Sunday, 24 May 2026

SecTor 2025 | Invoking Gemini for Workspace Agents with Simple Google Calendar Invite

Over the past two years, we have witnessed the emergence of a new class of attacks against LLM-powered systems known as Promptware. Promptware refers to prompts (in the form of text, images, or audio samples) engineered to exploit LLMs at inference time to perform malicious activities within the application context. While a growing body of research has already warned about a potential shift in the threat landscape posed to applications, Promptware has often been perceived as impractical and exotic due to the presumption that crafting such prompts requires specialized expertise in adversarial machine learning, a cluster of GPUs, and white-box access. This talk will shatter this misconception forever. In this talk, we introduce a new variant of Promptware called Targeted Promptware Attacks. In these attacks, an attacker invites a victim to a Google Calendar meeting whose subject contains an indirect prompt injection. By doing so, the attacker hijacks the application context, invokes its integrated agents, and exploits their permission to perform malicious activities. We demonstrate 15 different exploitations of agent hijacking targeting the three most widely used Gemini for Workspace assistants: the web interface (www.gemini.google.com), the mobile application (Gemini for Mobile), and Google Assistant (which is powered by Gemini), which runs with OS permissions on Android devices. We show that by sending a user an invitation for a meeting (or an email or sharing a Google Doc), attackers could hijack Gemini's agents and exploit their tools to: Generate toxic content, perform spamming and phishing, delete a victim's calendar events, remotely control a victim's home appliances (connected windows, boiler, and lights), video stream a victim via Zoom, exfiltrate emails and calendar events, geolocate a victim, and launch a worm that tarets Gemini for Workspace clients. Our demonstrations show that Promptware is capable to perform (1) inter-agent lateral movement (triggering malicious activity between different Gemini agents), and (2) inter-device lateral movement, escaping the boundaries of Gemini and leveraging applications installed on a victim's smartphone to perform malicious activities with physical outcomes (e.g., activating the boiler and lights or opening a window in a victim's apartment). Finally, we assess the risk posed to end users using a dedicated threat analysis and risk assessment framework we developed. Our findings indicate that 73% of the identified risks are classified as high-critical, requiring the deployment of immediate mitigations. By: Or Yair | Security Researcher, SafeBreach Stav Cohen | PhD Student, Technion Ben Nassi | Ramat Gan, Technion https://ift.tt/YHvcmWX

source https://www.youtube.com/watch?v=KVUniT5H4Rk

Saturday, 23 May 2026

SecTor 2025 | Rethinking Phishing Detection in the Age of AI and Disinformation

Phishing is no longer just a technical problem; it is a cognitive one. Classifiers that rely on dynamic features such as sentiment, urgency, or message length are highly vulnerable to concept drift. Attackers adapt quickly, and with the help of large language models, they can now craft highly convincing phishing messages that evade traditional detection systems. Many of the signals we once relied on are no longer dependable because they also appear in legitimate communication. In response, there is a growing shift toward static features, especially URL-based analysis. Elements like domain entropy or subdomain structure are harder for attackers to modify without breaking the link and tend to remain stable over time. However, static models often lack transparency. Why was the link flagged? What pattern triggered the detection? Without clear explanations, users are left in the dark and trust in the system erodes. This Briefing explores how to move beyond surface-level detection. Drawing on recent research in adversarial machine learning, social engineering modeling, and cognitive psychology, we will present a classifier design that integrates manipulation scoring, concept drift monitoring, and explainability from the ground up. Attendees will gain insight into how phishing tactics evolve and how to design defenses that adapt to them while staying aligned with human behavior. By: Michel Hebert | Industry Research, Practice Lead, Info-Tech Research Group https://ift.tt/eDCdFOz

