1、#SECTORCA BlackHatEventsThe Apex Adversary#SECTORCA BlackHatEventsA Bit About MeJeff SimsSenior Staff Data ScientistFrontier product R&D(AI/agents)AI sec research:AI systemsCollaborate with exter。
2、#BHUSA BlackHatEventsBylineHacker Dropping Mid-Heist SelfiesLLM Identifies Information Stealer Infection Vectors and Extracts IoCEstelle Ruellan,Threat Intelligence ResearcherOlivier Bilodeau,Princip。
3、#SECTORCA BlackHatEventsDriveThruDriveThru HackingHackingNow with DeliveryNow with DeliveryTeamTeamAlina TanGeorge ChenChee Peng TanBenjamin Caosecurity architectsecurity assurancesecurity analystBac。
4、#SECTORCA BlackHatEventsThe(Un)Rightful Heir:My dMSA Is Your New Domain Admin#SECTORCA BlackHatEventsThe Great Mystery of MSAsdMSAgMSA#SECTORCA BlackHatEventswhoamiYuval GordonSecurity Researcher at 。
5、#SECTORCA BlackHatEventsSignature of Destruction:Outlook RCE Strikes AgainMichael Gorelik&Arnold Osipov#SECTORCA BlackHatEventsAuthenticated SafeAuthentication creates a false sense of security.P。
6、PRESENTED BY:Resilience to ManipulationPhishing Detection in the Age of AI and DisinformationMICHEL HEBERT,PHDAI Is Changing PhishingWe laughed at old scams.Now AI writes the lure and hides the paylo。
7、#SECTORCA BlackHatEventsIs Your Data Canadian Yet?And Other Existential Cloud Sovereignty Questions#SECTORCA BlackHatEventsQuick IntroductionsJames ArlenKevin FoxJames Arlen is Aiven.ios CISO bringin。
8、QuickShellSharing is caring about an RCE attack Sharing is caring about an RCE attack chain on Quick Sharechain on Quick ShareOr YairSecurity Research Team Lead at SafeBreach8 years in Security Resea。
9、#SECTORCA BlackHatEventsTracing Adversary Steps through Cyber-Physical Attack LifecycleDr.-Eng.Marina KrotofilCyber-Physical Exploitation:#SECTORCA BlackHatEventsIn the Recent NewsHackers opened a fu。
10、#SECTORCA BlackHatEventsPoison in the Wires:Interactive Network Visualization of Data Poisoning AttacksMaria Khodak#SECTORCA BlackHatEventsWhat is data poisoning?Attackers can cause a model to displa。
11、#SECTORCA BlackHatEventsWhy Phish if it Doesnt Work?A No BS Take on Why We Need to Phish#SECTORCA BlackHatEventsDavid ShipleyCEO,Field CISO Beauceron SecurityLed Security Practice at UNBCanadian Forc。
12、O C T O B E R 1,2 0 2 5A NORTH KOREAN CYBER OPERATION:Exposing ARP-based Covert C2s,WebSocket Malware,and Video Conference Software AbuseSecTor 2025WHO ARE WE?A N O R T H K O R E A N C Y B E R O P E 。
13、#SECTORCA BlackHatEventsLeading and WorkingAcross the GenerationsRandy RAccelerating pace of technology changeTwitter/now XReleased 3/21/20069 months to 500 mill usersChatGPTReleased 11/30/20222 mont。
14、#SECTORCA BlackHatEventsGhost SIM attackHacking mobile network authentication policies#SECTORCA BlackHatEventsThe Ghost SIM attack extracts essential SIM card information to take advantage of weak au。
15、#SECTORCA BlackHatEventsForeign Information Manipulation and Interference(Disinformation 2.0)FRANKY SAEGERMAN Based on Learnings from 30 Years at NATO#SECTORCA BlackHatEventsHead Head of Social Media。
16、#SECTORCA BlackHatEventsHow to Scale AppSec Without Scaling Security HeadcountWith Mario Lacroix&Will Yeager#SECTORCA BlackHatEventsSpeaker BiosMario LacroixMario is an Engineer with specializati。
17、Taking a Product from Napkin to SOC2 Certified&TSA TrustedHow a Mobile Drivers License App Became a Boarding PassFall 2025https:/duffy.devWho Am I?2Background in development,architecture,mathemat。
18、#SECTORCA BlackHatEventsEvading in Plain Sight:How Adversaries Beat User-ModeProtection Engines for Over A Decade#SECTORCA BlackHatEventsOmri Misgav Independent Security Researcher Reverse engineerin。
