Black Hat Asia 2026将揭晓有关人工智能威胁与供应链漏洞的突破性研究成果
2026-02-27
电车资讯
<h3 style="text-align:center"><span style="font-size:14px"><span style="color:#606060"><span style="font-family:"Open Sans",sans-serif"><em>在地区投资额创历史新高的背景下,活动旨在应对不断加剧的网络安全风险</em></span></span></span></h3>
<div class="storycontent" style="margin-top:10px; padding-right:10px; text-align:start">
<p><span style="font-size:12px"><span style="color:#222222"><span style="font-family:Arial"><span style="color:#949494"> </span><span style="color:#464646"><span style="font-size:14px">作为网络安全行业历史最悠久、内容最深入的安全活动系列,</span></span><a href="https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fblackhat.com%2F&esheet=54432567&newsitemid=20260224443946&lan=zh-CN&anchor=Black+Hat&index=1&md5=51850f8d877b5d85082346c9eb69103f" style="color:#0066cc; font-size:14px; text-decoration-line:none; outline:none !important">Black Hat</a><span style="color:#464646"><span style="font-size:14px">今日公布了亚太地区顶级网络安全盛会Black Hat Asia 2026的内容预览。本届大会将于4月21日至24日在新加坡滨海湾金沙会展中心举行,重点聚焦网络安全领域的最新进展,包括人工智能(AI)日益增长的威胁与供应链漏洞,这两大领域正推动亚太地区网络安全投资达到前所未有的规模。</span></span></span></span></span></p>
<p><span style="font-size:12px"><span style="color:#222222"><span style="font-family:Arial"><span style="font-size:14px"><span style="color:#464646">通过精心策划的专家指导说明会、沉浸式培训课程以及尖端工具演示,Black Hat Asia 2026大会将为安全专业人士提供应对快速演变威胁态势所需的知识与技能。</span></span></span></span></span></p>
<p><span style="font-size:12px"><span style="color:#222222"><span style="font-family:Arial"><span style="font-size:14px"><span style="color:#464646">Black Hat主席Suzy Pallett强调了本年度大会的战略意义,“Black Hat Asia 2026标志着该地区网络安全发展的关键转折点。在此发布的研究成果将彻底重塑人工智能驱动时代下我们应对网络安全挑战的策略。”</span></span></span></span></span></p>
<p><span style="font-size:12px"><span style="color:#222222"><span style="font-family:Arial"><span style="font-size:14px"><span style="color:#464646"><strong>应对当今最严峻的威胁</strong><br />
今年的项目直接应对该地区频频登上头条的网络安全挑战:</span></span></span></span></span></p>
<ul style="margin-left:20px">
<li><span style="font-size:12px"><span style="color:#222222"><span style="font-family:Arial"><strong>人工智能驱动的威胁:</strong>独家研究将揭示生成式人工智能如何正被威胁行为者武器化,同时展示创新的人工智能驱动防御策略。</span></span></span></li>
<li><span style="font-size:12px"><span style="color:#222222"><span style="font-family:Arial"><strong>供应链脆弱性:</strong>演讲将揭示关键供应链的脆弱性,重点关注对区域经济至关重要的行业,如制造业、物流业和科技业。</span></span></span></li>
<li><span style="font-size:12px"><span style="color:#222222"><span style="font-family:Arial"><strong>区域投资激增:</strong>亚太地区预计将在2026年引领全球网络安全支出,这主要受到日益加剧的威胁和监管压力的推动。</span></span></span></li>
</ul>
<p><span style="font-size:12px"><span style="color:#222222"><span style="font-family:Arial"><span style="font-size:14px"><span style="color:#464646"><strong>Black Hat Asia 2026关键亮点</strong></span></span></span></span></span></p>
<p><span style="font-size:12px"><span style="color:#222222"><span style="font-family:Arial"><span style="font-size:14px"><span style="color:#464646"><strong>突破性成果说明会:重新定义防务战略</strong><br />
