Cisco Talos Blog: Cisco Talos at Black Hat 2025: Briefings, booth talks and what to expect

Source URL: https://blog.talosintelligence.com/cisco-talos-at-black-hat-2025-briefings-booth-talks-and-what-to-expect/
Source: Cisco Talos Blog
Title: Cisco Talos at Black Hat 2025: Briefings, booth talks and what to expect

Feedly Summary: Cisco Talos is back at Black Hat with new research, threat detection overviews and opportunities to connect with our team. Whether you’re interested in what we’re seeing in the threat landscape, detection engineering or real-world incident response, here’s where and how to find us.

AI Summary and Description: Yes

Summary: The text provides details about Cisco Talos’s participation at the Black Hat conference, focusing on their research and discussions regarding threat detection, including insights on generative AI and security vulnerabilities. It highlights the importance of understanding the evolving threat landscape and the implications of AI in cybersecurity.

Detailed Description:
The content relates to several relevant categories, including AI Security and Cloud Computing Security, particularly due to Cisco Talos’s discussions on generative AI and its implications within the cybersecurity landscape. Here’s a detailed breakdown:

– **Cisco Talos at Black Hat:**
– Cisco Talos is actively participating in the Black Hat conference, showcasing their research and providing insights into the current threat landscape.

– **Key Sessions and Talks:**
– **Talos Vulnerability Discovery Year in Review:** A review of vulnerabilities identified over the past year.
– **How to: Threat Intel:** Discussions on building effective threat intelligence strategies.
– **Full Metal SnortML:** Focus on enhancing firewall capabilities using machine learning and FPGAs.

– **Generative AI Insight:**
– A sponsored session titled “Generative AI as a Lure, Tool and Weapon” explores how generative AI transforms attacker methodologies, emphasizing how malicious actors might misuse AI technologies.
– It will discuss defensive strategies for organizations looking to adopt generative AI safely.

– **Incident Response Development:**
– A collaborative problem-solving session, utilizing a card game (“Backdoors & Breaches”) to simulate real incident response scenarios. This approach helps participants understand the application of threat intelligence in real-time situations.

– **Technical Vulnerabilities Discussion:**
– Philippe Laulheret will introduce “ReVault,” detailing a vulnerability in an embedded security chip that allows exploitation by low-privilege users for sensitive data extraction and system compromise.

– **Collaboration and Resource Sharing:**
– Mention of a collaborative launch at the Splunk booth, which offers a new resource (“Threat Hunters Cookbook”) aimed at refining threat hunting strategies through modeling and machine learning.

Overall, the content emphasizes the critical intersection of AI, cybersecurity research, and threat intelligence, providing professionals with significant insights into how emerging technologies and trends can shape security measures and incident responses.