If you look back at the threat landscape of 2025, its roots are deeply embedded in the presentations given in Las Vegas during the summer of 2015. There was one story that escaped the confines of the Mandalay Bay convention center and exploded across mainstream news: The remote hack of a Jeep Cherokee.

Unlike the flashy car hack or the mobile vulnerability, Sauron was about silence. The presentation detailed a sophisticated modular backdoor designed to live off the land—using legitimate system administration tools to hide its presence. It specifically targeted government institutions, telecommunications companies, and financial entities in Russia, Iran, and Europe.

In the ever-evolving lexicon of cybersecurity, certain events serve as defining pivot points. While the Black Hat USA conference has hosted countless critical disclosures over its decades-long history, the BlackHat.2015 event stands out as a watershed moment. It was the year where abstract theory collided with visceral reality. Researchers didn't just talk about vulnerabilities; they demonstrated how to kill a speeding car’s engine remotely, how to take down a smart grid, and how to compromise a hospital’s drug infusion pump.

For the audience watching in 2015, the message was terrifyingly clear: The "Internet of Things" was not a convenience feature; it was a blast radius. While the car hack grabbed the headlines, a silent killer was unveiled at the same conference. Researchers from Zimperium (Joshua Drake) presented "Stagefright: Scary Code in the Heart of Android."

We learned that an entertainment system could wreck a car. We learned that a text message could own your phone. And we learned that the only thing standing between chaos and order is the quality of the firmware update pipeline.

Join Today!

Click here to replay the video

Click Here for Purchase Options
From the NightMoves, XRCO, and AVN Halls of Fame, directly to you! Welcome to my official personal website.

Blackhat.2015 -

If you look back at the threat landscape of 2025, its roots are deeply embedded in the presentations given in Las Vegas during the summer of 2015. There was one story that escaped the confines of the Mandalay Bay convention center and exploded across mainstream news: The remote hack of a Jeep Cherokee.

Unlike the flashy car hack or the mobile vulnerability, Sauron was about silence. The presentation detailed a sophisticated modular backdoor designed to live off the land—using legitimate system administration tools to hide its presence. It specifically targeted government institutions, telecommunications companies, and financial entities in Russia, Iran, and Europe. blackhat.2015

In the ever-evolving lexicon of cybersecurity, certain events serve as defining pivot points. While the Black Hat USA conference has hosted countless critical disclosures over its decades-long history, the BlackHat.2015 event stands out as a watershed moment. It was the year where abstract theory collided with visceral reality. Researchers didn't just talk about vulnerabilities; they demonstrated how to kill a speeding car’s engine remotely, how to take down a smart grid, and how to compromise a hospital’s drug infusion pump. If you look back at the threat landscape

For the audience watching in 2015, the message was terrifyingly clear: The "Internet of Things" was not a convenience feature; it was a blast radius. While the car hack grabbed the headlines, a silent killer was unveiled at the same conference. Researchers from Zimperium (Joshua Drake) presented "Stagefright: Scary Code in the Heart of Android." While the Black Hat USA conference has hosted

We learned that an entertainment system could wreck a car. We learned that a text message could own your phone. And we learned that the only thing standing between chaos and order is the quality of the firmware update pipeline.