사이버 보안 업계에서 가장 확고하고 심도 있는 보안 이벤트 시리즈인 블랙햇(Black Hat)이 블랙햇 아시아 2025(Black Hat Asia 2025)의 콘텐츠 라인업을 오늘 발표했다. 이 라이브 대면 행사는 4월 1일부터 4일까지 싱가포르 마리나베이 샌즈 엑스포 & 컨벤션 센터(Marina Bay Sands Expo & Convention Centre)에서 개최된다. 이 행사에서는 블랙햇 아시아 검토 위원회(Black Hat Asia Review Board)가 직접 선정한 43가지 브리핑, 4일간의 교육, 하루 종일 진행되는 서밋, 10가지 스폰서 세션, 53가지 아스널(Arsenal) 도구 데모가 진행된다.
4월 3일과 4월 4일에 참석자들은 브리핑 프레젠테이션을 통해 최신 사이버 보안 위험, 개발 및 동향에 대한 인사이트를 얻을 수 있다.
브리핑 하이라이트:
· 상태 조작: 프로토콜 상태 머신 재구성을 통한 블루투스 취약점 발견의 새로운 공격 벡터 공개 (https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fwww.blackhat.com%2Fasia-25%2Fbriefings%2Fschedule%2Findex.html%23state-manipulation-unveiling-new-attack-vectors-in-bluetooth-vulnerability-discovery-through-protocol-state-machine-reconfiguration-43736&esheet=54199629&newsitemid=20250204216349&lan=en-US&anchor=State+Manipulation%3A+Unveiling+New+Attack+Vectors+in+Bluetooth+Vulnerability+Discovery+through+Protocol+State+Machine+Reconfiguration&index=3&md5=8323393c6a3332e365b65db41490cb86) - 이 강연에서는 자동차 및 모바일 장치를 포함한 다양한 애플리케이션에서 상태 머신 메커니즘을 분석하여 블루투스의 취약점을 밝힌다. 연구자들이 블루투스 상태 머신 상호작용을 조작하는 기술에 대한 심층적인 통찰력을 제공하며, 이러한 취약점을 드러내고 블루투스 생태계에 미치는 영향을 평가하는 체계적인 방법에 초점을 맞출 예정이다.
· 휴대폰 주의: 모바일 디바이스를 노리는 신종 USB 기반 파일 액세스 공격 (https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fwww.blackhat.com%2Fasia-25%2Fbriefings%2Fschedule%2F%23watch-your-phone-novel-usb-based-file-access-attacks-against-mobile-devices-43262&esheet=54199629&newsitemid=20250204216349&lan=en-US&anchor=Watch+Your+Phone%3A+Novel+USB-Based+File+Access+Attacks+Against+Mobile+Devices&index=4&md5=7b37d02da3ed3b9b0776ecfd224921d6) - 이 강연에서는 최신 모바일 디바이스에서 잠금 화면과 사용자 확인 메시지를 우회해 USB 기반 파일에 액세스하는 새로운 공격 및 공격 기법을 소개한다. 연구자들은 사용자 확인 메시지의 단점을 밝히고 라이브 데모를 통해 주요 연구 결과를 집중 조명할 예정이다.
· 퀄컴 QDSP6 JTAG의 미스터리 공개: 고급 이론적 리버스 엔지니어링을 향한 여정 (https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fwww.blackhat.com%2Fasia-25%2Fbriefings%2Fschedule%2F%23unveiling-the-mysteries-of-qualcomms-qdsp-jtag-a-journey-into-advanced-theoretical-reverse-engineering-44550&esheet=54199629&newsitemid=20250204216349&lan=en-US&anchor=Unveiling+the+Mysteries+of+Qualcomm%27s+QDSP6+JTAG%3A+A+Journey+into+Advanced+Theoretical+Reverse+Engineering&index=5&md5=6c176d1d556d5bade2a16a26905b5e5d) - 이 강연에서는 정교한 독점 하드웨어에 적용되는 고급 리버스 엔지니어링 기술을 살펴보고, 특허 분석, 펌웨어 리버스 엔지니어링, 이론적 모델링의 고유한 조합으로 문서화 되지 않은 하드웨어 기술과 그 애플리케이션 의미론의 복잡성을 풀어내는 방법을 시연한다.
4월 2일에는 참석자들과 업계 리더들이 매력적인 세션과 네트워킹 활동을 통해 소통할 수 있는 장으로서 서밋이 개최된다.
