Editor's note
Black Hat USA 2025 returned for its 28th year, covering the latest in infosec for technical experts, thought leaders, innovative vendors and cybersecurity pros.
The two-day main event took place August 6-7 at Mandalay Bay in Las Vegas and featured more than 100 sessions on a plethora of topics: large language model (LLM) and agentic AI security and exploits, pwning AI providers, IoT security, autonomous vehicle resilience and smart automation, identity and access management, user phishing training, passwordless, and network security. Topics like fraudulent North Korean IT workers, red teaming and lateral movement attacks were also on the agenda.
Four days of specialized trainings, August 2-5, covered the latest in hacking techniques, AI security and safety, threat detection and incident response, and more. This year marked the inaugural Financial Services Summit, as well as the second annual AI Summit and Innovators & Investors Summit. It also included the 11th annual CISO Summit and fifth annual Omdia Analyst Summit.
Informa TechTarget's editorial team was on-site to report from the conference, keeping readers updated on the latest news.
1News from the conference floor
Black Hat presenters divulged the latest attacks and sounded warning bells on what could be coming next.
- 
							
								Article
							How an AI-based 'pen tester' became a top bug hunter on HackerOneAI researcher explains how an automated penetration-testing tool became the first non-human member on HackerOne to reach the top of the platform's US leaderboard. Read Now 
- 
							
								Article
							Black Hat NOC expands AI implementation across security operationsCorelight's James Pope gives Dark Reading an inside look at this year's Black Hat Network Operations Center, detailing security challenges and rising trends -- many related to increased AI use. Read Now 
- 
							
								Article
							Cyber experts ponder a non-government future for the CVE programOrganizations supporting the security vulnerability program said it needed changes to improve stability and rebuild trust. Read Now 
- 
							
								Article
							Research shows AI agents are highly vulnerable to hijacking attacksExperts from Zenity Labs demonstrated how attackers could exploit widely deployed AI technologies for data theft and manipulation. Read Now 
- 
							
								Article
							Prime Security wins Black Hat's Startup Spotlight CompetitionSecurity startups of all stripes submitted applications for Black Hat USA's Startup Spotlight. Prime Security won with its AI security architect platform. Read Now 
- 
							
								Article
							Researcher deploys fuzzer to test autonomous vehicle safetyAs autonomous vehicles continue to evolve, new research highlights the importance of rigorous security testing to protect against both intentional attacks and unintentional unsafe commands in teleoperation systems. Read Now 
- 
							
								Article
							Citizen Lab founder flags rise of U.S. authoritarianismCitizen Lab director and founder Ron Deibert explained how civil society is locked in 'vicious cycle,' and human rights are being abused as a result, covering Israeli spyware, the Khashoggi killing, and an erosion of democratic norms in the U.S. Read Now 
- 
							
								Article
							Black Hat USA: Startup breaks secrets management toolsResearchers at Cyata, an agentic identity specialist that has just emerged from stealth, found 14 CVEs in the widely used CyberArk Conjur and HashiCorp Vault enterprise secrets management platforms Read Now 
- 
							
								Article
							VexTrio cybercrime outfit run by legit ad tech firmsNew research reveals that a malicious traffic distribution system (TDS) is run not by 'hackers in hoodies,' but by a series of corporations operating in the commercial digital advertising industry. Read Now 
- 
							
								Article
							To raise or not to raise: Bootstrapped founders share their viewsA trio of startup founders -- GreyNoise's Andrew Morris, Thinkst Canary's Haroon Meer, and runZero's HD Moore -- agree that raising venture capital funding can be beneficial, but a company's success depends on how well the product fits customer needs. Read Now 
- 
							
								Article
							Black Hat USA: Halcyon and Sophos tag-team ransomware fightbackRansomware experts Halcyon and Sophos are to pool their expertise in ransomware, working together to enhance data- and intelligence-sharing and bringing more comprehensive protection to customers Read Now 
2Vulnerabilities in the spotlight
Researchers and hackers showcased new proofs of concept, attack techniques and bugs, as well as security best practices and mitigation techniques to combat them.
- 
							
								Article
							Researchers warn of 'hidden risks' in passwordless account recoveryPasswordless authentication is becoming more common, but account recovery poses increased risks that can lead to account takeovers. It's especially dangerous because even low-skilled attackers can achieve success. Read Now 
- 
							
								Article
							Privilege escalation issue in Amazon ECS leads to IAM hijackingA software developer discovered a way to abuse an undocumented protocol in Amazon's Elastic Container Service to escalate privileges, cross boundaries, and gain access to other cloud resources. Read Now 
- 
							
