnerabilities in the eSIM download protocol
40:59
The Black Hat Europe Network Operations Center (NOC) Report
37:38
Security analysis of Residential Gateways and ISPs: global network domination is (sneakily) possible
31:20
Redefining the Origin of Secrecy in a Post-Quantum World
40:07
Reasonable Regs vs Red Tape: How Should Governments Tackle the Cyber Intrusion Market
29:43
Parse Me, Baby, One More Time: Bypassing HTML Sanitizer via Parsing Differentials
41:57
Over the Air: Compromise of Modern Volkswagen Group Vehicles
24:38
Operation MIDAS - Tracking Fraudulent Financial Program Organizations
36:35
Mind the Data Gap: Privacy Challenges in Autonomous AI Agents
26:37
Main Stage: Understanding and Reducing Supply Chain and Software Vulnerability Risks
49:06
Locknote: Conclusions and Key Takeaways from Black Hat Europe 2024
38:44
LLMbotomy: Shutting the Trojan Backdoors
40:22
Keynote: Frédérick Douzet
49:15
Keynote: Fighting Cybercrime in 2024
39:49
Is Your Memory Protected? Uncovering Hidden Vulnerabilities in Automotive MPU Mechanisms
28:22
Is JavaScript Trustworthy in Cloud Computing?
39:07
15 Ways to Break Your Copilot
02:29
Black Hat Asia 2025 Highlight Reel
41:56
Infusing AI in Cybersecurity: The Times They Are AI-Changin'
45:23
Improving Side-Channel Protections for Intel TDX
39:08
How the Internet Dodged a Bullet: The KeyTrap Denial-of-Service Attacks against DNSSEC
00:19
BH USA 2025 Trainings & Briefings 15 sec Sizzle Reel - Horizontal
00:31
Black Hat USA 2025 Trainings & Briefings - Early Registration Rate - Horizontal Video
40:22
Enhancing Automatic Vulnerability Discovery for Windows RPC/COM in New Ways
39:54
Guest Revolution: Chaining 3-bugs to compromise the Windows kernel from the VMware guest
37:39
From Pass-the-Hash to Code Execution on Schneider Electric M340 PLCs
36:11
Diving into Spooler: Discovering LPE and RCE Vulnerabilities in Windows Printer Driver
41:29
Defending off the land: Agentless defenses available today
33:16
Decoding EM-FI Attacks: Lessons Learned from Glitching the GigaDevice GD32F407
27:13
CodeCloak: A DRL-Based Method for Mitigating Code Leakage by LLM Code Assistants
39:48
Breaking Matter: Vulnerabilities in the Matter Protocol
31:52
Blast-RADIUS: Breaking RADIUS, the de facto standard protocol for authentication, authorization...
32:40
AML Injection Attacks on Confidential VMs
33:55
Unveiling the Power of Intune: Leveraging Intune for Breaking Into Your Cloud and On-Premise
37:50
The Insecure IoT Cloud Strikes Again: RCE on all Ruijie Cloud-Connected Devices
41:08
The Devil is in the (Micro-) Architectures: Uncovering New Side-Channel and Bit-Flip Attack Surfaces
27:42
SysBumps: Exploiting Speculative Execution in System Calls for Breaking KASLR
39:22
SpAIware & More: Advanced Prompt Injection Exploits in LLM Applications
33:02
My other ClassLoader is your ClassLoader: Creating evil twin instances of a class
32:51
Heartbeat Havoc: Unveiling Remote Vulnerabilities in Windows Network Load Balancing
37:33
Exposing the dark corners of SAP: 4-Years of Threat Intelligence data analyzed
41:07
Apple Disk-O Party
41:18
A Novel Attack Surface: Java Authentication and Authorization Service (JAAS)
34:03
Windows Downdate: Downgrade Attacks Using Windows Updates