서밋 (https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fwww.blackhat.com%2Fasia-25%2Fsummit-sessions%2Fschedule%2Findex.html&esheet=54199629&newsitemid=20250204216349&lan=en-US&anchor=Summits&index=6&md5=38b366c662996544f105e1f1029c9ada)에 참석하려면 개별 패스가 필요하며, 다음과 같은 행사가 마련된다.
· 제1회 블랙햇 아시아 AI 서밋(AI Summit at Black Hat Asia) (https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fwww.blackhat.com%2Fasia-25%2Fai-summit.html&esheet=54199629&newsitemid=20250204216349&lan=en-US&anchor=AI+Summit+at+Black+Hat+Asia&index=7&md5=9afd224643e9098d97a53ef688453b51) - 이 서밋은 모든 보안 전문가가 리더들과 교류할 뿐 아니라, 사이버 보안 분야에서 인공지능(AI)의 미래에 대해 논의하고 토론할 수 있는 귀중한 기회를 제공한다. AI 서밋은 타이틀 스폰서인 트렌드 마이크로(Trend Micro)와 플래티넘 스폰서인 벅크라우드(Bugcrowd)가 후원한다. 자세한 내용은 www.blackhat.com/asia-25/ai-summit.html 에서 확인할 수 있다.
· 제1회 블랙햇 금융 서비스 서밋(Black Hat Financial Services Summit) (https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fwww.blackhat.com%2Fasia-25%2Ffinancial-services-summit.html&esheet=54199629&newsitemid=20250204216349&lan=en-US&anchor=Black+Hat+Financial+Services+Summit&index=9&md5=fe543d8404eca44f73d26b2f4664948a) - 이번 서밋에서는 금융 분야의 최고 사이버 보안 리더들이 모여 하루 동안 솔직한 토론과 전문가 주도의 프레젠테이션을 진행할 예정이다. 자세한 내용은 www.blackhat.com/asia-25/financial-services-summit.html 에서 확인할 수 있다.
2일간 및 4일간 교육은 4월 1일부터 4월 4일까지 진행되며, 인공지능(AI), 머신러닝(ML), 데이터 과학, 펜테스팅, 방어, 산업 제어 시스템(ICS) 등 다양한 대면 및 가상 교육 과정이 제공된다.
교육 하이라이트:
· AI 레드팀 실무(AI Red Teaming in Practice) (https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fwww.blackhat.com%2Fasia-25%2Ftraining%2Fschedule%2F%23ai-red-teaming-in-practice--43046&esheet=54199629&newsitemid=20250204216349&lan=en-US&anchor=AI+Red+Teaming+in+Practice&index=12&md5=ad96f59d2957f9b55b2ae11380cf8e30)
· 딥페이크 위협 분석 (https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fwww.blackhat.com%2Fasia-25%2Ftraining%2Fschedule%2F%23deepfake-threat-analysis--42964&esheet=54199629&newsitemid=20250204216349&lan=en-US&anchor=Deepfake+Threat+Analysis&index=13&md5=3087c28bef31ad171bb5a956024c2e99)
· 모바일 애플리케이션 공격: 안드로이드와 iOS를 위한 실전 보안 테스트 (https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fwww.blackhat.com%2Fasia-25%2Ftraining%2Fschedule%2F%23attacking-mobile-applications-practical-security-testing-for-android-and-ios--43062&esheet=54199629&newsitemid=20250204216349&lan=en-US&anchor=Attacking+Mobile+Applications%3A+Practical+Security+Testing+for+Android+and+iOS&index=14&md5=3259f062a044593feba8e9126cee3587)
· 고급 멀웨어 트래픽 분석 - 적응형 방어. 2025년 에디션 (https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fwww.blackhat.com%2Fasia-25%2Ftraining%2Fschedule%2F%23advanced-malware-traffic-analysis---adaptive-defence--edition--42764&esheet=54199629&newsitemid=20250204216349&lan=en-US&anchor=Advanced+Malware+Traffic+Analysis+-+Adaptive+Defence.+2025+Edition&index=15&md5=f40c0f9576d802276b2adad95a68eb54)
· Windows 셸코딩 기술 (https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fwww.blackhat.com%2Fasia-25%2Ftraining%2Fschedule%2F%23windows-shellcoding-techniques--43028&esheet=54199629&newsitemid=20250204216349&lan=en-US&anchor=Windows+Shellcoding+Techniques&index=16&md5=f4148845e082e5cf402e888d97f15f74)
현재 2025년 이벤트에서 이용 가능한 패스는 비즈니스 홀 (https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fwww.blackhat.com%2Fasia-25%2Fbusiness-hall.html&esheet=54199629&newsitemid=20250204216349&lan=en-US&anchor=Business+Hall&index=17&md5=70faee744d19fe35edc4ee64bd7317ba) 패스 또는 비즈니스 패스다. 비즈니스 홀에서는 주요 사이버 보안 솔루션 제공업체의 최신 제품과 기술을 선보이며, 4월 3일과 4월 4일에 진행된다. 비즈니스 패스로는 기조연설, 아스널, 스폰서 세션, 해킹 공격과 방어(Bricks & Picks) 등에 참가할 수 있다. 모든 블랙햇 아시아 2025 패스 소지자는 비즈니스 홀에 입장할 수 있다.
