{"id":3044,"date":"2025-08-08T08:23:10","date_gmt":"2025-08-08T08:23:10","guid":{"rendered":"https:\/\/violethoward.com\/new\/black-hat-2025-how-agentic-ai-is-finally-delivering-real-value\/"},"modified":"2025-08-08T08:23:10","modified_gmt":"2025-08-08T08:23:10","slug":"black-hat-2025-how-agentic-ai-is-finally-delivering-real-value","status":"publish","type":"post","link":"https:\/\/violethoward.com\/new\/black-hat-2025-how-agentic-ai-is-finally-delivering-real-value\/","title":{"rendered":"Black Hat 2025: How Agentic AI Is finally delivering real value"},"content":{"rendered":" \r\n
\n\t\t\t\t
\n

Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders.<\/em> Subscribe Now<\/em><\/p>\n\n\n\n


\n<\/div>

Cloud intrusions increased\u00a0by 136%\u00a0in the past\u00a0<\/span>six months. North Korean operatives infiltrated 320 companies using AI-generated identities. Scattered Spider now deploys ransomware in under 24 hours. However, at\u00a0Black Hat 2025, the security industry demonstrated that it finally has an answer that works: agentic AI,<\/span> delivering measurable results, not promises.<\/p>\n\n\n\n

CrowdStrike\u2019s recent identification of 28 North Korean operatives embedded as remote IT workers, part of a broader campaign affecting 320 companies, demonstrates how agentic AI is evolving from concept to practical threat detection.<\/p>\n\n\n\n

While nearly every vendor at Black Hat 2025 had performance metrics available, either from beta programs in process or full-production agentic AI deployments, the strongest theme was operational readiness over hype or theoretical claims.<\/p>\n\n\n\n

CISOs VentureBeat spoke with at Black Hat are reporting the ability to process significantly more alerts with current staffing levels, with investigation times improving substantially. However, specific gains depend on the implementation maturity and complexity of the use case. What\u2019s notable is the transition from aspirational roadmaps to real-world outcomes.<\/p>\n\n\n\n

\n
\n\n\n\n

AI Scaling Hits Its Limits<\/strong><\/p>\n\n\n\n

Power caps, rising token costs, and inference delays are reshaping enterprise AI. Join our exclusive salon to discover how top teams are:<\/p>\n\n\n\n

    \n
  • Turning energy into a strategic advantage<\/li>\n\n\n\n
  • Architecting efficient inference for real throughput gains<\/li>\n\n\n\n
  • Unlocking competitive ROI with sustainable AI systems<\/li>\n<\/ul>\n\n\n\n

    Secure your spot to stay ahead<\/strong>: https:\/\/bit.ly\/4mwGngO<\/p>\n\n\n\n


    \n<\/div>

    VentureBeat is also starting to see security teams begin to achieve practical, real efficiency gains that translate to the metrics boards ask about. These include reducing the mean time to investigate (MTTI), improving threat detection rates and better resource utilization. Black Hat 2025 marked an inflection point where the conversation shifted from AI\u2019s potential to its measured impact on security operations.<\/p>\n\n\n\n

    The agentic AI arms race shifts from promises to production<\/strong><\/h2>\n\n\n\n

    The conversation at Black Hat 2025 was dominated by agentic AI, with many of the sessions dedicated to how attackers have or can easily compromise agents. VentureBeat observed over 100 announcements promoting new agentic AI applications, platforms or services. Vendors are producing use cases and results. That\u2019s a welcome change from the many promises made in prior years and at previous years. There\u2019s an urgency to close hype gaps and deliver results. \u00a0<\/p>\n\n\n\n

    CrowdStrike\u2019s Adam Meyers, head of counter adversary operations, articulated what\u2019s driving this urgency in an interview with VentureBeat: \u201cAgentic AI really becomes the platform that allows SOC operators to build those automations, whether they\u2019re using MCP servers to get access to APIs. We\u2019re starting to see more and more organizations leveraging our agentic AI to help them integrate with the Falcon and CrowdStrike systems.\u201d<\/p>\n\n\n\n

