Black Hat
Black Hat is the most technical and relevant information security event series in the world. For more than 25 years, Black Hat Briefings have provided attendees with the very latest in information security research, development, and trends in a strictly vendor-neutral environment. These high-profile global events and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors.
From its inception in 1997, Black Hat has grown from a single annual conference in Las Vegas to the most respected information security event series internationally. Today, Black Hat Briefings and Trainings are held annually in the United States, Europe and Asia, providing a premier venue for elite security researchers and trainers to find their audience.

WorstFit: Unveiling Hidden Transformers in Windows ANSI!

WiFi Calling: Revealing Downgrade Attacks and Not-so-private private Keys

The CVSS Deception: How We've Been Misled on Vulnerability Severity

The Bugs in Your Bootloaders: Embedded Device Secure Boot Fails and How to Fix Them

The Double (AI) Agent: Flipping a GenAI Agent Behavior

Unmasking State-Sponsored Mobile Surveillance Malware from Russia, China, and North Korea

UNC1860 and The Temple of Oats - Iran's hidden hand in Middle Eastern Networks

When (Remote) Shells Fall Into The Same Hole: Rooting DrayTek Routers Before Attackers Can

Vulnerabilities in the eSIM download protocol

The Black Hat Europe Network Operations Center (NOC) Report

Security analysis of Residential Gateways and ISPs: global network domination is (sneakily) possible

Redefining the Origin of Secrecy in a Post-Quantum World

Reasonable Regs vs Red Tape: How Should Governments Tackle the Cyber Intrusion Market

Parse Me, Baby, One More Time: Bypassing HTML Sanitizer via Parsing Differentials

Over the Air: Compromise of Modern Volkswagen Group Vehicles

Operation MIDAS - Tracking Fraudulent Financial Program Organizations

Mind the Data Gap: Privacy Challenges in Autonomous AI Agents

Main Stage: Understanding and Reducing Supply Chain and Software Vulnerability Risks

Locknote: Conclusions and Key Takeaways from Black Hat Europe 2024

LLMbotomy: Shutting the Trojan Backdoors

Keynote: Frédérick Douzet

Keynote: Fighting Cybercrime in 2024

Is Your Memory Protected? Uncovering Hidden Vulnerabilities in Automotive MPU Mechanisms

Is JavaScript Trustworthy in Cloud Computing?

15 Ways to Break Your Copilot

Black Hat Asia 2025 Highlight Reel

Infusing AI in Cybersecurity: The Times They Are AI-Changin'

Improving Side-Channel Protections for Intel TDX

How the Internet Dodged a Bullet: The KeyTrap Denial-of-Service Attacks against DNSSEC

BH USA 2025 Trainings & Briefings 15 sec Sizzle Reel - Horizontal