올해 블랙햇 아시아의 블랙햇 아스널(Black Hat Arsenal)은 4월 3일부터 4월 4일까지 비즈니스 홀에서 개최된다. 블랙햇 아스널은 연구자와 사이버 보안 커뮤니티가 모여 최신 오픈소스 도구와 제품을 선보이고 시연하는 자리로, 발표자가 참석자와 소통할 수 있는 대화 분위기의 환경에서 이뤄진다. 올해 행사에서는 53개의 직접 도구 데모와 3개의 랩을 선보일 예정이며, 범위는 취약점 악용(exploitation) 및 윤리적 해킹, 멀웨어 공격, 디지털 포렌식 및 사고 대응(DFIR) 등을 아우른다.
블랙햇 아스널 (https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fwww.blackhat.com%2Fasia-25%2Farsenal%2Fschedule%2Findex.html&esheet=54199629&newsitemid=20250204216349&lan=en-US&anchor=Arsenal&index=18&md5=4da9d721db6131211e2b4f0fc750d068) 도구 데모 하이라이트:
· 해결사 팔코 액션: 깃허브 액션 워크플로에서 교묘한 공급망 공격을 탐지하라! (https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fwww.blackhat.com%2Fasia-25%2Farsenal%2Fschedule%2Findex.html%23falco-action-to-the-rescue-sniffing-out-sneaky-supply-chain-attacks-in-your-github-action-workflows-43799&esheet=54199629&newsitemid=20250204216349&lan=en-US&anchor=Falco+Action+to+the+Rescue%3A+Sniffing+Out+Sneaky+Supply+Chain+Attacks+in+Your+GitHub+Action+Workflows%21&index=19&md5=8ecc37f4c1d8992732de2471719c3da3)
· 님플랜트(NimPlant) (https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fwww.blackhat.com%2Fasia-25%2Farsenal%2Fschedule%2F%23nimplant-43204&esheet=54199629&newsitemid=20250204216349&lan=en-US&anchor=NimPlant&index=20&md5=1c7761a4bb46eed95a1d61e4318297e0)
· 스토어웨이(Stowaway): 펜테스터를 위한 멀티홉 프록시 도구 (https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fwww.blackhat.com%2Fasia-25%2Farsenal%2Fschedule%2F%23stowaway-multi-hop-proxy-tool-for-pentesters-43575&esheet=54199629&newsitemid=20250204216349&lan=en-US&anchor=Stowaway%3A+Multi-hop+Proxy+Tool+for+Pentesters&index=21&md5=a0a6289fadb9dcfd1112829169c691fe)
등록 정보:
블랙햇 아시아 2025에 대한 등록 및 추가 정보는 www.blackhat.com/asia-25/registration.html 에서 확인할 수 있다.
블랙햇 아시아 2025의 주요 스폰서 및 파트너:
· 플래티넘 스폰서: 앱돔(Appdome), 매니지엔진(ManageEngine), SK쉴더스(SK Shieldus).
· 골드 스폰서: 비트디펜더(Bitdefender), 벅크라우드(Bugcrowd), 컨센트릭 AI(Concentric AI), 포트라(Fortra), 해커원(HackerOne), 피커스 시큐리티(Picus Security), 트렌드 마이크로(Trend Micro).
· 서스테이닝 파트너: 크라우드스트라이크(CrowdStrike), 매니지엔진, 센티넬원(SentinelOne), 바로니스(Varonis) 및 위즈(Wiz).
