By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Cyber Apocalypse Now: Black Hat 2025’s Most Terrifying Hacks and Security Breaches
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Cyber Apocalypse Now: Black Hat 2025’s Most Terrifying Hacks and Security Breaches
News

Cyber Apocalypse Now: Black Hat 2025’s Most Terrifying Hacks and Security Breaches

News Room
Last updated: 2025/08/09 at 5:25 AM
News Room Published 9 August 2025
Share
SHARE

This week, PCMag’s security team traveled to Las Vegas for the Black Hat cybersecurity conference to engage in some intense cybersecurity conversations about adversarial AI, malware, and all the ways to stop bad guys from ruining your business or scamming you out of house and home. We saw everything from potentially explosive EV chargers to global malware campaigns run by the mob. Here’s a summary of some of the most interesting briefings, demonstrations, and panels we attended during the show.


Did You Click on an Ad Owned by Russian Mobsters?

A particularly interesting briefing came from the team at InfoBlox. Researchers at the threat intelligence firm presented evidence that an organized crime group known as VexTrio is operating a traffic distribution system (TDS) that intercepts consumers’ browsing traffic, and serves up fake alerts, downloads for fake dating apps, and prompts people to download malware disguised as antivirus software.

Dr. Renee Burton is part of the Infoblox research team, and she recommends avoiding these scams by simply not allowing notifications for websites while browsing. She also suggests researching apps before downloading and ignoring device infection pop-ups or alerts that you may see while browsing.


Learning How to Take AI Down a Peg or Two

In dystopian fiction, humanity gives more and more control to AI and then suffers the consequences. As an Israeli research team reported, that’s not fiction anymore. In a presentation frequently interrupted by applause, they demonstrated simple techniques for subverting Google’s Gemini through calendar invitations and even through email.

The researchers forced Gemini to delete messages, spew invective at the user, steal email messages, and even use Google Home to open windows. Google has added defenses against these targeted “promptware” attacks, but the team warns that it anticipates promptware attacks to increase in complexity and severity.

In a separate presentation on Thursday, researchers from the University of Central Florida and the Cognitive Security Institute announced their predictions for the next two years of global AI adoption. Those predictions included increasingly sophisticated catfishing scams, more effective phishing attempts, and, concerningly, everyone will have a so-called digital twin created using their online content.

Researchers at Black Hat say that AI is here to stay. (Credit: Kim Key)

To back up these predictions, the researchers showed a version of a “digital twin” of Chief Justice John Roberts created by their students. The large language model appeared to have been trained on Roberts’ public Supreme Court opinions and rulings, making it a not-so-fun and not-so-convincing fake, but their point was still clear: AI is here to stay, so it’s wise to learn how to live with it. Below is an excerpt from a conversation we had with the bot version of Chief Justice Roberts.

text conversation against a white background

A conversation between a PCMag analyst and an LLM trained to act like a Supreme Court judge. (Credit: Habit/PCMag)

AI is trained to mimic and satisfy the humans it interacts with, so don’t be surprised if someone uses it to trick your family and friends. The team suggested designating a “safe word” with your family members and friends, so if, or when, your digital twin comes along, your loved ones won’t become its victims.


Using AI to Fight Malware

Yes, AI produces deepfake videos and convincing scams, but it can also help fight those threats. For example, every day, thousands of people fall for one trick or another and infect themselves with infostealer malware. The malware sucks up bitcoin wallets, password stashes, and all sorts of personal data, then sends an info package back to its maker.

Flare.io researcher Estelle Ruellan gained access to millions of these info packages and devised a system using two very different AIs to analyze them and return actionable details about the malware campaigns that distribute these attacks. This project specifically focused on screenshots included in the packets, but Ruellan and the Flare.io team plan a deeper analysis using the entirety of the captured info packages.


Newsletter Icon

Newsletter Icon

Get Our Best Stories!

Stay Safe With the Latest Security News and Updates


SecurityWatch Newsletter Image

Sign up for our SecurityWatch newsletter for our most important privacy and security stories delivered right to your inbox.

Sign up for our SecurityWatch newsletter for our most important privacy and security stories delivered right to your inbox.

By clicking Sign Me Up, you confirm you are 16+ and agree to our Terms of Use and Privacy Policy.

Thanks for signing up!

Your subscription has been confirmed. Keep an eye on your inbox!


Examining An Ever-Evolving Cyber Threat Landscape

Speaking of malware, one of cybersecurity’s pioneers provided a malware history lesson as part of the opening keynote for the event. Mikko Hypönnen, a longtime cybersecurity researcher who worked with F-Secure and WithSecure, opened his speech by recounting his days of keeping viruses and worms, which were made by random kids as pranks, on floppy disks. He told us that money is the root of all evil, permeating the cybercrime landscape. Once criminals, adversarial governments, and everyone else learned that they could use malware to steal money, the stakes got a lot higher for cybersecurity professionals.

