Skip to Main Content

Black Hat

Latest Stories

The EV Charger Hack That Can Burn Down Your House Just Got More Terrifying

Trend Micro researchers found a hack to remotely disable overheating protection in most home EV chargers. The results, which we got to see at Black Hat, were explosive.

By Neil J. Rubenking
EV Charger Autoignition Montage

Inside Black Hat's Network Security Operation: Humans Are Still a Problem

The team running the security conference's Network Operations Center saw much more encrypted traffic but also vibe-coded apps leaking data and people panic-updating their software.

By Rob Pegoraro
A series of screens showing data on the state of Black Hat's network

ACLU Expert: Please Don't Make Bulk Snooping by Governments Easier

At Black Hat, Jennifer Granick warns against maintaining 'enticing repositories of information.'

By Rob Pegoraro
Art depicting a futuristic server room, with visual representations of people's data floating in mid-air

Cyber Apocalypse Now: Black Hat 2025’s Most Terrifying Hacks and Security Breaches

From AI hijacks to Russian ad scams, this year's Black Hat conference in Las Vegas revealed a cybersecurity battlefield that's smarter, scarier, and more sophisticated than ever. These are the moments that made the biggest impact.

By Kim Key & Neil J. Rubenking
the black hat logo against a red background

A Rogue Calendar Invite Could Turn Google's Gemini Against You

More and more, we’re embracing AI agents to filter emails, respond to texts, even control our appliances. At Black Hat, researchers explain how a simple hack could turn that on its head.

By Neil J. Rubenking
A Calendar Invitation Could Subvert Gemini

Sexism, Imposter Syndrome, and Success: Women in Cybersecurity Are Done Staying Quiet

Four female cybersecurity professionals at Black Hat opened up about the challenges and triumphs of their careers—from confronting workplace sexism to resisting the pressure to constantly prove themselves. They also shared valuable advice for other women navigating the industry.

By Kim Key
Left to right: Natalie Silvanovich, Valentina Palmiotti, Vandana Verma, Kymberlee Price, Ashley Shen

Caught on Camera: How AI Is Exposing Cybercriminal Attacks Using Their Own Screenshots

Hackers use malware to steal data and take screenshots to sell it. At Black Hat, experts showed how AI can study those screenshots to spot and stop new malware early.

By Neil J. Rubenking
AI Catches Info Stealers Using Crime Scene Selfies

Hackers Can Take Over Your Security Cameras—and It’s Easier Than You Think

Government agencies, schools, and hospitals install security cameras to protect their clients and their own integrity. But as one research team discovered at the Black Hat security conference this year, those cameras can pose a security risk.

By Neil J. Rubenking
Who Is Looking Through Your Security Camera?

This AI Skeptic Thinks AI Is Bringing Human Brains Down to Its Level

In a Black Hat panel, scientist and author Gary Marcus calls large language models 'insanely insecure' and bashes the business models behind them.

By Rob Pegoraro
Artwork showing a representation of a human brain on a computer chip

This ChatGPT Flaw Could Have Let Hackers Steal Your Google Drive Data

OpenAI fixed the exploit, but it used a malicious prompt hidden in a Google Drive file to trawl through their personal information, looking for details to share with a hacker.

By James Peckham
The ChatGPT logo on a smartphone

Is That a Legit Zoom Call or Are You Getting Hacked?

Hackers could bypass network security by exploiting popular video-chat platforms. At Black Hat, a security expert says Zoom and Teams are most vulnerable; only one has released a patch.

By Neil J. Rubenking
Is It a Zoom Call or Are You Getting Hacked?

The Global Scareware Scam You’ve Probably Clicked: Inside VexTrio’s Global Ad Fraud

Have you seen any pop-up ads lately? At Black Hat 2025, security researchers exposed how a shadowy group uses fake alerts and other scams to exploit online ad systems and target unsuspecting users.

By Kim Key
Various criminal icons against a red background

Black Hat 2025 Forecast: AI Mayhem, EV Intrusions, and Hacker Innovations

Hackers and security researchers will make the annual pilgrimage to the Black Hat security conference in Las Vegas next week. Here's a preview of some of the most insightful—and unsettling—sessions we’re planning to attend.

By Kim Key & Neil J. Rubenking
What We Expect at Black Hat 2025

The Scariest Hacks, Bugs, and Scams We Saw at Black Hat 2024

AI, terrifying vulnerabilities, and privacy worries abound at the annual cybersecurity conference.

By Kim Key & Neil J. Rubenking
Black Hat audience awaits the first day's keynote

The Only Real Problem With Black Hat's Wi-Fi Was the People Using It

Network admins at the conference recount some seriously poor choices by Black Hat attendees.

By Rob Pegoraro
A slide from Wyler and Stump's presentation showing the variety of network gear (from Palo Alto Networks, NetWitness, Cisco, Arista Networks, and Corelight) in use at Black Hat's network operations center.,

Friend or Foe? Researchers Put AI Models to the Test in Cyber-Warfare Scenarios

We all know AI isn't perfect. Is it safe to involve large language models when the stakes are this high? At Black Hat, a team from MITRE explains how they're stress-testing today's top LLMs.

By Neil J. Rubenking
ChatGPT Goes to War

Meet the Criminals Behind Southeast Asia's Lucrative Online Gambling Websites

At Black Hat, researchers reveal a network of scammers who force people to work for sketchy gambling sites and evade detection through a sophisticated tech suite.

By Kim Key
Gambling imagery on a red background

Signal Developer Explains Why Early Encrypted Messaging Tools Flopped

'The intuition was to take the complexity and push it onto the user,' Moxie Marlinspike says at Black Hat. 'We were just wrong.'

By Rob Pegoraro
Signal developer Moxie Marlinspike speaking at Black Hat 2024

70% AI? Adobe Talks Verifying Content in the Age of Deepfakes

At Black Hat, Adobe outlines how to quickly identify altered media with tools that function like nutrition labels for digital content.

By Kim Key
A nutrition label on a beige background

Just the Hacks: How Journalists Work With Hackers to Break News

Hackers reach out to reporters to let them know about their latest conquests, but it's a delicate balance between informing the public and giving bad actors a platform.

By Kim Key
Two people looking concerned near a computer