· 글로벌 파트너: 컨센트릭 AI, 코렐리움(Corellium) 및 해커원
블랙햇 소개
블랙햇(Black Hat)은 사이버 보안 업계에서 가장 전통 있고 심도 있는 보안 이벤트 시리즈다. 1997년에 설립된 이 연례 행사는 참석자들에게 최신 사이버 보안 연구, 개발 및 동향을 제공한다. 커뮤니티의 요구에 따라 주도되는 블랙햇 이벤트는 브리핑 프레젠테이션, 교육 과정, 서밋 등을 통해 커뮤니티에서 직접 가져온 콘텐츠를 선보인다. 모든 경력 수준과 학문 분과가 협업과 네트워킹을 위해 모여 자신에게 가장 중요한 사이버 보안 주제에 대해 논의하는 이벤트 시리즈인 블랙햇 이벤트는 미국, 캐나다, 유럽, 중동 및 아프리카, 아시아 지역에서 개최된다. 웹 사이트: www.blackhat.com
이 보도자료는 해당 기업에서 원하는 언어로 작성한 원문을 한국어로 번역한 것이다. 그러므로 번역문의 정확한 사실 확인을 위해서는 원문 대조 절차를 거쳐야 한다. 처음 작성된 원문만이 공식적인 효력을 갖는 발표로 인정되며 모든 법적 책임은 원문에 한해 유효하다.
Black Hat Announces Content Lineup for Black Hat Asia 2025
Black Hat (https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fwww.blackhat.com%2F&esheet=54199629&newsitemid=20250204216349&lan=en-US&anchor=Black+Hat&index=1&md5=0c77ce1d22a00f1b7e3028c3b4185740), the cybersecurity industry’s most established and in-depth security event series, today announced the release of its content lineup for Black Hat Asia 2025. The live, in-person event will take place at the Marina Bay Sands Expo & Convention Centre in Singapore from April 1 to April 4. The event will feature 43 Briefings hand selected by the Black Hat Asia Review Board, four days of Trainings, a full day of Summits, 10 Sponsored Sessions, and 53 Arsenal tool demos.
On April 3 and April 4, attendees will gain insight into the latest in cybersecurity risks, developments, and trends through Briefings presentations.
Briefings (https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fwww.blackhat.com%2Fasia-25%2Fbriefings%2Fschedule%2Findex.html&esheet=54199629&newsitemid=20250204216349&lan=en-US&anchor=Briefings&index=2&md5=b1094342d73c7eeb459b5de47365c045) highlights include:
· State Manipulation: Unveiling New Attack Vectors in Bluetooth Vulnerability Discovery through Protocol State Machine Reconfiguration (https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fwww.blackhat.com%2Fasia-25%2Fbriefings%2Fschedule%2Findex.html%23state-manipulation-unveiling-new-attack-vectors-in-bluetooth-vulnerability-discovery-through-protocol-state-machine-reconfiguration-43736&esheet=54199629&newsitemid=20250204216349&lan=en-US&anchor=State+Manipulation%3A+Unveiling+New+Attack+Vectors+in+Bluetooth+Vulnerability+Discovery+through+Protocol+State+Machine+Reconfiguration&index=3&md5=8323393c6a3332e365b65db41490cb86) - This talk will uncover Bluetooth vulnerabilities by analyzing state machine mechanisms in various applications, including automotive and mobile devices. Researchers will provide in-depth insights into techniques for manipulating Bluetooth state machine interactions, focusing on systematic methods for discovering these vulnerabilities and assessing their impact on the Bluetooth ecosystem.
· Watch Your Phone: Novel USB-Based File Access Attacks Against Mobile Devices (https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fwww.blackhat.com%2Fasia-25%2Fbriefings%2Fschedule%2F%23watch-your-phone-novel-usb-based-file-access-attacks-against-mobile-devices-43262&esheet=54199629&newsitemid=20250204216349&lan=en-US&anchor=Watch+Your+Phone%3A+Novel+USB-Based+File+Access+Attacks+Against+Mobile+Devices&index=4&md5=7b37d02da3ed3b9b0776ecfd224921d6) - This talk will present novel attacks and attack techniques that bypass lock screens and user confirmation prompts to gain USB-based file access on state-of-the-art mobile devices. Researchers will uncover the shortcomings of user confirmation prompts and highlight key findings via live demos.