A man on a stage with a large screen in the background

Mikko Hyponnen onstage for the first keynote at Black Hat 2025 (Credit: Kim Key)

Hypönnen said that AI can assist in the fight against today’s malware, and companies and governments should look into using AI-enhanced tools to protect people. There are a lot of software vendors at Black Hat, so Hypönnen directed comments at them in particular, urging companies to stop putting the onus on consumers to protect themselves from scams. Instead, they should try making software and systems that are more inherently secure.

Hypönnen ended the chat by announcing his departure at the end of the week from the cybersecurity industry. He’s getting into anti-drone tech, which is quite a change!

Recommended by Our Editors


Hacks, Hacks, and More Hacks

Any hacking group that wants to penetrate your network typically starts small, sneaking in an app that can then expand its control. Then they need remote communication with that app, and its commands can reveal the attack to network security.

Adam Crosser of Praetorian found a way to effectively make Zoom or Teams do the work of evading security, and to disguise those remote control messages as web conferencing traffic. Like any ethical hacker, he notified Zoom and Microsoft. Zoom has locked down its tech to prevent this attack, but Microsoft hasn’t.

In a different demonstration, researcher David Moshe and his team discovered that security cameras can leave networks wide open to hackers. Moshe and Claroty’s Team82 found a service on the web called axis.remoting and parlayed that discovery into an attack that gave them full control of any security cameras and camera control servers from Axis Communications. Axis fixed the problem quickly, but teams like Moshe’s (and their equivalents on the Dark Side) continue to seek and find security holes.


Five women standing on a stage

Panelists gather for a group photo after a presentation (Credit: Kim Key)

Is Cybersecurity Your Next Big Career Move?

Finally, a panel of successful women, each of whom worked in the industry for a least a decade, offered some solid suggestions for navigating the industry as visible minorities. The group answered questions from the crowd about dealing with uncomfortable office politics and staving off the dreaded imposter syndrome.

The panelists told us that some of the keys to entering the industry and staying employed are as follows: keep your skills sharp, stay curious, seek out a community of like-minded and empathetic mentors or fellow professionals, be yourself, and stay flexible when it comes to taking jobs that are off the beaten path.

About Neil J. Rubenking

Principal Writer, Security

Neil J. Rubenking

When the IBM PC was new, I served as the president of the San Francisco PC User Group for three years. That’s how I met PCMag’s editorial team, who brought me on board in 1986. In the years since that fateful meeting, I’ve become PCMag’s expert on security, privacy, and identity protection, putting antivirus tools, security suites, and all kinds of security software through their paces.

Before my current security gig, I supplied PCMag readers with tips and solutions on using popular applications, operating systems, and programming languages in my “User to User” and “Ask Neil” columns, which began in 1990 and ran for almost 20 years. Along the way I wrote more than 40 utility articles, as well as Delphi Programming for Dummies and six other books covering DOS, Windows, and programming. I also reviewed thousands of products of all kinds, ranging from early Sierra Online adventure games to AOL’s precursor Q-Link.

In the early 2000s I turned my focus to security and the growing antivirus industry. After years working with antivirus, I’m known throughout the security industry as an expert on evaluating antivirus tools. I serve as an advisory board member for the Anti-Malware Testing Standards Organization (AMTSO), an international nonprofit group dedicated to coordinating and improving testing of anti-malware solutions.

Read Neil J.’s full bio

Read the latest from Neil J. Rubenking

About Kim Key

Senior Writer, Security

Kim Key

I review privacy tools like hardware security keys, password managers, private messaging apps and ad-blocking software. I also report on online scams and offer advice to families and individuals about staying safe on the internet. Before joining PCMag, I wrote about tech and video games for CNN, Fanbyte, Mashable, The New York Times, and TechRadar. I also worked at CNN International, where I did field producing and reporting on sports that are popular with worldwide audiences.

Read Kim’s full bio

Read the latest from Kim Key

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Security asset management faces visibility gaps – News
Next Article Wordel Hints and Answer to Puzzle #1512
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Top Stories: iOS 26 Beta 5, Apple Watch Ultra 3 Rumors, and More
News
Struggling to Rest on Your Period? These Sleep Hacks May Help
News
Sand and Deliver: We Raced Across Dunes to Find the Best Beach Wagon
Gadget
Ion displays the NVIDIA DGX H200 system for advanced language models
Mobile

You Might also Like

News

Top Stories: iOS 26 Beta 5, Apple Watch Ultra 3 Rumors, and More

6 Min Read
News

Struggling to Rest on Your Period? These Sleep Hacks May Help

6 Min Read
News

Prusa Core One Review: An Expensive 3D Printer for True Believers

8 Min Read
News

Travel lighter while staying connected with this tiny smartphone

2 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?