Information stealer malware has become one of the most prolific and damaging threats in today's cybercrime landscape, siphoning off everything from browser-stored credentials to session tokens and other system secrets. In 2024 alone, we witnessed more than 30 million stealer logs traded on underground markets. Yet buried within these logs is an underexplored goldmine: screenshots captured at the precise moment of infection. Think of it as a thief taking a selfie mid-heist, unexpected but convenient for us, right? Surprisingly, these crime scene snapshots have been largely overlooked until now.
Leveraging infostealer infection screenshots and Large Language Models (LLMs), we propose a new approach to identify infection vectors, extract indicators of compromise (IoCs) and track infostealer campaigns at scale. Our approach found several hundred potential IoCs in the form of URLs leading to the download of the malware-laden payload. By applying this method to "fresh" stealer logs, we can detect and mitigate infection vectors almost instantaneously, reducing further infections. Our analysis uncovered distribution strategies, lure themes and social engineering techniques used by threat actors in successful infection campaigns. We will break down three distinct campaigns to illustrate the tactics they use to deliver malware and deceive victims: cracked versions of popular software, ads pointing to popular software and free AI image generators.
This presentation, with its live demonstration, shows how LLMs can be harnessed to extract IoCs at scale while addressing the challenges and costs of implementation. Attendees will walk away with a deeper understanding of the modern infostealer ecosystem and will want to apply LLM to other illicit artifacts to extract actionable intelligence.
By:
Estelle Ruellan | Threat Intelligence Researcher, Flare
Olivier Bilodeau | Principal Security Researcher, Flare
https://ift.tt/ebiEhyQ
source https://www.youtube.com/watch?v=5nCXriBDwk8
The Cyber Stream
Latest News for Cyber Security & Technology
Saturday, 23 May 2026
Friday, 22 May 2026
SecTor 2025 | 5 Years of Attack Surface Analysis in Canada
Since 2019, the Hackfest community has led an ongoing initiative to analyze the public-facing attack surface of provincial governments in Quebec and Ontario, as well as federal and municipal systems. The objective: to objectively measure and report on the cybersecurity posture of our governments.
In this session, we will present the findings of our fourth large-scale assessment and offer a candid discussion on the current state of government cybersecurity in Canada. Our analysis includes attack surface metrics, exposed legacy systems, insecure web applications, and the accessibility of critical infrastructure from the public internet.
We will highlight basic security failures such as thousands of misconfigured HTTPS sites, 20-year-old legacy systems still in use, websites vulnerable to fundamental attacks like XSS and SQL injection, and more. These findings paint a clear picture: cybersecurity remains a low priority in the protection of citizens' data and critical infrastructures across multiple levels of government.
Join us for an evidence-based dive into what the data reveals — and where we must go from here.
By:
Patrick Roy | Information Security Advisor, CISSP,
Patrick Mathieu | Owner, Hackfest.ca & Product Security Leader, Hackfest
Capt(ret) Steve Waterhouse | CEO and Founder, INFOSECSW
https://ift.tt/EtdoKcy
source https://www.youtube.com/watch?v=XJsgBd3Hbes
source https://www.youtube.com/watch?v=XJsgBd3Hbes
SecTor 2025 | Exploiting Multi Agent Systems
Large language model agents don't just talk, they collaborate, delegate and act. That orchestration layer opens a new attack surface: multi agent prompt injection. In this fast paced SecTor session you'll watch a red team walkthrough that starts with harvesting hidden system prompts, then escalates through mirrored pattern injections that subvert individual agents, corrupt the planner, and co opt tool calls. We'll dissect both direct and "second hand" (indirect) attacks that propagate across agent boundaries, chaining seemingly innocuous instructions into a full mission level takeover.
Defenders aren't powerless, but every control has a price. We map mitigations—from agent scoped content sanitization to policy enforced orchestrators and high fidelity telemetry—against their engineering effort and real world efficacy. You'll leave with a pragmatic checklist for building observability without violating user privacy, plus concrete design patterns to harden your own LLM ecosystems before attackers weaponize them for you.
By: Jeremy Richards | AI Red Team, ServiceNow
https://ift.tt/UxT0IGy
source https://www.youtube.com/watch?v=D4a8Udi2j-M
source https://www.youtube.com/watch?v=D4a8Udi2j-M
What It’s Like to Speak at Black Hat | Yaara Shriki, Threat Researcher at Wiz
Yaara Shriki, Threat Researcher at Wiz, shares her experience speaking at Black Hat, from pre-talk nerves to the excitement of presenting on one of cybersecurity’s biggest stages.