    VentureBeat believes the scale of the threat demands this response. \u201cWhen they\u2019re moving at that speed, you can\u2019t wait,\u201d Meyers emphasized, referencing how some adversaries now deploy ransomware in under 24 hours. \u201cYou need to have human threat hunters in the loop that are making you know, as soon as the adversary gets access, or as soon as the adversary pops up, they\u2019re there, and they\u2019re doing hand-to-hand combat with those adversaries.\u201d<\/p>\n\n\n\n

    \u201cLast year, we looked at 60 billion hunting leads that result in about 13 million investigations, 27,000 customer escalations and 4000 emails that we started sending to customers,\u201d Meyers revealed, emphasizing the scale at which these systems now operate. Microsoft Security unveiled significant enhancements to its Security Copilot, introducing autonomous investigation capabilities that can correlate threats across Microsoft Defender, Sentinel and third-party security tools without human intervention. Palo Alto Networks demonstrated Cortex XSOAR\u2019s new agentic capabilities, showing how their platform can now autonomously triage alerts, conduct investigations and even execute remediation actions within defined guardrails.<\/p>\n\n\n\n

    Cisco made one of Black Hat\u2019s most significant announcements, releasing Foundation-sec-8B-Instruct, the first conversational AI model built exclusively for cybersecurity. This eight-billion-parameter model outperforms much larger general-purpose models, including GPT-4o-mini, on security tasks while running on a single GPU.<\/p>\n\n\n\n

    What sets this release apart is its fully open-source architecture. Foundation-sec-8B-Instruct ships with completely open weights under a permissive license, enabling security teams to deploy it on-premises, in air-gapped environments or at the edge without vendor lock-in. The model is freely available on Hugging Face, accompanied by the Foundation AI Cookbook featuring deployment guides and implementation templates.<\/p>\n\n\n\n

    \u201cFoundation-sec-8B-Instruct is live, open, and ready to defend. Download it, prompt it and help shape the future of AI-powered cybersecurity,\u201d states Yaron Singer, VP of AI and Security at Foundation, emphasizing the collaborative potential of this open-source approach.<\/p>\n\n\n\n

    SentinelOne took a different approach, emphasizing their Purple AI\u2019s ability not just to investigate but actually \u201cthink ahead\u201d or predict adversary moves based on behavioral patterns and proactively adjusting defenses.<\/p>\n\n\n\n

    \"\"<\/figure>\n\n\n\n

    CrowdStrike\u2019s threat intelligence reveals how adversaries like FAMOUS CHOLLIMA are weaponizing gen AI at every stage of insider threat operations, from creating synthetic identities to managing multiple simultaneous employment positions. Source: CrowdStrike 2025 Threat Hunting Report<\/em><\/p>\n\n\n\n

    How the North Korean threat changed everything fast<\/strong><\/h2>\n\n\n\n

    FAMOUS CHOLLIMA operatives infiltrated over 320 companies in the past year. That\u2019s a 220% year-over-year increase, representing a fundamental shift in enterprise security threats.<\/p>\n\n\n\n

    \u201cThey\u2019re using AI through the entire process,\u201d Meyers told VentureBeat during an interview. \u201cThey\u2019re using generative AI to create LinkedIn profiles, to create resumes and then they go into the interview, and they\u2019re using deep fake technology to change their appearance. They\u2019re using AI to answer questions during the interview process. They\u2019re using AI, once they get hired, to build the code and do the work that they\u2019re supposed to do.\u201d<\/p>\n\n\n\n

    The infrastructure supporting these operations is sophisticated. One Arizona-based facilitator maintained 90 laptops to enable remote access. Operations have expanded beyond the U.S. to France, Canada and Japan as adversaries diversify their targeting.<\/p>\n\n\n\n

    CrowdStrike\u2019s July data reveals the scope: 33 FAMOUS CHOLLIMA encounters, with 28 confirmed as malicious insiders who had successfully obtained employment. These are AI-enhanced operators working within organizations, using legitimate credentials, rather than relying on traditional malware attacks that security tools can detect.<\/p>\n\n\n\n