4月23日至24日,<a href="https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fblackhat.com%2Fasia-26%2Fbriefings%2Fschedule%2Findex.html&esheet=54432567&newsitemid=20260224443946&lan=zh-CN&anchor=%26%2335813%3B%26%2335828%3B%26%2326126%3B%26%2320250%3B&index=2&md5=937902b06b51ada8e55857b1ea8e427b" style="color:#0066cc; text-decoration-line:none; outline:none !important">该说明会</a>将邀请世界顶尖研究人员揭示关键漏洞与创新防御方法。这些会议旨在为与会者提供可操作的情报,助力其组织抵御新兴威胁。</span></span></span></span></span></p>
<p><span style="font-size:12px"><span style="color:#222222"><span style="font-family:Arial"><span style="font-size:14px"><span style="color:#464646"><strong>专题说明会包括:</strong></span></span></span></span></span></p>
<ul style="margin-left:20px">
<li><span style="font-size:12px"><span style="color:#222222"><span style="font-family:Arial"><a href="https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fblackhat.com%2Fasia-26%2Fbriefings%2Fschedule%2Findex.html%23practical-attacks-against-smartphone-boot-roms-50532&esheet=54432567&newsitemid=20260224443946&lan=zh-CN&anchor=%26%2338024%3B%26%2323545%3B%26%2326234%3B%26%2333021%3B%26%2325163%3B%26%2326426%3B%26%2321551%3B%26%2321160%3BROM%26%2330340%3B%26%2323454%3B%26%2338469%3B%26%2325915%3B%26%2320987%3B&index=3&md5=82b363b9bde903354a874aaec49d0e37" style="color:#0066cc; text-decoration-line:none; outline:none !important">针对智能手机启动ROM的实际攻击</a> – 本次演讲将演示单个启动ROM(只读存储器)漏洞如何通过绕过安全启动机制及跨制造商平台的固件解密,危及整个智能手机生态系统。</span></span></span></li>
<li><span style="font-size:12px"><span style="color:#222222"><span style="font-family:Arial"><a href="https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fblackhat.com%2Fasia-26%2Fbriefings%2Fschedule%2Findex.html%23breaking-hybrid-boundaries-across-azure-and-windows-50893&esheet=54432567&newsitemid=20260224443946&lan=zh-CN&anchor=%26%2331361%3B%26%2330772%3B%26%2328151%3B%26%2321512%3B%26%2336793%3B%26%2330028%3B%26%2365306%3B%26%2336328%3B%26%2336234%3BAzure%26%2319982%3BWindows&index=4&md5=7ddd45dc8587a9930f0ed791a020d030" style="color:#0066cc; text-decoration-line:none; outline:none !important">突破混合边界:跨越Azure与Windows</a> – 本次演讲将揭示Windows管理中心中的四个零日漏洞如何实现对本地和Azure环境的全面入侵,包括跨租户攻击。</span></span></span></li>
<li><span style="font-size:12px"><span style="color:#222222"><span style="font-family:Arial"><a href="https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fblackhat.com%2Fasia-26%2Fbriefings%2Fschedule%2F%3F%23rebirthday-attack-reviving-dns-cache-poisoning-with-the-birthday-paradox-50562&esheet=54432567&newsitemid=20260224443946&lan=zh-CN&anchor=%26%2337325%3B%26%2329983%3B%26%2326085%3B%26%2325915%3B%26%2320987%3B%26%2365306%3B%26%2321033%3B%26%2329992%3B%26%2329983%3B%26%2326085%3B%26%2324726%3B%26%2335770%3B%26%2337325%3B%26%2321551%3BDNS%26%2332531%3B%26%2323384%3B%26%2320013%3B%26%2327602%3B&index=5&md5=924ad662ddd502606e026ff6af93bb0c" style="color:#0066cc; text-decoration-line:none; outline:none !important">重生日攻击:利用生日悖论重启DNS缓存中毒</a> – 本次演讲将介绍一种名为"重生日"的新型攻击手段,该攻击利用域名系统(DNS)软件中普遍存在的漏洞,对互联网流量实施污染,影响全球主要DNS服务商及数十万台服务器。</span></span></span></li>