#BlackHatStories #BHEU #BlackHat #cybersecurity
source https://www.youtube.com/shorts/YWc1uwIizUk
source https://www.youtube.com/shorts/YWc1uwIizUk
Thursday, 21 May 2026
SecTor 2025 | Signature of Destruction: Outlook RCE Strikes Again
What if your Outlook signature could compromise your system?
Following up on last year's RCE Chaos, where we achieved remote code execution through the injection of malicious forms by abusing Exchange Outlook synchronization protocols, we're back with a new class of Outlook remote code execution vulnerabilities—this time, abusing signature roaming between cloud and desktop clients.
One compromised email account is all it takes to inject malicious signatures that auto-sync and execute on victims' machines—zero clicks, zero prompts.
We'll unveil three new RCE CVEs: CVE-2025-21357 & CVE-2025-47171 extending last year's form injection abuse and CVE-2025-47176 weaponizing the recently stabilized Outlook Roaming Signatures feature.
Expect live demos and a look into an overlooked attack surface that's been quietly sitting in your inbox for over a year. We'll also show how Exchange helps deliver the final payload—and why traditional detections will miss it.
This one's for reversers, red teamers, and defenders who thought they knew Outlook. You don't.
By:
Michael Gorelik | Chief Technology Officer, Morphisec
Arnold Osipov | Lead Researcher, Morphisec
https://ift.tt/6jotvV2
source https://www.youtube.com/watch?v=d0TfvpV1u-E
source https://www.youtube.com/watch?v=d0TfvpV1u-E
Tuesday, 19 May 2026
SecTor 2025 | How a Mobile Drivers License App Became a Boarding Pass
It starts with a client and a late-night idea on a napkin. It turns into a SOC2-certified product trusted by Police, Government Agencies and the TSA.
You'll hear how we partnered with an ambitious state to augment their physical Driver's License with a new Digital ID built from the ground up. One that lets you access public services, legally buy age-restricted items and even board planes with just your phone.
In this 45-minute Briefing, you will walk away with:
- A blueprint for turning any 'idea on a napkin' into a certification-ready release.
- A pipeline template that performs security testing, triage, and pushes defects back to developer queues to ensure you don't go backwards.
- A threat-model approach that you can copy and use to quickly gain confidence with teams and customers.
- How to measure risk and establish an executive risk scorecard that gets to the finish line.
- Lessons learned from breaking and fixing facial-recognition, blockchain/SSI claims, and how to attack 3rd party verification apps.
Why does this matter? Unlike typical apps, failing here means anyone can forge an identity. With no mature framework to follow, we synchronised compliance, DevSecOps, and user-privacy across four orgs, three audit firms, and one very impatient legislature.
Key stories we'll unpack:
- What's going on with your data, and how an identity app works.
- Building a security-as-code pipeline that ships and keeps auditors happy.
- Breaking liveness detection and facial recognition implementations.
- When the ground shifts and new interoperability standards cause fraudulent verifications.
- How-to on achieving SOC2 certifications, encompassing everything from the mobile app to manufacturing plants.
- How to prove security to clients: threat modeling, pen tests, and 3rd party assurance.
- Integrating blockchain and self-sovereign identity.
- Successfully launching the final product with TSA approval for boarding flights.
If you've ever wondered how to 'secure it' when there are no roadmaps, no precedents, and the stakes are literally sky-high, this talk is for you. This session isn't just a story—it's a playbook for navigating the unknown, where security isn't just a requirement; it's the product.
By: John Duffy | Director - ID/Payment Security, Canadian Bank Note Company
https://ift.tt/xMLeDCf
source https://www.youtube.com/watch?v=1yK7ODoqyiE
source https://www.youtube.com/watch?v=1yK7ODoqyiE
SecTor 2025 | When Hackers Meet Burglars
Smart buildings blur the line between IT and physical infrastructure, connecting HVAC, lighting, access control, elevators, cameras, and more under a single "brain" called a Building Automation System (BAS). Drawing on real engagements against Canadian smart building deployments, this talk guides you through a red teaming exercise that uncovers both digital and physical attack paths. You'll see how attackers gather intel, probe entry points, exploit insecure IoT protocols, and seize control of critical systems. We'll examine live scans, protocol abuse and real world video demos.
Finally, we will flip to defense mode, offering a practical blue team playbook. Attendees will leave with an actionable framework rooted in Canadian field experience, for both offensive engagements and OT focused defenses.