    Why the human element remains vital<\/strong><\/h2>\n\n\n\n

    Despite the technological advances, a consistent theme across all vendor presentations was that agentic AI augments rather than replaces human analysts. \u201cAgentic AI, as good as it is, is not going to replace the humans that are in the loop. You need human threat hunters out there that are able to use their insight and their know-how and their intellect to come up with creative ways to try to find these adversaries,\u201d Meyers emphasized.<\/p>\n\n\n\n

    Every major vendor echoed this human-machine collaboration model. Splunk\u2019s announcement of Mission Control emphasized how its agentic AI serves as a \u201cforce multiplier\u201d for analysts, handling routine tasks while escalating complex decisions to humans. Even the most ardent advocates of automation acknowledged that human oversight remains essential for high-stakes decisions and creative problem-solving.<\/p>\n\n\n\n

    Competition shifts from features to results<\/strong><\/h2>\n\n\n\n

    Despite fierce competition in the race ot deliver agentic AI solutions for the SOC, Black Hat 2025 ironically showed a more unified approach to cybersecurity than any previous event. Every major vendor emphasized three critical components: reasoning engines that can understand context and make nuanced decisions. These action frameworks enable autonomous response within defined boundaries and learning systems that continuously improve based on outcomes.<\/p>\n\n\n\n

    Google Cloud Security\u2019s Chronicle SOAR exemplified this shift, introducing an agentic mode that automatically investigates alerts by querying multiple data sources, correlating findings and presenting analysts with complete investigation packages. Even traditionally conservative vendors have embraced the transformation, with IBM and others introducing autonomous investigation capabilities to their existing installations. The convergence was apparent: the industry has moved beyond competing on AI presence to competing on operational excellence.<\/p>\n\n\n\n

    \"\"<\/figure>\n\n\n\n

    The cybersecurity industry is witnessing adversaries leverage GenAI across three primary attack vectors, forcing defenders to adopt equally sophisticated AI-powered defenses. Source: CrowdStrike 2025 Threat Hunting Report<\/em><\/p>\n\n\n\n

    Many are predicting that AI will become the next insider threat<\/strong><\/h2>\n\n\n\n

    Looking forward, Black Hat 2025 also highlighted emerging challenges. Meyers delivered perhaps the most sobering prediction of the conference: \u201cAI is going to be the next insider threat. Organizations trust those AIs implicitly. They are using it to do all of these tasks, and the more comfortable they become, the less they\u2019re going to check the output.\u201d<\/p>\n\n\n\n

    This concern sparked discussions about standardization and governance. The Cloud Security Alliance announced a working group focused on agentic AI security standards, while several vendors committed to collaborative efforts around AI agent interoperability. CrowdStrike\u2019s expansion of Falcon Shield to include governance for OpenAI GPT-based agents, combined with Cisco\u2019s AI supply chain security initiative with Hugging Face, signals the industry\u2019s recognition that securing AI agents themselves is becoming as important as using them for security.<\/p>\n\n\n\n

    The velocity of change is accelerating. \u201cAdversaries are moving incredibly fast,\u201d Meyers warned. \u201cScattered spider hit retail back in April, they were hitting insurance companies in May, they were hitting aviation in June and July.\u201d The ability to iterate and adapt at this speed means organizations can\u2019t afford to wait for perfect solutions.<\/p>\n\n\n\n

    Bottom Line<\/strong><\/h2>\n\n\n\n

    This year\u2019s Black Hat confirmed what many cybersecurity professionals saw coming. AI-driven attacks now threaten their organizations across a widening array of surfaces, many of them unexpected.<\/p>\n\n\n\n

    Human resources and hiring became the threat surface no one saw coming. FAMOUS CHOLLIMA operatives are penetrating every possible U.S. and Western technology company they can, grabbing immediate cash to fuel North Korea\u2019s weapons programs while stealing invaluable intellectual property. This creates an entirely new dimension to attacks. Organizations and the security leaders guiding them would do well to remember what hangs in the balance of getting this right: your businesses\u2019 core IP, national security, and the trust customers have in the organizations they do business with.<\/p>\n