· Unveiling the Mysteries of Qualcomm's QDSP6 JTAG: A Journey into Advanced Theoretical Reverse Engineering (https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fwww.blackhat.com%2Fasia-25%2Fbriefings%2Fschedule%2F%23unveiling-the-mysteries-of-qualcomms-qdsp-jtag-a-journey-into-advanced-theoretical-reverse-engineering-44550&esheet=54199629&newsitemid=20250204216349&lan=en-US&anchor=Unveiling+the+Mysteries+of+Qualcomm%27s+QDSP6+JTAG%3A+A+Journey+into+Advanced+Theoretical+Reverse+Engineering&index=5&md5=6c176d1d556d5bade2a16a26905b5e5d) - This talk will explore advanced reverse engineering techniques applied to sophisticated proprietary hardware, as well as demonstrate how a unique combination of patent analysis, firmware reverse engineering, and theoretical modeling can unlock the intricacies of undocumented hardware technologies and their application semantics.
On April 2, Summits will serve as a space for both attendees and industry leaders to connect through engaging sessions and networking activities.
Summits (https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fwww.blackhat.com%2Fasia-25%2Fsummit-sessions%2Fschedule%2Findex.html&esheet=54199629&newsitemid=20250204216349&lan=en-US&anchor=Summits&index=6&md5=38b366c662996544f105e1f1029c9ada) require individual passes to attend and include:
· The inaugural AI Summit at Black Hat Asia (https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fwww.blackhat.com%2Fasia-25%2Fai-summit.html&esheet=54199629&newsitemid=20250204216349&lan=en-US&anchor=AI+Summit+at+Black+Hat+Asia&index=7&md5=9afd224643e9098d97a53ef688453b51) - This Summit will provide an invaluable opportunity for every security professional to engage with leaders, as well as discuss and debate the future of artificial intelligence (AI) in cybersecurity. The AI Summit is sponsored by Trend Micro, Title Sponsor; and Bugcrowd, Platinum Sponsor. For more information, please visit www.blackhat.com/asia-25/ai-summit.html.
· The inaugural Black Hat Financial Services Summit (https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fwww.blackhat.com%2Fasia-25%2Ffinancial-services-summit.html&esheet=54199629&newsitemid=20250204216349&lan=en-US&anchor=Black+Hat+Financial+Services+Summit&index=9&md5=fe543d8404eca44f73d26b2f4664948a) - This Summit will bring together top cybersecurity leaders in the financial sector for a day of candid discussions and expert-led presentations. For more information, please visit www.blackhat.com/asia-25/financial-services-summit.html.
Two- and four-day Trainings will take place from April 1 to April 4, and feature a variety of in-person and virtual courses in artificial intelligence (AI), machine learning (ML), and data science; pentesting; defense; industrial control systems (ICS); and more.
Trainings (https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fwww.blackhat.com%2Fasia-25%2Ftraining%2Fschedule%2Findex.html&esheet=54199629&newsitemid=20250204216349&lan=en-US&anchor=Trainings&index=11&md5=2bd4f39e8014022494f8a531d9cc74c3) highlights include:
· AI Red Teaming in Practice (https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fwww.blackhat.com%2Fasia-25%2Ftraining%2Fschedule%2F%23ai-red-teaming-in-practice--43046&esheet=54199629&newsitemid=20250204216349&lan=en-US&anchor=AI+Red+Teaming+in+Practice&index=12&md5=ad96f59d2957f9b55b2ae11380cf8e30)
· Deepfake Threat Analysis (https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fwww.blackhat.com%2Fasia-25%2Ftraining%2Fschedule%2F%23deepfake-threat-analysis--42964&esheet=54199629&newsitemid=20250204216349&lan=en-US&anchor=Deepfake+Threat+Analysis&index=13&md5=3087c28bef31ad171bb5a956024c2e99)
· Attacking Mobile Applications: Practical Security Testing for Android and iOS (https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fwww.blackhat.com%2Fasia-25%2Ftraining%2Fschedule%2F%23attacking-mobile-applications-practical-security-testing-for-android-and-ios--43062&esheet=54199629&newsitemid=20250204216349&lan=en-US&anchor=Attacking+Mobile+Applications%3A+Practical+Security+Testing+for+Android+and+iOS&index=14&md5=3259f062a044593feba8e9126cee3587)
· Advanced Malware Traffic Analysis - Adaptive Defence. 2025 Edition (https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fwww.blackhat.com%2Fasia-25%2Ftraining%2Fschedule%2F%23advanced-malware-traffic-analysis---adaptive-defence--edition--42764&esheet=54199629&newsitemid=20250204216349&lan=en-US&anchor=Advanced+Malware+Traffic+Analysis+-+Adaptive+Defence.+2025+Edition&index=15&md5=f40c0f9576d802276b2adad95a68eb54)
· Windows Shellcoding Techniques (https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fwww.blackhat.com%2Fasia-25%2Ftraining%2Fschedule%2F%23windows-shellcoding-techniques--43028&esheet=54199629&newsitemid=20250204216349&lan=en-US&anchor=Windows+Shellcoding+Techniques&index=16&md5=f4148845e082e5cf402e888d97f15f74)
Business Hall (https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fwww.blackhat.com%2Fasia-25%2Fbusiness-hall.html&esheet=54199629&newsitemid=20250204216349&lan=en-US&anchor=Business+Hall&index=17&md5=70faee744d19fe35edc4ee64bd7317ba) passes, or Business passes, are currently available for the 2025 event. The Business Hall showcases the latest products and technologies from leading cybersecurity solution providers and will take place on April 3 and April 4. Business passes provide access to the Keynotes, Arsenal, Sponsored Sessions, Bricks & Picks, and more. All Black Hat Asia 2025 pass holders will have access to the Business Hall.
