Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    `Host` header injection

    April 12, 2026

    Incident: Home Affairs, Administrative Appeals Tribunal websites hit by cyber attacks | SBS News

    April 12, 2026

    Dispatch from the Desert: VulnCheck at BlackHat, Security Wasteland, and DEFCON | Blog

    April 12, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»Dispatch from the Desert: VulnCheck at BlackHat, Security Wasteland, and DEFCON | Blog
    News

    Dispatch from the Desert: VulnCheck at BlackHat, Security Wasteland, and DEFCON | Blog

    adminBy adminApril 12, 2026No Comments4 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Defcon 33 Human Badge

    This year marked my 10th anniversary of parking myself in Vegas for a week of hacker summer camp, running into friends and “hacker family,” soaking up the latest research, and getting the update from colleagues on what they are building.

    From a VulnCheck perspective, here’s what stood out over the week and a few predictions about where we’re headed as an industry in the latter half of 2025.

    Year two of our off-strip event, Security Wasteland, was equal parts playground and laid-back lounge, hosted at the Keep Memory Alive Event Center — a Frank Gehry fever dream of a building. We wanted a space that could fuel the party energy and spark meaningful connections.

    • Hidden conversation nooks, rock music, and a chance to re-experience vinyl (Purple Rain, Led Zeppelin, Nirvana albums as swag).
    • Conversations about real exploitation data, swapping TTPs over drinks, and sharing stories you won’t find in any vendor deck.

    We even had a custom latte art printer, which included a camera to put your face on the latte? Wild.

    They put my face on a latte!

    No badge scans, no awkward elevator pitches… just hackers, researchers, and defenders trading ideas. Judging by the late-night conversations, we nailed our goal.

    Our booth was where real-world exploitation intel met the chaos of the business hall.
    Even though this year felt lighter on foot traffic, it worked in our favor, providing more time for long, honest conversations about the problems people are facing and the kind of intel they actually need. Special shoutout to the healthcare IT pro who gave me a deep dive into his toolset and threat model.

    • Live walk-throughs of active exploitation evidence.
    • Deep chats with red-teamers, threat intel analysts, and vulnerability managers about what really matters in vuln prioritization.

    We didn’t just hand out swag (though, yes, the tactical bracelets and water bottles disappeared fast), we traded knowledge. We even got to see the NOC’s network threat hunt map in action.

    Network Threat Hunt Map from the BlackHat NOC

    The AI booths this year were impossible to miss, but between the hype cycles were some solid working prototypes:

    • AI SOCs – live demos of AI-assisted SOCs handling triage, threat hunting, and automated incident playbooks. Makes tons of sense to me as a former SOC manager as many events in an environment are repeatable patterns that once your analysts understand, should be automated out of the ecosystem.
    • AI Pentesting – chaining LLMs with exploit frameworks to map, probe, and even exploit targets with minimal human input. Exciting and terrifying in equal measure due to the way this could increase speed of exploitation across the board.
    • Purpose-built players like XBOW, who I didn’t realize was a whole entire company instead of just an AI hacking bot, showing how specialization lets you uncover huge vulnerability volumes in record time.

    The takeaway from my perspective? AI in cybersecurity is making the move to displace the jobs that rely on repeatable, pattern-based circumstances — pentesting first passes, phishing responses, and report writing.

    When Black Hat shut down, a few of us stayed maybe a little too long, but not without the utmost excitement for what we encountered.

    We made the rounds at the Defcon Villages including Aviation, Space, Hardware Hacking, ICS, and Blue Team Village, where defenders shared in depth detections, playbooks, and stories from the trenches. Some of the best takeaways came from hallway conversations, where the skillsets range from seasoned pro to right out of coding bootcamp.

    The highlight here for me? The talks with the juniors in our industry who look at emerging threats in an entirely different way because they’re not battle hardened like the rest of us. The talks with every person who tore apart a random piece of equipment they purchased off eBay to understand deeper how it works and then manipulate its abilities.

    Events like this keep us honest. They remind us why we do this work:

    • To stay involved in the community that spots trends before they hit the news.
    • To test our ideas against the toughest critics: the hackers themselves.
    • To keep VulnCheck rooted in hacker-informed exploit intelligence defenders can act on immediately.

    To everyone who came to Security Wasteland, stopped by our booth, or swapped stories over vendor party canapés or drinks… thank you. Let’s keep the conversations going.

    See you next year, Vegas!


    Interested to talk with us out in the wild? Catch us at our upcoming events.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticlePre-authentication Denial of Service attack in OpenSSH – CVE-2025-26466
    Next Article Incident: Home Affairs, Administrative Appeals Tribunal websites hit by cyber attacks | SBS News
    admin
    • Website

    Related Posts

    News

    When attackers already have the keys, MFA is just another door to open

    April 12, 2026
    News

    Top External Network Risks And How to Fix Them

    April 12, 2026
    News

    Smart Slider updates hijacked to push malicious WordPress, Joomla versions

    April 12, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Our Picks

    `Host` header injection

    April 12, 2026

    Incident: Home Affairs, Administrative Appeals Tribunal websites hit by cyber attacks | SBS News

    April 12, 2026

    Dispatch from the Desert: VulnCheck at BlackHat, Security Wasteland, and DEFCON | Blog

    April 12, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.