</ul>
<p><span style="font-size:12px"><span style="color:#222222"><span style="font-family:Arial"><span style="font-size:14px"><span style="color:#464646"><strong>实践培训:打造明日网络守护者</strong><br />
从4月21日至24日,Black Hat的强化<a href="https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fblackhat.com%2Fasia-26%2Ftraining%2Fschedule%2Findex.html&esheet=54432567&newsitemid=20260224443946&lan=zh-CN&anchor=%26%2322521%3B%26%2335757%3B%26%2335838%3B%26%2331243%3B&index=6&md5=81b4030e07201202f345962d1bc6c117" style="color:#0066cc; text-decoration-line:none; outline:none !important">培训课程</a>将为参与者提供掌握关键技能的机会,涵盖恶意软件分析、人工智能红队演练及高级威胁情报等方面。这些课程由顶尖从业者领衔授课,旨在将理论知识转化为实战能力。</span></span></span></span></span></p>
<p><span style="font-size:12px"><span style="color:#222222"><span style="font-family:Arial"><span style="font-size:14px"><span style="color:#464646"><strong>培训亮点包括:</strong></span></span></span></span></span></p>
<ul style="margin-left:20px">
<li><span style="font-size:12px"><span style="color:#222222"><span style="font-family:Arial"><a href="https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fblackhat.com%2Fasia-26%2Ftraining%2Fschedule%2Findex.html%23the-flare-teams-guide-to-reverse-engineering-modern-malware-49607&esheet=54432567&newsitemid=20260224443946&lan=zh-CN&anchor=FLARE%26%2322242%3B%26%2338431%3B%26%2330340%3B%26%2329616%3B%26%2320195%3B%26%2324694%3B%26%2324847%3B%26%2336719%3B%26%2320214%3B%26%2336870%3B%26%2321521%3B%26%2324037%3B%26%2331243%3B%26%2325351%3B%26%2321335%3B&index=7&md5=1ec4ed29cd11e6c4ee3e5c701947fad0" style="color:#0066cc; text-decoration-line:none; outline:none !important">FLARE团队的现代恶意软件逆向工程指南</a> – 这门课程将使学生掌握那些能够绕过现代检测系统的高级恶意软件的逆向工程技能。</span></span></span></li>
<li><span style="font-size:12px"><span style="color:#222222"><span style="font-family:Arial"><a href="https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fblackhat.com%2Fasia-26%2Ftraining%2Fschedule%2F%3F%23ai-red-teaming-attacks-on-llms-agents-and-multimodal-systems-49803&esheet=54432567&newsitemid=20260224443946&lan=zh-CN&anchor=%26%2320154%3B%26%2324037%3B%26%2326234%3B%26%2333021%3B%26%2332418%3B%26%2338431%3B%26%2328436%3B%26%2332451%3B%26%2365306%3B%26%2338024%3B%26%2323545%3B%26%2322823%3B%26%2322411%3B%26%2335821%3B%26%2335328%3B%26%2327169%3B%26%2322411%3B%26%2312289%3B%26%2326234%3B%26%2333021%3B%26%2320307%3B%26%2321450%3B%26%2322810%3B%26%2327169%3B%26%2324577%3B%26%2331995%3B%26%2332479%3B%26%2330340%3B%26%2325915%3B%26%2320987%3B&index=8&md5=11f4340afc5b683c04369c1dc6700031" style="color:#0066cc; text-decoration-line:none; outline:none !important">人工智能红队演练:针对大型语言模型、智能体及多模态系统的攻击</a> –本课程将系统性地教授学生识别并利用现代人工智能系统(包括大型语言模型、智能体及多模态应用程序)中存在的漏洞的技术方法。</span></span></span></li>