								Article
							Google Gemini AI bot hijacks smart homes, turns off the lightsUsing invisible prompts, the attacks demonstrate a physical risk that could soon become reality as the world increasingly becomes more interconnected with artificial intelligence. Read Now 
- 
							
								Article
							Critical zero-day bugs crack open CyberArk, HashiCorp password vaultsSecrets managers hold all the keys to an enterprise's kingdom. Two popular ones had longstanding, critical, unauthenticated RCE vulnerabilities. Read Now 
- 
							
								Article
							'ReVault' security flaws impact millions of Dell laptopsThe now-patched vulnerabilities exist at the firmware level and enable deep persistence on compromised systems. Read Now 
- 
							
								Article
							Agentic AI a target-rich zone for cyber attackers in 2025At Black Hat USA 2025, CrowdStrike warns that cyber criminals and nation-states are weaponising GenAI to scale attacks and target AI agents, turning autonomous systems against their makers Read Now 
3Government happenings at Black Hat USA
The U.S. government and agencies, including CISA and NSA, shared insights into their latest cybersecurity initiatives and trends.
- 
							
								Article
							Trump administration cyber cuts eroding private sector’s trust, confidenceA report by Swimlane shows companies are reducing cybersecurity spending and security teams are experiencing increasing pressure. Read Now 
- 
							
								Article
							CISA officials say agency is moving ahead despite workforce purgeTwo senior officials defended the agency’s progress amid concerns about the effects of mass layoffs and budget cuts. Read Now 
- 
							
								Article
							CISA's relationship with industry needs work to reestablish trust, experts sayCritics say budget cuts, job losses have hurt the agency's ability to coordinate with private industry. Read Now 
- 
							
								Article
							NSA partnering with cyber firms to support under-resourced defense contractorsThe spy agency has sought out creative ways to help protect small companies supplying the U.S. military. Read Now 
- 
							
								Article
							U.S. still prioritizing zero-trust migration to limit hacks' damageThe zero-trust initiative, which gained steam during the Biden administration, is still underway. Read Now 
4Videos from the show
The Black Hat USA 2025 News Desk had many visitors, covering topics from agentic AI to outer space.
- 
							
								Article
							How outer space became the next big attack surfaceVisionSpace Technologies' Andrzej Olchawa and Milenko Starcik discussed a set of vulnerabilities capable of ending space missions at the Black Hat USA 2025 News Desk. Read Now 
- 
							
								Article
							AI agents access everything, fall to zero-click exploitZenity CTO Michael Bargury joins the Black Hat USA 2025 News Desk to discuss research on a dangerous exploit, how generative AI technology has "grown arms and legs" -- and what that means for cyber-risk. Read Now 
- 
							
								Article
							Agentic AI, Apple Intelligence, EV chargers: Everyday cybersecurity peril aboundsCybersecurity risks can come from everywhere, as these riveting Dark Reading News Desk videos detail. Check out Part 1 of our broadcast coverage of the top research presented at Black Hat USA 2025. Read Now 
- 
							
								Article
							System shocks? EV smart charging tech poses cyber-risksTrend Micro's Salvatore Gariuolo talks with the Black Hat USA 2025 News Desk about how the new ISO 15118 standard for electric vehicle smart charging and vehicle-to-grid communications can be weaponized by threat actors. Read Now 
- 
							
								Article
							Why video game anti-cheat systems are a cybersecurity goldmineSam Collins and Marius Muench of the University of Birmingham, UK, join the Black Hat USA 2025 News Desk to explain how anti-cheat systems in video games provide valuable lessons on defending against threat actors' techniques and strategies. Read Now 
- 
							
								Article
							How architectural controls can help fill the AI security gapNCC Group's David Brauchler III shares how foundational controls and threat modeling strategies can help secure agentic AI tools in ways traditional guardrails can't. Read Now 
- 
							
								Article
							Tree of AST: A bug-hunting framework powered by LLMsTeenaged security researchers Sasha Zyuzin and Ruikai Peng discuss how their new vulnerability discovery framework leverages LLMs to address limitations of the past. Read Now 
5DEF CON
Black Hat USA was followed by DEF CON 33, the three-day hacking conference also held in Las Vegas.
- 
							
								Article
							How to vibe code with security in mindAs more organizations integrate vibe coding and AI-assisted coding into their application development processes, it's important to remember to put security first. Read Now 
- 
							
								Article
							REvil actor accuses Russia of planning 2021 Kaseya attackREvil affiliate Yaroslav Vasinskyi, who was convicted last year for his role in the 2021 Kaseya ransomware supply chain attack, said the Russian government was instrumental to the attack's execution. Read Now 
- 
							
