Watch YouTube videos with Chrome.
Yes, get Chrome now
.
Close
Skip navigation
AE
Sign in
Search
Black Hat
Videos
Playlists
Community
Channels
About
Home
Trending
History
Get YouTube Premium
Best of YouTube
Music
Sports
Gaming
News
Live
360° Video
Browse channels
Sign in to like videos, comment, and subscribe.
Sign in
Watch Queue
Queue
Watch Queue
Queue
Remove all
Disconnect
The next video is starting
stop
Loading...
Watch Queue
Queue
__count__/__total__
Black Hat
Black Hat
Subscribe
Subscribed
Unsubscribe
123K
Loading...
Loading...
Working...
Home
Videos
Playlists
Community
Channels
About
► Play all
Black Hat USA 2019
Black Hat
118 videos
27,580 views
Updated 5 days ago
Play all
Share
Loading...
Save
Sign in to YouTube
Sign in
Practical Approach to Automate the Discovery & Eradication of Open-Source Software Vulnerabilities
by
Black Hat
50:37
Backdooring Hardware Devices by Injecting Malicious Payloads on Microcontrollers
by
Black Hat
39:24
The Path Less Traveled: Abusing Kubernetes Defaults
by
Black Hat
48:06
Exploiting Qualcomm WLAN and Modem Over The Air
by
Black Hat
44:56
Infighting Among Russian Security Services in the Cyber Sphere
by
Black Hat
46:30
Managing for Success: Maintaining a Healthy Bug Bounty Program Long Term
by
Black Hat
37:45
Firmware Cartography: Charting the Course for Modern Server Compromise
by
Black Hat
51:27
0-days & Mitigations: Roadways to Exploit and Secure Connected BMW Cars
by
Black Hat
50:30
Preventing Authentication Bypass: A Tale of Two Researchers
by
Black Hat
37:27
Making Big Things Better The Dead Cow Way
by
Black Hat
51:52
Towards Discovering Remote Code Execution Vulnerabilities in Apple FaceTime
by
Black Hat
33:30
Securing the System: A Deep Dive into Reversing Android Pre-Installed Apps
by
Black Hat
47:49
Automation Techniques in C++ Reverse Engineering
by
Black Hat
50:46
Inside the Apple T2
by
Black Hat
45:14
Fantastic Red-Team Attacks and How to Find Them
by
Black Hat
40:25
Critical Zero Days Remotely Compromise the Most Popular Real-Time OS
by
Black Hat
43:41
Everybody be Cool, This is a Robbery!
by
Black Hat
48:14
The Discovery of a Government Malware and an Unexpected Spy Scandal
by
Black Hat
45:27
Attacking iPhone XS Max
by
Black Hat
34:38
HostSplit: Exploitable Antipatterns in Unicode Normalization
by
Black Hat
40:18
Securing Apps in the Open-By-Default Cloud
by
Black Hat
43:26
Adventures in the Underland: The CQForensic Toolkit as a Unique Weapon Against Hackers
by
Black Hat
54:12
The Future of ATO
by
Black Hat
51:07
A Compendium of Container Escapes
by
Black Hat
43:10
Hacking Ten Million Useful Idiots: Online Propaganda as a Socio-Technical Security Project
by
Black Hat
50:31
Moving from Hacking IoT Gadgets to Breaking into One of Europe's Highest Hotel Suites
by
Black Hat
48:12
How to Detect that Your Domains are Being Abused for Phishing by Using DNS
by
Black Hat
47:26
Debug for Bug: Crack and Hack Apple Core by Itself
by
Black Hat
43:00
Exploring the New World : Remote Exploitation of SQLite and Curl
by
Black Hat
46:52
Paging All Windows Geeks – Finding Evil in Windows 10 Compressed Memory
by
Black Hat
48:55
Shifting Knowledge Left: Keeping up with Modern Application Security
by
Black Hat
50:51
Lessons and Lulz: The 5th Annual Black Hat USA NOC Report
by
Black Hat
53:39
Breaking Samsung's ARM TrustZone
by
Black Hat
43:18
Exploiting Qualcomm WLAN and Modem Over The Air
by
Black Hat
44:56
Zombie Ant Farming: Practical Tips for Playing Hide and Seek with Linux EDRs
by
Black Hat
46:49
Breaking Samsung's ARM TrustZone
by
Black Hat
43:18
Lessons and Lulz: The 5th Annual Black Hat USA NOC Report
by
Black Hat
53:39
Behind the scenes of iOS and Mac Security
by
Black Hat
44:29
MINimum Failure - Stealing Bitcoins with Electromagnetic Fault Injection
by
Black Hat
24:35
PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary
by
Black Hat
27:01
Defense Against Rapidly Morphing DDOS
by
Black Hat
36:17
Testing Your Organization's Social Media Awareness
by
Black Hat
25:20
On Trust: Stories from the Front Lines
by
Black Hat
21:16
Mobile Interconnect Threats: How Next-Gen Products May be Already Outdated
by
Black Hat
26:08
The Future of Securing Intelligent Electronic Devices Using the IEC 62351-7 Standard for Monitoring
by
Black Hat
25:38
Death to the IOC: What's Next in Threat Intelligence
by
Black Hat
26:28