source https://www.youtube.com/watch?v=nAbyzHJivfo

SecTor 2025 | Hackers Dropping Mid-Heist Selfies

Information stealer malware has become one of the most prolific and damaging threats in today's cybercrime landscape, siphoning off everything from browser-stored credentials to session tokens and other system secrets. In 2024 alone, we witnessed more than 30 million stealer logs traded on underground markets. Yet buried within these logs is an underexplored goldmine: screenshots captured at the precise moment of infection. Think of it as a thief taking a selfie mid-heist, unexpected but convenient for us, right? Surprisingly, these crime scene snapshots have been largely overlooked until now. Leveraging infostealer infection screenshots and Large Language Models (LLMs), we propose a new approach to identify infection vectors, extract indicators of compromise (IoCs) and track infostealer campaigns at scale. Our approach found several hundred potential IoCs in the form of URLs leading to the download of the malware-laden payload. By applying this method to "fresh" stealer logs, we can detect and mitigate infection vectors almost instantaneously, reducing further infections. Our analysis uncovered distribution strategies, lure themes and social engineering techniques used by threat actors in successful infection campaigns. We will break down three distinct campaigns to illustrate the tactics they use to deliver malware and deceive victims: cracked versions of popular software, ads pointing to popular software and free AI image generators. This presentation, with its live demonstration, shows how LLMs can be harnessed to extract IoCs at scale while addressing the challenges and costs of implementation. Attendees will walk away with a deeper understanding of the modern infostealer ecosystem and will want to apply LLM to other illicit artifacts to extract actionable intelligence. By: Estelle Ruellan | Threat Intelligence Researcher, Flare Olivier Bilodeau | Principal Security Researcher, Flare https://ift.tt/ebiEhyQ

source https://www.youtube.com/watch?v=5nCXriBDwk8

Friday, 22 May 2026

SecTor 2025 | 5 Years of Attack Surface Analysis in Canada

Since 2019, the Hackfest community has led an ongoing initiative to analyze the public-facing attack surface of provincial governments in Quebec and Ontario, as well as federal and municipal systems. The objective: to objectively measure and report on the cybersecurity posture of our governments. In this session, we will present the findings of our fourth large-scale assessment and offer a candid discussion on the current state of government cybersecurity in Canada. Our analysis includes attack surface metrics, exposed legacy systems, insecure web applications, and the accessibility of critical infrastructure from the public internet. We will highlight basic security failures such as thousands of misconfigured HTTPS sites, 20-year-old legacy systems still in use, websites vulnerable to fundamental attacks like XSS and SQL injection, and more. These findings paint a clear picture: cybersecurity remains a low priority in the protection of citizens' data and critical infrastructures across multiple levels of government. Join us for an evidence-based dive into what the data reveals — and where we must go from here. By: Patrick Roy | Information Security Advisor, CISSP, Patrick Mathieu | Owner, Hackfest.ca & Product Security Leader, Hackfest Capt(ret) Steve Waterhouse | CEO and Founder, INFOSECSW https://ift.tt/EtdoKcy

source https://www.youtube.com/watch?v=XJsgBd3Hbes

SecTor 2025 | Exploiting Multi Agent Systems

Large language model agents don't just talk, they collaborate, delegate and act. That orchestration layer opens a new attack surface: multi agent prompt injection. In this fast paced SecTor session you'll watch a red team walkthrough that starts with harvesting hidden system prompts, then escalates through mirrored pattern injections that subvert individual agents, corrupt the planner, and co opt tool calls. We'll dissect both direct and "second hand" (indirect) attacks that propagate across agent boundaries, chaining seemingly innocuous instructions into a full mission level takeover. Defenders aren't powerless, but every control has a price. We map mitigations—from agent scoped content sanitization to policy enforced orchestrators and high fidelity telemetry—against their engineering effort and real world efficacy. You'll leave with a pragmatic checklist for building observability without violating user privacy, plus concrete design patterns to harden your own LLM ecosystems before attackers weaponize them for you. By: Jeremy Richards | AI Red Team, ServiceNow https://ift.tt/UxT0IGy

source https://www.youtube.com/watch?v=D4a8Udi2j-M

What It’s Like to Speak at Black Hat | Yaara Shriki, Threat Researcher at Wiz

Yaara Shriki, Threat Researcher at Wiz, shares her experience speaking at Black Hat, from pre-talk nerves to the excitement of presenting on one of cybersecurity’s biggest stages. #BlackHatStories #BHEU #BlackHat #cybersecurity

source https://www.youtube.com/shorts/YWc1uwIizUk

Thursday, 21 May 2026

SecTor 2025 | Signature of Destruction: Outlook RCE Strikes Again

What if your Outlook signature could compromise your system? Following up on last year's RCE Chaos, where we achieved remote code execution through the injection of malicious forms by abusing Exchange Outlook synchronization protocols, we're back with a new class of Outlook remote code execution vulnerabilities—this time, abusing signature roaming between cloud and desktop clients. One compromised email account is all it takes to inject malicious signatures that auto-sync and execute on victims' machines—zero clicks, zero prompts. We'll unveil three new RCE CVEs: CVE-2025-21357 & CVE-2025-47171 extending last year's form injection abuse and CVE-2025-47176 weaponizing the recently stabilized Outlook Roaming Signatures feature. Expect live demos and a look into an overlooked attack surface that's been quietly sitting in your inbox for over a year. We'll also show how Exchange helps deliver the final payload—and why traditional detections will miss it. This one's for reversers, red teamers, and defenders who thought they knew Outlook. You don't. By: Michael Gorelik | Chief Technology Officer, Morphisec Arnold Osipov | Lead Researcher, Morphisec https://ift.tt/6jotvV2

