Close Menu
TechBrunchTechBrunch
  • Home
  • AI
  • Apps
  • Crypto
  • Security
  • Startups
  • TechCrunch
  • Venture

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

A sign of “t”? It's a lot of dollars, nvidia

August 29, 2025

Mississippi's Age Guarantee Act Tests Decentralized Social Networks

August 28, 2025

Threads test how to share long format text on the platform

August 28, 2025
Facebook X (Twitter) Instagram
TechBrunchTechBrunch
  • Home
  • AI

    OpenAI seeks to extend human lifespans with the help of longevity startups

    January 17, 2025

    Farewell to the $200 million woolly mammoth and TikTok

    January 17, 2025

    Nord Security founder launches Nexos.ai to help enterprises move AI projects from pilot to production

    January 17, 2025

    Data proves it remains difficult for startups to raise capital, even though VCs invested $75 billion in the fourth quarter

    January 16, 2025

    Apple suspends AI notification summaries for news after generating false alerts

    January 16, 2025
  • Apps

    Mississippi's Age Guarantee Act Tests Decentralized Social Networks

    August 28, 2025

    Threads test how to share long format text on the platform

    August 28, 2025

    New AI features in WhatsApp allow you to rearrange and adjust the tone of your message

    August 27, 2025

    Google and Grok are catching up to ChatGpt, says the latest AI report from A16Z

    August 27, 2025

    Google Vids adds AI avatars to the video editor and launches the consumer version

    August 27, 2025
  • Crypto

    Coinbase CEO explains why he fired an engineer who didn't try AI right away

    August 22, 2025

    Your next customer is destroying the 2025 Expo floor

    August 19, 2025

    Crypto Company Gemini File for Winklevoss Twins IPO

    August 16, 2025

    North Korean spies pretending to be remote workers have invaded hundreds of businesses, CloudStrike says

    August 4, 2025

    Telegram's Crypto Wallet will be released in the US

    July 22, 2025
  • Security

    According to Transunion, hackers say they stole the personal information of 4.4 million customers

    August 28, 2025

    The FBI says that China's salt typhoon has hacked at least 200 US companies

    August 27, 2025

    US sanctions fraud network used by North Korea's “remote IT workers” to steal money for work

    August 27, 2025

    Doge uploads live copies of Social Security databases to “vulnerable” cloud servers, whistleblower says

    August 26, 2025

    Security researchers map hundreds of Teslamate servers spilling Tesla vehicle data

    August 26, 2025
  • Startups

    7 days left: Founders and VCs save over $300 on all stage passes

    March 24, 2025

    AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

    March 24, 2025

    20 Hottest Open Source Startups of 2024

    March 22, 2025

    Andrill may build a weapons factory in the UK

    March 21, 2025

    Startup Weekly: Wiz bets paid off at M&A Rich Week

    March 21, 2025
  • TechCrunch

    OpenSea takes a long-term view with a focus on UX despite NFT sales remaining low

    February 8, 2024

    AI will save software companies' growth dreams

    February 8, 2024

    B2B and B2C are not about who buys, but how you sell

    February 5, 2024

    It's time for venture capital to break away from fast fashion

    February 3, 2024

    a16z's Chris Dixon believes it's time to focus on blockchain use cases rather than speculation

    February 2, 2024
  • Venture

    A sign of “t”? It's a lot of dollars, nvidia

    August 29, 2025

    Do you hire AI, or are you a human being? Next frontier for Startup Ops in 2025

    August 28, 2025

    From streaming to healthcare to AI, Mark Cuba reveals his “formula of confusion”

    August 27, 2025

    Uncork Capital in a 21-year venture cycle – and what's the difference between this?

    August 26, 2025

    A16z spends $1.49 million on lobbying in Washington, with rivals mostly going outside

    August 25, 2025
TechBrunchTechBrunch

Best Hacking and Security Research from Black Hat and Def Con 2024

TechBrunchBy TechBrunchAugust 12, 20244 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Telegram Email


This week, thousands of hackers, researchers, and security professionals gathered in Las Vegas for the security conferences Black Hat and Def Con, annual pilgrimages aimed at sharing the latest research, hacks, and knowledge across the security community. TechCrunch was on-site to report on the back-to-back shows and bring you some of the latest research.

CrowdStrike got the attention and the “big fail” award it didn't want, but the company addressed the scandal and admitted it screwed up just weeks after releasing a buggy software update that caused a global IT outage. Hackers and security researchers may not forget easily, but they seem mostly willing to forgive.

As another round of Black Hat and Def Con conferences comes to an end, we're looking back at some of the show's highlights and best research that you may have missed.

Hacking Ecovac robots to spy on their owners over the internet

Security researchers revealed in a talk at Def Con that it's possible to take over Ecovacs home vacuums and lawnmower robots by sending malicious Bluetooth signals to vulnerable nearby robots. From there, the on-board microphones and cameras can be remotely activated over the internet, allowing the attacker to spy on anyone within the robot's ears and camera's field of view.