This year’s Black Hat Arsenal at Black Hat Asia will take place from April 3 to April 4 in the Business Hall. Black Hat Arsenal brings together researchers and the cybersecurity community to showcase and demonstrate their latest open-source tools and products in a conversational environment where presenters can interact with the attendees. This year’s event will feature 53 in-person tool demos and 3 labs, spanning exploitation and ethical hacking, malware offense, digital forensics and incident response (DFIR), and more.
Black Hat Arsenal (https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fwww.blackhat.com%2Fasia-25%2Farsenal%2Fschedule%2Findex.html&esheet=54199629&newsitemid=20250204216349&lan=en-US&anchor=Arsenal&index=18&md5=4da9d721db6131211e2b4f0fc750d068) tool demo highlights include:
· Falco Action to the Rescue: Sniffing Out Sneaky Supply Chain Attacks in Your GitHub Action Workflows! (https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fwww.blackhat.com%2Fasia-25%2Farsenal%2Fschedule%2Findex.html%23falco-action-to-the-rescue-sniffing-out-sneaky-supply-chain-attacks-in-your-github-action-workflows-43799&esheet=54199629&newsitemid=20250204216349&lan=en-US&anchor=Falco+Action+to+the+Rescue%3A+Sniffing+Out+Sneaky+Supply+Chain+Attacks+in+Your+GitHub+Action+Workflows%21&index=19&md5=8ecc37f4c1d8992732de2471719c3da3)
· NimPlant (https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fwww.blackhat.com%2Fasia-25%2Farsenal%2Fschedule%2F%23nimplant-43204&esheet=54199629&newsitemid=20250204216349&lan=en-US&anchor=NimPlant&index=20&md5=1c7761a4bb46eed95a1d61e4318297e0)
· Stowaway: Multi-hop Proxy Tool for Pentesters (https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fwww.blackhat.com%2Fasia-25%2Farsenal%2Fschedule%2F%23stowaway-multi-hop-proxy-tool-for-pentesters-43575&esheet=54199629&newsitemid=20250204216349&lan=en-US&anchor=Stowaway%3A+Multi-hop+Proxy+Tool+for+Pentesters&index=21&md5=a0a6289fadb9dcfd1112829169c691fe)
Registration Information:
For registration and additional information on Black Hat Asia 2025, please visit www.blackhat.com/asia-25/registration.html.
Top Sponsors and Partners of Black Hat Asia 2025 include:
· Platinum Sponsors: Appdome, ManageEngine, and SK Shieldus.
· Gold Sponsors: Bitdefender, Bugcrowd, Concentric AI, Fortra, HackerOne, Picus Security, and Trend Micro.
· Sustaining Partners: CrowdStrike, ManageEngine, SentinelOne, Varonis, and Wiz.
· Global Partners: Concentric AI, Corellium, and HackerOne.
About Black Hat
Black Hat is the cybersecurity industry’s most established and in-depth security event series. Founded in 1997, these annual, multi-day events provide attendees with the latest in cybersecurity research, developments, and trends. Driven by the needs of the community, Black Hat events showcase content directly from the community through Briefings presentations, Trainings courses, Summits, and more. As the event series where all career levels and academic disciplines convene to collaborate, network, and discuss the cybersecurity topics that matter most to them, attendees can find Black Hat events in the United States, Canada, Europe, Middle East and Africa, and Asia. For more information, please visit www.blackhat.com.
View source version on businesswire.com: https://www.businesswire.com/news/home/20250204216349/en/
피플스토리 다른 기사 보기