Event Updates

Latest Content tagged with Black Hat
Page 1 / 2   >   >>
Deep Dives: New Security Flaws in Apple and Microsoft products at Black Hat Europe
Event Updates  |  10/11/2018  | 
With Black Hat Europe coming to London in a few months, organizers share three of the most promising Briefings slated for the December event.
Learn to Understand and Combat New Threats at Black Hat Europe
Event Updates  |  10/9/2018  | 
As we begin to settle into autumn, Black Hat organizers are hard at work lining up a ton of great content for the premier information security events return to London this December.
Dont Miss the Action-Packed Arsenal Offerings at Black Hat Europe
Event Updates  |  10/4/2018  | 
Organizers are hard at work preparing for another remarkable Black Hat Europe event in London this December. Here's a sneak peek at two fantastic demos youll see there.
Sharpen Your Security Skills at Black Hat Trainings Chicago!
Event Updates  |  10/2/2018  | 
Black Hat is bringing its highly-regarded Trainings to Chicago next month, October 22 and 23.Don't miss this opportunity to develop your skills in some of the most technical, hands-on security courses available.
Learn New Ways to Spot and Plug Vulnerabilities at Black Hat Europe
Event Updates  |  9/27/2018  | 
Come out to London Dec 3-6 and learn to use new tools (including the laws of physics) to identify hidden vulnerabilities.
Black Hat Europe Returns to The Excel in London December 3-6
Event Updates  |  9/25/2018  | 
Get expert insight into stopping deep fakes, blockchain attacks, and Windows 10 vulnerabilities.
Transparent Orchestration of Security to Accelerate the Digital Transformation Journey
Event Updates  |  6/27/2018  | 
The extension of infrastructures from on-premises IT environments to multiple cloud ecosystems delivers organizations newly transformed digital services with increased value.
Black Hat USA 2018:
Comandeering Voice Enabled Devices
Event Updates  |  6/18/2018  | 
Researchers Amichai Shulman, Ron Marcovich, Tal Be'ery and Yuval Ron will detail a vulnerability of Microsofts Cortana in their Black Hat USA Briefing Open Sesame: Picking Locks with Cortana.
Announcing: Black Hat Europe 2018
Event Updates  |  6/13/2018  | 
Black Hat Europe returns to the ExCeL London, December 3-6, 2018
Restoring Business Velocity and Trust in Users with Risk-Adaptive Protection
Event Updates  |  6/6/2018  | 
A paradigm shift in thinking is needed for the cybersecurity industry.
Black Hat Trainings, October 22-23 at the Sheraton Grand in Chicago
Event Updates  |  6/4/2018  | 
2-day Black Hat Trainings offered at the Sheraton Grand in Chicago, October 22-23
Black Hat USA 2018:
More than 110 Briefings Announced!
Event Updates  |  5/30/2018  | 
Black Hat USA returns to Las Vegas for its 21st year, August 4-7, 2018 with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier solutions and service providers in the Business Hall, and more.
Black Hat Asia 2018:
First Briefings Announced
Event Updates  |  12/13/2017  | 
Black Hat Asia returns to Singapore, March 20-23, 2018 with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier solutions and service providers in the Business Hall, and more.
Black Hat Europe 2017:
New Briefings Announced
Event Updates  |  10/18/2017  | 
Final Batch of Black Hat Europe 2017 Briefings Released
Black Hat Europe 2017:
New Briefings Announced
Event Updates  |  9/27/2017  | 
We are pleased to announce More Briefings selected for presentation at Black Hat Europe 2017!
Black Hat Europe 2017:
First Briefings Announced
Event Updates  |  9/20/2017  | 
We are pleased to announce the first Briefings selected for presentation at Black Hat Europe 2017!
Black Hat USA 2017:
Know Before You Go
Event Updates  |  7/19/2017  | 
Black Hat USA 2017:
Attendee Survey Results
Event Updates  |  7/6/2017  | 
Today, Black Hat releases its third annual research report entitled, Portrait of an Imminent Cyber Threat. Download a copy for actionable insights and information on critical industry trends.
Black Hat USA 2017:
Data Forensices and Incident Response Roadmap
Event Updates  |  6/5/2017  | 
Strong data forensics and incident response capabilities are critical for agile breach detection and mitigation. Challenges of multiple access points, the influx of mobile and connected devices and the large amount of resulting data makes this an arduous task. Build these highly sought after skills at Black Hat USA with the Data Forensics and Incident Response track
Black Hat USA 2017:
Predominance of Internet of Things
Event Updates  |  5/30/2017  | 
Expected rise in IoT breaches and complexities points to a need for advanced knowledge of IoT practicalities and fundamentals. Navigate the dynamic threat landscape with these Black Hat USA offerings and view the Briefings IoT Track to begin customizing your Black Hat USA experience.
Black Hat USA 2017: 35 New Briefings Announced
Event Updates  |  5/4/2017  | 
We are pleased to announce 35 new Briefings selected for presentation at Black Hat USA 2017!