Unfortunately, Ecovacs did not respond to the researchers or to TechCrunch's request for comment, and there is no evidence that the bug has been fixed. The good news is that we still have some great screenshots of the dog captured by the hacked Ecovacs robot's onboard camera.

A dog seen through a hacked Ecovax device.A dog seen through a hacked Ecovacs device. Image courtesy of Dennis Guise and Braelyn / Courtesy. Image courtesy of Dennis Guise and Braelyn

The long-term battle to break into LockBit ransomware and expose the identity of its masterminds

A wild chase between security researcher John DiMaggio and the mastermind behind the LockBit ransomware and extortion ring, known only as LockBitSupp, led DiMaggio into a maze of open-source intelligence gathering to discover the notorious hacker's actual identity.

In a series of highly detailed diaries, DiMaggio was driven by an anonymous tip about an email address allegedly used by RockBitsap and a deep-seated desire to deliver justice for the gang's victims, and he eventually identified the man — and he did so before federal agents publicly named the hacker as Russian national Dmitry Khoroshev. At DEFCON, DiMaggio told his story from his perspective for the first time in front of a packed audience.

Hackers develop laser microphone that can listen to keyboard keystrokes

Famed hacker Sammy Kamkar has developed a new technique for surreptitiously identifying taps on a laptop keyboard by shining an invisible laser through a nearby window. Demonstrated at Def Con and explained by Wired, the technique “uses the subtle acoustic sounds produced by tapping various keys on a computer,” and works as long as the hacker can maintain a line of sight from the laser to the target laptop itself.

Prompt injection can easily trick Microsoft Copilot

A new prompt injection technique developed by Zenity has been shown to allow for the extraction of sensitive information from Copilot, Microsoft's AI-powered chatbot companion. Zenity Chief Technology Officer Michael Bargury demonstrated the exploit at the Black Hat conference, showing how to manipulate Copilot AI prompts to change their output.

In one example, Burglee tweeted, he showed how a malicious actor could enter HTML code containing a bank account number they control and trick CoPilot into returning that bank account number in a response to a consumer. This can be used to trick unsuspecting people into sending money to the wrong place, a common business fraud technique.

Sending an email caused an RCE in M365 Copilot

~RCE means complete remote control
The action – Search for sensitive content (SharePoint, Mail, Calendar, Teams), run plugins
And output – bypassing DLP controls, manipulating referrals, social engineering users… pic.twitter.com/r1yMRLXKAG

— mbg @ Defcon (@mbrg0) August 8, 2024

Ransomware leak site's ransomware flaw saves six businesses from hefty ransoms

Security researcher Vangelis Stikas set out to investigate dozens of ransomware gangs and identify potential holes in their public infrastructure, such as extortion leak sites. In his Black Hat talk, Stikas described how he discovered vulnerabilities in the web infrastructure of three ransomware gangs (Mallox, BlackCat, and Everest), obtained decryption keys for two of them before the gangs deployed their ransomware, and notified four others, saving a total of six gangs from paying high ransoms.

While ransomware has not improved, the tactics used by law enforcement against gangs who encrypt and blackmail their victims are becoming more innovative and interesting, and this may be an approach to consider against gangs in the future.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

According to Transunion, hackers say they stole the personal information of 4.4 million customers

August 28, 2025

The FBI says that China's salt typhoon has hacked at least 200 US companies

August 27, 2025

US sanctions fraud network used by North Korea's “remote IT workers” to steal money for work

August 27, 2025

Doge uploads live copies of Social Security databases to “vulnerable” cloud servers, whistleblower says

August 26, 2025

Security researchers map hundreds of Teslamate servers spilling Tesla vehicle data

August 26, 2025

Thetruthspy phone spyware new security flaw puts victims at risk

August 25, 2025

Leave A Reply Cancel Reply

Top Reviews
Editors Picks

7 days left: Founders and VCs save over $300 on all stage passes

March 24, 2025

AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

March 24, 2025

20 Hottest Open Source Startups of 2024

March 22, 2025

Andrill may build a weapons factory in the UK

March 21, 2025
About Us
About Us

Welcome to Tech Brunch, your go-to destination for cutting-edge insights, news, and analysis in the fields of Artificial Intelligence (AI), Cryptocurrency, Technology, and Startups. At Tech Brunch, we are passionate about exploring the latest trends, innovations, and developments shaping the future of these dynamic industries.

Our Picks

A sign of “t”? It's a lot of dollars, nvidia

August 29, 2025

Mississippi's Age Guarantee Act Tests Decentralized Social Networks

August 28, 2025

Threads test how to share long format text on the platform

August 28, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

© 2025 TechBrunch. Designed by TechBrunch.
  • Home
  • About Tech Brunch
  • Advertise with Tech Brunch
  • Contact us
  • DMCA Notice
  • Privacy Policy
  • Terms of Use

Type above and press Enter to search. Press Esc to cancel.