Sublime news

Everything old is new again: 3 trends from Black Hat USA, BSides LV, and DEF CON 33

August 18, 2025

Everything old is new again: 3 trends from Black Hat USA, BSides LV, and DEF CON 33

Sublime CISO, Andrew Becherer looks back at trends from the recent conferences in Las Vegas

Ready to see Sublime 
in action
Get a demo
Authors
Andrew Becherer
Andrew Becherer
CISO

As always, the Las Vegas cybersecurity triple-header did not disappoint. I saw old friends, learned about new trends, and (yet again) walked away with more swag than I need after this many years in the industry. While BSides LV, Black Hat USA, and DEF CON are all different events, there were themes that kept popping up. Themes that weren’t new in nature, even if they were new in iteration. Let’s take a look at a few of those trends to see how the more things change the more they stay the same.

The human element is hot again

Exploitation has always balanced between human and technical elements. What was the attacker’s path of least resistance? This year showed a decisive shift toward exploiting the human side. Attackers are bypassing technical defenses like phishing-resistant MFA by targeting the human recovery processes. This is not a new concept. The difference today is the industrialization of this process through AI.

The notorious threat group Scattered Spider served as a primary case study for this trend. They use vishing and sophisticated impersonation techniques to convince IT help desks to reset a target's credentials. Deepfake-as-a-Service (DaaS) has turned voice cloning into a commodity. Any criminal can rent AI tools to generate a hyper-realistic voice of a CEO for a modest cost. This makes sophisticated attacks scalable and accessible to a wider range of adversaries. The result is that the human-gated exception process has become a primary attack surface. The assumption that a trained human can spot a fraudulent request is now fatally flawed in an era of AI-generated deception.

The industry is responding with a shift in focus from training users to hardening processes. Security leaders must invest in modern verification technologies that are resilient to social engineering attacks.

Automation progresses from scripts to strategy (on both sides) and creates new risk

The Vegas conferences showcased a new arms race in which the weapons on both sides mimic human actors. The dominant theme was the rapid deployment of so called agents. On defense vendors are developing agentic AI for alert triage, fixing code, and simulating attacks. On the offensive side researchers demonstrated AI agents that can autonomously handle entire phishing campaigns and create metamorphic malware to evade detection.

For a security veteran this represents a major evolution from past automation efforts. Hackers in the 1990s used Perl scripts to automate network scans. In the 2000s frameworks like Metasploit streamlined exploitation. Agentic AI is different. The fundamental shift is from automating tasks to automating strategy. Agentic malware is not just executing pre-written code. This AI is observing its environment, forming a hypothesis about weaknesses, and writing exploits on the fly.

This much is obvious… it is not obvious that the new defense creates a critical new vulnerability: the agent itself. Since these agents are being granted privileged access to internal tools and sensitive data attackers will target and hijack them. Indirect prompt injection (a malicious instruction hidden within a document or email) can manipulate agents into becoming insider threats. I’m afraid to report that we have witnessed the birth of a new analyst category. Please welcome "Agent Security Posture Management.” We’ve now entered the stage of treating every AI agent as a privileged non-human identity subject to continuous monitoring and governance.

Stagnation, burnout, and blame

Beyond the technology a sense of dissatisfaction was present in Las Vegas. Professional burnout is widespread along with a feeling that defensive advice has grown stale. Mikko Hypponen, a respected veteran and Black Hat 2025 keynote speaker, highlighted the paradox of success in cybersecurity. Effective security leads to a perceived low risk which in turn leads to budget cuts and a boom-bust cycle of investment. He also directly challenged the practice of blaming users for clicking phishing links arguing that it is a failure of security systems to have allowed the malicious email to reach the user's inbox in the first place.

Veterans feel that while burnout has always been an issue the current sentiment is different and more systemic. The industry's defensive playbooks are seen as stagnant and official guidance from government agencies fails to keep pace with innovation. The industry's immune response to new threats has the perception of failing.

While there is no simple solution to address what is a cultural crisis in cybersecurity, it’s something that all security leaders should be cognizant of. I, for one, would be eager to attend a culture success talk in 2026.

See you in 2026

The conferences may have just ended, but I’m already thinking about next year. Wondering what the next big breakthrough will be. Wondering what the next big security concerns will be. Wondering how I’m going to attend to every talk I want to see without bending spacetime.

If you’re in Vegas next year, or at any of the many security events we attend, swing by the Sublime booth and see what we’ve been working on. In the meantime, check out this short recap of Sublime’s Black Hat experience.

Heading

About the authors

Andrew Becherer
Andrew Becherer
CISO

Andrew Becherer is the CISO at Sublime Security. He is best known for building Datadog's security organization from its first hire through a successful IPO. A respected speaker at conferences like Black Hat and RSA Conference, he previously co-founded an AI security startup and advises emerging security leaders.

Get the latest

Sublime releases, detections, blogs, events, and more directly to your inbox.

check
Thank you!

Thank you for reaching out.  A team member will get back to you shortly.

Oops! Something went wrong while submitting the form.

Related Articles

December 29, 2025
5 email security trends from 2025
Sublime news

5 email security trends from 2025

Brian BaskinPerson
Brian Baskin
Threat Research
Person
December 18, 2025
How to build fast similarity search for email from the ground up
Sublime news

How to build fast similarity search for email from the ground up

Ross WolfPerson
Ross Wolf
Engineering
Person
December 16, 2025
Evolving our brand as Sublime grows
Sublime news

Evolving our brand as Sublime grows

Omar JalalzadaPerson
Omar Jalalzada
Head of Design
Kirk JohnsonPerson
Kirk Johnson
Creative Director

Frequently asked questions

What is email security?
Email security refers to protective measures that prevent unauthorized access to email accounts and protect against threats like phishing, malware, and data breaches. Modern email security like Sublime use AI-powered technology to detect and block sophisticated attacks while providing visibility and control over your email environment.

Now is the time.

See how Sublime delivers autonomous protection by default, with control on demand.

BG Pattern