								Article
							Utilities, factories at risk From encryption holes in industrial protocolThe OPC UA communication protocol is widely used in industrial settings, but despite its complex cryptography, the open source protocol appears to be vulnerable in a number of different ways. Read Now 
6Black Hat USA 2025 pre-conference coverage
Black Hat 2025 will look at a variety of topics. Check out our pre-show coverage here.
- 
							
								Article
							Dark Reading News Desk turns 10, back at Black Hat USA for 2025Dark Reading's 2025 News Desk marks a decade of Black Hat USA memories. We're making our return with a slate of interviews that help you stay up on the latest research from Black Hat — no trip to Las Vegas required. Read Now 
- 
							
								Article
							Stop AI bot traffic: Protecting your organization's websiteAs crawlers and bots bog down websites in the era of AI, some researchers say that the solution for the Internet's most vulnerable websites is already here. Read Now 
- 
							
								Article
							Black Hat 2025: Navigating AI and supply chain securityExperts at the conference will discuss how AI impacts software supply chain security, highlighting challenges and strategies for developers and security teams. Read Now 
- 
							
								Article
							New 'Shade BIOS' technique beats every kind of securityWhat if malware didn't require an operating system to function? How would anyone possibly notice, let alone disable it? Read Now 
- 
							
								Article
							Low-code tools in Microsoft Azure allowed unprivileged accessUsing the API Connections for Azure Logic Apps, a security researcher found unauthenticated users could access sensitive data of other customers. Read Now 
- 
							
								Article
							Human digital twins could give attackers a dangerous advantageWhile this emerging impersonation technology offers many benefits, digital twins also have several drawbacks, including use in social engineering attacks. Read Now 
- 
							
								Article
							Malicious implants are coming to AI components, applicationsA red teamer is publishing research next month about how weaknesses in modern security products lay the groundwork for stealthy implants in AI-powered applications. Read Now 
- 
							
								Article
							Women who 'hacked the status quo' aim to inspire cybersecurity careersA group of female cybersecurity pioneers will share what they've learned about navigating a field dominated by men, in order to help other women empower themselves and pursue successful cybersecurity careers. Read Now 
- 
							
								Article
							An Nvidia container bug and chance to harden KubernetesA container escape flaw involving the NVIDIA Container Toolkit could have enabled a threat actor to access AI datasets across tenants. Read Now 
- 
							
								Article
							New AI malware PoC reliably evades Microsoft DefenderWorried about hackers employing LLMs to write powerful malware? Using targeted reinforcement learning (RL) to train open source models in specific tasks has yielded the capability to do just that. Read Now 
- 
							
								Article
							Ransomware reshaped how cyber insurers perform security assessmentsCyber-insurance companies were forced to adapt once ransomware skyrocketed and highlighted crucial security weaknesses among organizations in all sectors. Read Now 
- 
							
								Article
							We've all been wrong: Phishing training doesn't workTeaching employees to detect malicious emails isn't really having an impact. What other options do organizations have? Read Now 
- 
							
								Article
							Rethinking cyber-risk as traditional models fall shortSystemic cyber-risk models are not accounting for rapidly evolving threats -- and a time when organizations are more interconnected than ever. Read Now 
- 
							
								Article
							Hackers make hay? Smart tractors vulnerable to full takeoverHackers can spy on tens of thousands of connected tractors in the latest IoT threat, and brick them too, thanks to poor security in an aftermarket steering system. Read Now 
7Black Hat 2024 recap
Last year's Black Hat USA conference covered a range of essential topics. Here is an array of highlights to get you up to speed and prepare for this year's event.
- 
							
								Podcast
							Risk & Repeat: Recapping Black Hat USA 2024Highlights from Black Hat USA 2024 include a keynote panel on securing election infrastructure as well as several sessions on potential threats against new AI technology. Listen Now 
- 
							
								Article
							Black Hat USA 2024 HighlightsCheck out all the highlights from Black Hat USA 2024 at the Mandalay Bay in Las Vegas. Read Now 
- 
							
								Article
							Black Hat USA 2024 takeaways for data security and IAMBlack Hat USA 2024 showcased recurring themes of data security and IAM, encompassing the platform vs. point product debate, cleaning identity data and GenAI security. Read Now 
- 
							
								Article
							Cyber-risk management: Key takeaways from Black Hat 2024Product updates announced at Black Hat USA 2024 can help security teams better manage constantly changing attack surfaces and ensure new AI projects won't pose security risks. Read Now 
- 
							
								Article
							CrowdStrike, AI dominate conversation at Black Hat USA 2024Although the trend of vendors pitching AI-powered products nonstop has continued at Black Hat USA 2024, CrowdStrike and the recent IT outage was an even larger point of discussion. Read Now 