<li><span style="font-size:12px"><span style="color:#222222"><span style="font-family:Arial"><a href="https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fblackhat.com%2Fasia-26%2Ftraining%2Fschedule%2F%3F%23practical-genai-for-threat-intel-real-world-agentic-workflows-for-cyber-threat-intelligence-49450&esheet=54432567&newsitemid=20260224443946&lan=zh-CN&anchor=%26%2323041%3B%26%2332961%3B%26%2324773%3B%26%2325253%3B%26%2330340%3B%26%2323454%3B%26%2329992%3B%26%2329983%3B%26%2325104%3B%26%2324335%3B%26%2320154%3B%26%2324037%3B%26%2326234%3B%26%2333021%3B%26%2365306%3B%26%2332593%3B%26%2332476%3B%26%2323041%3B%26%2332961%3B%26%2324773%3B%26%2325253%3B%26%2330340%3B%26%2323454%3B%26%2338469%3B%26%2326234%3B%26%2333021%3B%26%2320307%3B%26%2324037%3B%26%2320316%3B%26%2327969%3B&index=9&md5=9436b0772f022474a2f7cd873b31b794" style="color:#0066cc; text-decoration-line:none; outline:none !important">威胁情报的实用生成式人工智能:网络威胁情报的实际智能体工作流</a> – 本课程将培养学生运用检索增强生成(RAG)、多智能体工作流和微调等先进技术,构建并部署人工智能驱动的威胁情报系统,以应对现实世界中的安全挑战。</span></span></span></li>
</ul>
<p><span style="font-size:12px"><span style="color:#222222"><span style="font-family:Arial"><span style="font-size:14px"><span style="color:#464646"><strong>Black Hat Arsenal:创新实践展示</strong><br />
<a href="https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fblackhat.com%2Fasia-26%2Farsenal%2Fschedule%2Findex.html&esheet=54432567&newsitemid=20260224443946&lan=zh-CN&anchor=Arsenal&index=10&md5=dfc315f86ef41a1cb8456dbf9b6d899b" style="color:#0066cc; text-decoration-line:none; outline:none !important">Arsenal</a>项目将于4月23日至24日举行,现场展示由全球网络安全社区开发的尖端开源工具。这个互动平台旨在促进协作与创新,让参与者能直接与工具开发者交流互动。</span></span></span></span></span></p>
<p><span style="font-size:12px"><span style="color:#222222"><span style="font-family:Arial"><span style="font-size:14px"><span style="color:#464646"><strong>专题工具演示包括:</strong></span></span></span></span></span></p>
<ul style="margin-left:20px">
<li><span style="font-size:12px"><span style="color:#222222"><span style="font-family:Arial"><a href="https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fblackhat.com%2Fasia-26%2Farsenal%2Fschedule%2Findex.html%23quantumstrand-qs-a-structural-approach-to-string-analysis-for-rapid-indicator-filtering-50358&esheet=54432567&newsitemid=20260224443946&lan=zh-CN&anchor=%26%2337327%3B%26%2323376%3B%26%2338142%3B%26%2365288%3Bqs%26%2365289%3B%26%2365306%3B%26%2338754%3B%26%2321521%3B%26%2324555%3B%26%2336895%3B%26%2325351%3B%26%2326631%3B%26%2336807%3B%26%2328388%3B%26%2330340%3B%26%2323383%3B%26%2331526%3B%26%2320018%3B%26%2320998%3B%26%2326512%3B%26%2332467%3B%26%2326500%3B%26%2321270%3B%26%2326041%3B%26%2327861%3B&index=11&md5=e9c07595b01ca0801ea0e2eb9fe937b5" style="color:#0066cc; text-decoration-line:none; outline:none !important">量子链(qs):面向快速指标过滤的字符串分析结构化方法</a> – 该工具将扁平字符串列表转换为结构化映射,使分析师在恶意软件分级处理过程中能够快速过滤噪音,聚焦关键指标。</span></span></span></li>