WebAuthn 101 - Demystifying WebAuthn
by
Black Hat
26:28
The Enemy Within: Modern Supply Chain Attacks
by
Black Hat
50:48
All Your Apple are Belong to Us: Unique Identification and Cross-Device Tracking of Apple Devices
by
Black Hat
39:47
Rough and Ready: Frameworks to Measure Persistent Engagement and Deterrence
by
Black Hat
46:54
Breaking Through Another Side: Bypassing Firmware Security Boundaries from Embedded Controller
by
Black Hat
49:12
Playing Offense and Defense with Deepfakes
by
Black Hat
50:48
Project Zero: Five Years of 'Make 0Day Hard'
by
Black Hat
52:49
Selling 0-Days to Governments and Offensive Security Companies
by
Black Hat
39:18
API-Induced SSRF: How Apple Pay Scattered Vulnerabilities Across the Web
by
Black Hat
33:04
DevSecOps : What, Why and How
by
Black Hat
52:46
Breaking Encrypted Databases: Generic Attacks on Range Queries
by
Black Hat
44:04
Women in Security: Building a Female InfoSec Community in Korea, Japan, and Taiwan
by
Black Hat
43:21
Bounty Operations: Best Practices and Common Pitfalls to Avoid in the First 6-12 Months
by
Black Hat
53:29
Operational Templates for State-Level Attack and Collective Defense of Countries
by
Black Hat
50:26
Finding Our Path: How We're Trying to Improve Active Directory Security
by
Black Hat
44:44
Process Injection Techniques - Gotta Catch Them All
by
Black Hat
48:31
Ghidra - Journey from Classified NSA Tool to Open Source
by
Black Hat
47:37
Going Beyond Coverage-Guided Fuzzing with Structured Fuzzing
by
Black Hat
24:49
Transparency in the Software Supply Chain: Making SBOM a Reality
by
Black Hat
29:46
Cybersecurity Risk Assessment for Safety-Critical Systems
by
Black Hat
25:59
Reverse Engineering WhatsApp Encryption for Chat Manipulation and More
by
Black Hat
22:34
Detecting Malicious Files with YARA Rules as They Traverse the Network
by
Black Hat
20:08
He Said, She Said – Poisoned RDP Offense and Defense
by
Black Hat
49:22
Hunting for Bugs, Catching Dragons
by
Black Hat
43:13
Internet-Scale Analysis of AWS Cognito Security
by
Black Hat
45:22
Arm IDA and Cross Check: Reversing the Boeing 787's Core Network
by
Black Hat
50:35
Messaging Layer Security: Towards a New Era of Secure Group Messaging
by
Black Hat
51:09
Controlled Chaos: The Inevitable Marriage of DevOps & Security
by
Black Hat
54:06
Hacking Your Non-Compete
by
Black Hat
50:24
Finding a Needle in an Encrypted Haystack
by
Black Hat
46:39
Responding to a Cyber Attack with Missiles
by
Black Hat
48:54
Lessons From Two Years of Crypto Audits
by
Black Hat
45:50
Integration of Cyber Insurance Into A Risk Management Program
by
Black Hat
54:09
Come Join the CAFSA - Continuous Automated Firmware Security Analysis
by
Black Hat
44:00
Worm Charming: Harvesting Malware Lures for Fun and Profit
by
Black Hat
46:50
Look, No Hands! -- The Remote, Interaction-less Attack Surface of the iPhone
by
Black Hat
42:12
MITRE ATT&CK: The Play at Home Edition
by
Black Hat
47:53
Selling 0-Days to Governments and Offensive Security Companies
by
Black Hat
50:23
All the 4G Modules Could be Hacked
by
Black Hat
49:29
Chip.Fail - Glitching the Silicon of the Connected World
by
Black Hat
45:56
Cyber Insurance 101 for CISO’s
by
Black Hat
44:01
I'm Unique, Just Like You: Human Side-Channels and Their Implications for Security and Privacy
by
Black Hat
48:09
Sensor and Process Fingerprinting in Industrial Control Systems
by
Black Hat
50:03
New Vulnerabilities in 5G Networks
by
Black Hat
43:36
HTTP Desync Attacks: Smashing into the Cell Next Door
by
Black Hat
50:05
Behind the Scenes of Intel Security and Manageability Engine
by
Black Hat
52:59
Behind the Scenes: The Industry of Social Media Manipulation Driven by Malware
by
Black Hat
47:48
Exploiting the Hyper-V IDE Emulator to Escape the Virtual Machine
by
Black Hat
50:13
Dragonblood: Attacking the Dragonfly Handshake of WPA3
by
Black Hat
47:25
PicoDMA: DMA Attacks at Your Fingertips
by
Black Hat
49:46
Attacking and Defending the Microsoft Cloud (Office 365 & Azure AD)
by
Black Hat
50:23
Attacking Electric Motors for Fun and Profit
by
Black Hat
47:40
The Most Secure Browser? Pwning Chrome from 2016 to 2019
by
Black Hat
42:47
Monsters in the Middleboxes: Building Tools for Detecting HTTPS Interception
by
Black Hat
26:58
Loading...
Load more
Loading...
Working...
Sign in
to add this to Watch Later
Add to
Loading playlists...