By: Amir Hosseinpour | Offensive Security Specialist, White Tuque
https://ift.tt/4hF7JVx
source https://www.youtube.com/watch?v=qNyJlfq-1RY
source https://www.youtube.com/watch?v=qNyJlfq-1RY
Black Hat Stories Episode 4 | Yaara Shriki, Threat Researcher at Wiz
In this episode, Yaara Shriki shares why Black Hat is an inspiring and educational experience for anyone in the field or just curious, offering a closer look at the people and innovations driving cybersecurity forward.
#BlackHatStories #BHEU #BlackHat #cybersecurity
source https://www.youtube.com/shorts/n20_ZUBcoIM
source https://www.youtube.com/shorts/n20_ZUBcoIM
Monday, 18 May 2026
Black Hat Stories | Yaara Shriki, Threat Researcher at Wiz
In this episode, Yaara Shriki, Threat Researcher at Wiz, shares her experience speaking at Black Hat Briefings for the first time, from pre-talk nerves to the excitement of presenting at one of the world’s leading cybersecurity events. She reflects on what makes Black Hat special, where professionals come together to learn from industry experts, connect with peers, and discover the latest ideas and innovations shaping cybersecurity.
More than just a conference, Black Hat is an inspiring and educational experience for anyone in the field, or simply curious about it, offering a closer look at the people and advancements driving the industry forward.
🔗 Visit our site: https://blackhat.com/
📧 Subscribe to our free newsletter: https://ift.tt/plwTdCL
#BlackHatStories #BHEU #BlackHat #cybersecurity
source https://www.youtube.com/watch?v=5gI5EJ2IyGs
source https://www.youtube.com/watch?v=5gI5EJ2IyGs
Sunday, 17 May 2026
Connecting at Black Hat | Hear from the CEO & Founder of FuzzingLabs
What sparks a career in cybersecurity? Patrick Ventuzelo, CEO and founder of FuzzingLabs, shares how curiosity and a drive to understand systems led to a path in offensive security research, and why Black Hat is a place to connect with the global cybersecurity community.
#BlackHatStories #BlackHat #cybersecurity
source https://www.youtube.com/shorts/qm4ceMivdrA
source https://www.youtube.com/shorts/qm4ceMivdrA
Friday, 15 May 2026
SecTor 2025 | Threat Architecture, Attack Surfaces & Real-World Risk
AI is ubiquitous, so no surprises that Physical AI is primed and ready to enter the market. Autonomous gadgets powered by AI brains are graduating from demos at trade shows into consumer-grade devices in 2025. Early contenders include: Samsung's Ballie, expected availability this summer; Hengbot's Sirius AI robot-dog, accepting deposits with shipping expected in September; and smart security cameras that decide "on-device" when to unlock doors or trigger alarms. These AI-powered edge devices embody Agentic Edge AI—systems that sense, reason, and act locally, optionally using the cloud for heavyweight analytics or fleet learning.
This split architecture is what makes them susceptible to threats. By mixing safety-critical control loops with opaque fast-evolving AI models, they introduce new attack surfaces that neither traditional embedded security nor classic cloud-app SecOps cover. This talk examines the five-layer stack common to every edge AI agent—from perception to learning—highlighting security cracks identified by researchers and exploring how those cracks could translate into real-world impacts.
We will present three realistic kill-chain scenarios from our research into Agentic Edge AI architecture: sensor-side prompt injection convincing a household robot a sleeping dog is a "burning sofa," triggering the sprinkler API and calling emergency services; adversarial vision patches allowing a stranger to bypass an AI doorbell's face whitelist; and federated-learning poisoning quietly degrading thousands of wearables through a single software update. For each case-study, we explore how the compromise travels through the software stack layers, which mitigations block the attack, and what still fails under pressure.
Whether we are securing AI powered consumer gadgets, industrial robots, or municipal smart-city deployments, we'll need to harden these chatty little machines before they turn into our next cyber-attack entry point.
By: Numaan Huq | Senior Threat Researcher, Trend Micro
https://ift.tt/nV0uC8Q
source https://www.youtube.com/watch?v=wI8pDps93Pw
source https://www.youtube.com/watch?v=wI8pDps93Pw
Subscribe to:
Posts (Atom)
-
Germany recalled its ambassador to Russia for a week of consultations in Berlin following an alleged hacker attack on Chancellor Olaf Scho...
-
Android’s May 2024 security update patches 38 vulnerabilities, including a critical bug in the System component. The post Android Update ...