source https://www.youtube.com/watch?v=d0TfvpV1u-E

Tuesday, 19 May 2026

SecTor 2025 | How a Mobile Drivers License App Became a Boarding Pass

It starts with a client and a late-night idea on a napkin. It turns into a SOC2-certified product trusted by Police, Government Agencies and the TSA. You'll hear how we partnered with an ambitious state to augment their physical Driver's License with a new Digital ID built from the ground up. One that lets you access public services, legally buy age-restricted items and even board planes with just your phone. In this 45-minute Briefing, you will walk away with: - A blueprint for turning any 'idea on a napkin' into a certification-ready release. - A pipeline template that performs security testing, triage, and pushes defects back to developer queues to ensure you don't go backwards. - A threat-model approach that you can copy and use to quickly gain confidence with teams and customers. - How to measure risk and establish an executive risk scorecard that gets to the finish line. - Lessons learned from breaking and fixing facial-recognition, blockchain/SSI claims, and how to attack 3rd party verification apps. Why does this matter? Unlike typical apps, failing here means anyone can forge an identity. With no mature framework to follow, we synchronised compliance, DevSecOps, and user-privacy across four orgs, three audit firms, and one very impatient legislature. Key stories we'll unpack: - What's going on with your data, and how an identity app works. - Building a security-as-code pipeline that ships and keeps auditors happy. - Breaking liveness detection and facial recognition implementations. - When the ground shifts and new interoperability standards cause fraudulent verifications. - How-to on achieving SOC2 certifications, encompassing everything from the mobile app to manufacturing plants. - How to prove security to clients: threat modeling, pen tests, and 3rd party assurance. - Integrating blockchain and self-sovereign identity. - Successfully launching the final product with TSA approval for boarding flights. If you've ever wondered how to 'secure it' when there are no roadmaps, no precedents, and the stakes are literally sky-high, this talk is for you. This session isn't just a story—it's a playbook for navigating the unknown, where security isn't just a requirement; it's the product. By: John Duffy | Director - ID/Payment Security, Canadian Bank Note Company https://ift.tt/xMLeDCf

source https://www.youtube.com/watch?v=1yK7ODoqyiE

SecTor 2025 | When Hackers Meet Burglars

Smart buildings blur the line between IT and physical infrastructure, connecting HVAC, lighting, access control, elevators, cameras, and more under a single "brain" called a Building Automation System (BAS). Drawing on real engagements against Canadian smart building deployments, this talk guides you through a red teaming exercise that uncovers both digital and physical attack paths. You'll see how attackers gather intel, probe entry points, exploit insecure IoT protocols, and seize control of critical systems. We'll examine live scans, protocol abuse and real world video demos. Finally, we will flip to defense mode, offering a practical blue team playbook. Attendees will leave with an actionable framework rooted in Canadian field experience, for both offensive engagements and OT focused defenses. By: Amir Hosseinpour | Offensive Security Specialist, White Tuque https://ift.tt/4hF7JVx

source https://www.youtube.com/watch?v=qNyJlfq-1RY

Black Hat Stories Episode 4 | Yaara Shriki, Threat Researcher at Wiz

In this episode, Yaara Shriki shares why Black Hat is an inspiring and educational experience for anyone in the field or just curious, offering a closer look at the people and innovations driving cybersecurity forward. #BlackHatStories #BHEU #BlackHat #cybersecurity

source https://www.youtube.com/shorts/n20_ZUBcoIM

Monday, 18 May 2026

Black Hat Stories | Yaara Shriki, Threat Researcher at Wiz

In this episode, Yaara Shriki, Threat Researcher at Wiz, shares her experience speaking at Black Hat Briefings for the first time, from pre-talk nerves to the excitement of presenting at one of the world’s leading cybersecurity events. She reflects on what makes Black Hat special, where professionals come together to learn from industry experts, connect with peers, and discover the latest ideas and innovations shaping cybersecurity. More than just a conference, Black Hat is an inspiring and educational experience for anyone in the field, or simply curious about it, offering a closer look at the people and advancements driving the industry forward. 🔗 Visit our site: https://blackhat.com/ 📧 Subscribe to our free newsletter: https://ift.tt/plwTdCL #BlackHatStories #BHEU #BlackHat #cybersecurity

source https://www.youtube.com/watch?v=5gI5EJ2IyGs