19、#SECTORCA BlackHatEventsFrom Days to Hours:Accelerating Cyber Threat Response with AI AgentsYuval Zacharia#SECTORCA BlackHatEvents$WHOAMI Chess nerd7+years at 8200 Ex-Director of R&D,Security Res。
20、#SECTORCA BlackHatEventsOne Agent to Rule Them One Agent to Rule Them AllAll#SECTORCA BlackHatEvents#SECTORCA BlackHatEvents#SECTORCA BlackHatEvents$WhoAreWeStav CohenSenior AI Security Researcher Ze。
21、Tinker Tailor LLM SpyInvestigate&Respond to Attacks on GenAI Chatbotslinktr.ee/meowardNYCs MyCity chatbot chat.nyc.govChrisJBakke I just bought a 2024 Chevy Tahoe for$1.JFrogSecurity CVE-2024-556。
22、#SECTORCA BlackHatEvents#SECTORCA BlackHatEventsWhat Happens When Your Digital Clone Goes RougeAndrey Markovytch#SECTORCA BlackHatEventsSpeak For Me#SECTORCA BlackHatEventsWindows TAM 9MnSpeak For Me。
23、#SECTORCA BlackHatEventsEDR Bypass Testing#SECTORCA BlackHatEventsWHOAMI#SECTORCA BlackHatEventsMotivation EDR is effective EDR is vulnerable EDR is a target Bypass attempts are a high-fidelity signa。
24、#SECTORCA BlackHatEventsCAN Bus for Car Nerds and Security People Who Should Know BetterFundamentalsGetting on the bus.Reverse EngineeringBringing new data on the busDevice translation and inter-oper。
25、#SECTORCA BlackHatEventsWhat If We Caught SUNBURST in CI/CD?Rewriting the SolarWinds Playbook with AI-Augmented DevSecOpsAleksandr Krasnov#SECTORCA BlackHatEventsWhy?Anatomy of SUNBURST is a mastercl。
26、Zach SchmidtChief Executive OfficerGluck.aiEnterprise FocusChris StoreyPresident and Founder Gluck.aiSMB FocusKellman MeghuPrincipal Security ArchitectDeepCoveCModeratorThe collective responsibilitie。
27、#SECTORCA BlackHatEventsNot-So-Secret Agents:Deploying AI to Optimize Security OperationsJimmy Astle#SECTORCA BlackHatEvents cat/etc/speaker_profileDirector,Machine Learning at Red Canary(a Zscaler c。
28、#SECTORCA BlackHatEventsHyTrack:Tracking You Across Apps and the Web Hydra-StyleMalte Wessels#SECTORCA BlackHatEventsAbout mePhD Student Institute for Application Security/TU BraunschweigInterested i。
29、#SECTORCA BlackHatEventsHow Secure Is Your Base Image?A security test of popular OSS containersJohn Amaral CTO and Co-Founder,Root.IO#SECTORCA BlackHatEventsJohn AmaralFounder,CTO at root#SECTORCA Bl。
30、#SECTORCA BlackHatEventsAgentic Edge AI:Threat Architecture,Attack Surfaces&Real-World RiskNumaan HuqSenior Threat Researcher,Trend Micro#SECTORCA BlackHatEventsWho am I?#SECTORCA BlackHatEventsA。
31、#SECTORCA BlackHatEventsSecure Code Is Critical InfrastructureHacking Policy for Public GoodTanya Janca#SECTORCA BlackHatEventsWhat are we going to talk about today?#SECTORCA BlackHatEventsSheHacksPu。
32、#SECTORCA BlackHatEventsProof of Personhood?AI,Deepfakes and the Next Evolution of Digital Identity Verification#SECTORCA BlackHatEventsSHELLY JAFRY-BIGGSSenior Director/4M GroupCHRISTINE DEWHURSTPar。
33、#SECTORCA BlackHatEventsSecurity is Easier Before PCB AssemblyDeploymentEasy Threat Modeling for HardwareEric EvenchickManaging Partner at Tetrel SecurityEE backgroundFirmware,embedded,automotive,etc。
34、Bypassing RFID ReadersBehind Closed DoorsJulia Zduczyk$whoamiJulia ZduczykIT Security Specialist at Penetration Tester Red Teamer Horse archer,diver,caver,rock climber,hiker,gymnast tl;dr I like adre。
35、From Prompts to Plans:Security and Safety Testing for Agentic AIJason StanleyHead of AI Research Deployment,ServiceNow AI ResearchSecTor BlackHat,2025 Oct 02AI adoption is realChatGPT:200M weekly use。