<li><span style="font-size:12px"><span style="color:#222222"><span style="font-family:Arial"><a href="https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fblackhat.com%2Fasia-26%2Farsenal%2Fschedule%2F%3F%23vet-open-source-software-supply-chain-security-guardrail-in-the-age-of-ai-sdlc-49967&esheet=54432567&newsitemid=20260224443946&lan=zh-CN&anchor=vet%26%2365306%3BAI+SDLC%26%2326102%3B%26%2320195%3B%26%2330340%3B%26%2324320%3B%26%2328304%3B%26%2336719%3B%26%2320214%3B%26%2320379%3B%26%2324212%3B%26%2338142%3B%26%2323433%3B%26%2320840%3B%26%2338450%3B%26%2325252%3B%26%2326639%3B&index=12&md5=9f5ed0a869af5098b25d1093b89b40d6" style="color:#0066cc; text-decoration-line:none; outline:none !important">vet:AI SDLC时代的开源软件供应链安全防护栏</a> – 该工具能在恶意软件包进入数据库前主动检测,并与人工智能编码工具集成,为开发者优先防御机制提供会话分析。</span></span></span></li>
<li><span style="font-size:12px"><span style="color:#222222"><span style="font-family:Arial"><a href="https://cts.businesswire.com/ct/CT?id=smartlink&url=https%3A%2F%2Fblackhat.com%2Fasia-26%2Farsenal%2Fschedule%2F%3F%23prowler-open-cloud-security---release-of-v60-49923&esheet=54432567&newsitemid=20260224443946&lan=zh-CN&anchor=Prowler+Open+Cloud+Security+-+v6.0%26%2329256%3B%26%2326412%3B%26%2321457%3B%26%2324067%3B&index=13&md5=976b1641792aafb94b3043cc59aa70aa" style="color:#0066cc; text-decoration-line:none; outline:none !important">Prowler Open Cloud Security - v6.0版本发布</a> – 该工具提供持续监控、安全评估、合规性审计及事件响应服务,覆盖CIS、NIST、GDPR和HIPAA等主要框架。</span></span></span></li>
</ul>
<p><span style="font-size:12px"><span style="color:#222222"><span style="font-family:Arial"><span style="font-size:14px"><span style="color:#464646"><strong>注册与活动详情</strong><br />
完整活动详情、演讲嘉宾信息及注册通道请访问 。</span></span></span></span></span></p>
<p><span style="font-size:12px"><span style="color:#222222"><span style="font-family:Arial"><span style="font-size:14px"><span style="color:#464646"><strong>Black Hat Asia 2026的主要赞助商和合作伙伴包括:</strong></span></span></span></span></span></p>
<ul style="margin-left:20px">
<li><span style="font-size:12px"><span style="color:#222222"><span style="font-family:Arial"><strong>白金赞助商:</strong>Bitdefender、Broadcom、Concentric AI、SOCRadar Cyber Intelligence、ThreatLocker和Tines。</span></span></span></li>
<li><span style="font-size:12px"><span style="color:#222222"><span style="font-family:Arial"><strong>白银赞助商:</strong>Corellium、EasyDMARC、Filigran、Fortra、ManageEngine、SecureFlag、Sparrow、Sumo Logic、TuxCare以及Varonis。</span></span></span></li>
<li><span style="font-size:12px"><span style="color:#222222"><span style="font-family:Arial"><strong>持续合作伙伴:</strong>Armis、Cisco、CrowdStrike、Cyera、Google、ManageEngine、Qualys、SentinelOne、Sophos、Tenable、TrendAI、Varonis以及Wiz。</span></span></span></li>
<li><span style="font-size:12px"><span style="color:#222222"><span style="font-family:Arial"><strong>全球合作伙伴:</strong>Broadcom、Concentric AI、Corellium、EasyDMARC、HackerOne、Semgrep、ThreatLocker、VulnCheck以及wolfSSL。</span></span></span></li>
</ul>
<p><span style="font-size:12px"><span style="color:#222222"><span style="font-family:Arial"><span style="font-size:14px"><span style="color:#464646"><strong>关于Black Hat</strong><br />
Black Hat是网络安全行业历史最悠久、内容最深入的安全活动系列。自1997年创立以来,这些为期数天的年度盛会持续为参与者呈现网络安全领域的最新研究成果、技术发展与行业趋势。Black Hat以社区需求为导向,通过说明会、培训课程、峰会等形式直接呈现社区内容。作为汇聚各职业层次与学术领域的交流平台,与会者可在此开展协作、建立人脉并探讨最关切的网络安全议题。目前 Black Hat活动遍布美国、加拿大、欧洲、中东非洲及亚洲地区。</span></span></span></span></span></p>
</div>
<p> </p>