Black Hat USA 2017:
Security Challenges in the Enterprise
Event Updates  |  5/2/2017  | 
Growing costs of incident management and remediation have heightened the need for new breach mitigation strategies and tools. Enterprise systems are particularly susceptible to compromise with unique challenges to risk visibility and assessment. Unobstructed view and comprehensive knowledge of the threat surface is critical to preempting attack vectors and mitigating breach incidents.
Black Hat USA 2017: 15 New Briefings Announced
Event Updates  |  4/27/2017  | 
We are pleased to announce 15 new Briefings selected for presentation at Black Hat USA 2017!
Black Hat Review Board Spotlight:
Beyond the Bio with Jamie Butler
Event Updates  |  3/14/2017  | 
Get to know the Black Hat Review Board in a new interview series, Beyond the Bio. In this series, Black Hat Review Board Members offer insight from their favorite exploits and pastimes to their most memorable Black Hat experiences.
Black Hat Asia 2017:
CISOs Must Get Proactive about the Internet of Things
Event Updates  |  3/13/2017  | 
These four steps will help reduce the risk from looming IoT attacks
Black Hat Asia 2017:
Pentesting for Vulnerabilities
Event Updates  |  3/9/2017  | 
Continually testing for vulnerabilities is critical to threat detection and prevention
Black Hat Asia 2017:
Securing Mobile Devices
Event Updates  |  3/8/2017  | 
Opportunities for phishing, ransomware, cryptocurrency mining and other attacks are endless. Understanding mechanisms for compromising Android and iOS systems is crucial to detecting and preventing security breaches.
Black Hat Asia 2017:
Threat & Vulnerability Management: Knowing Youre Secure
Event Updates  |  3/7/2017  | 
Threat and vulnerability management is a foundational technique that every security professional should embrace. Heres why.
Black Hat Europe 2016:
Introducing RegTech: Cloud-based Tools For Regulatory Compliance
Event Updates  |  10/25/2016  | 
As regulatory requirements grow in volume and complexity in Europe and globally, cloud computing is emerging as a key tool to help companies manage compliance processes.
Black Hat Europe 2016:
How Artificial Intelligence Will Liberate Security
Event Updates  |  10/24/2016  | 
The security paradigm is shifting to one of security as a science with AI as the primary agent for that revolutionary change.
Black Hat Europe 2016:
The 7 Habits of Highly Effective Security Operations
Event Updates  |  10/21/2016  | 
Why cyber analysts spend nearly 75% if their time on false positives, and what to do about it.
Black Hat Europe 2016:
5 Best Practices for Defending Against a Cyberattack
Event Updates  |  10/19/2016  | 
The proactive management of cybersecurity relies on an intelligence-led approach that can either prevent a breach from happening, or make sure that it is quickly detected and remediated.
Black Hat Europe 2016:
Whats Next For Ransomware & How To Prevent It
Event Updates  |  10/18/2016  | 
Ransomware has existed in various forms for decades, but in the last three years, cybercriminals have perfected its key components. Heres what you need to know now.
Black Hat Europe 2016:
BooleBox: A New Perspective On Enterprise Data Protection
Event Updates  |  10/10/2016  | 
The thought of sensitive data ending up in the wrong hands can keep both IT administrators and top-managers awake at night. As the latest trends show, many organizations are gaining more and more awareness about the various existing threats to their intellectual property and confidential information.
Black Hat Europe 2016 Sponsor Content:
Whats In Your Armoury For Discovering Software Vulnerabilities?
Event Updates  |  10/5/2016  | 
The process of locating, identifying and targeting software vulnerabilities has changed beyond measure in the last 20 years. Automated tools are a huge factor in this and have made the whole process a lot easier, yet subtle and esoteric weaknesses are beginning to creep into software and they arent easy to spot.
Its Time For Legacy AV To Leave The Building: #legxit
Event Updates  |  9/29/2016  | 
[Black Hat Europe 2016 Sponsor Content: SentinelOne]
Ransomware Rages On
Event Updates  |  9/28/2016  | 
[Black Hat Europe 2016 Sponsor Content: iboss Cybersecurity]
Black Hat Europe 2016: Penetration Testing is Key in Enhancing Your Security
Event Updates  |  8/17/2016  | 
Last year, 594 million people were affected by cybercrime around the world (according to Norton Cybersecurity Insights Report). Cyber attacks will only become more sophisticated in the years to come. As the severity of online attacks continue to escalate, it is critical to find ways to mitigate potential exploits. Penetration testing is a great method of detecting vulnerabilities in your systems or devices and weve highlighted a few Black Hat Trainings that can truly enhance your skills.
Black Hat USA 2016: Beware of Malware
Event Updates  |  6/30/2016  | 
Over 430 million new pieces of malware were discovered last year, a 36% increase from the previous year (according to Symantec). Malware attacks are projected to rise in volume and frequency. Hackers are becoming more skilled at detecting vulnerabilities and commonly use malware as their method of attack. It is critical to be aware of the current malware threats and learn how you can defuse potential exploits.
Black Hat USA 2016: Windows Security
Event Updates  |  6/15/2016  | 
Microsofts Windows dominates the OS landscape, accounting for 89% of the market (according to Hot Hardware), and the latest Windows upgrade, Windows 10, is now running on 300 million active devices worldwide (reported by Microsoft). Being the leader in the space also makes Windows a huge target for hackers who constantly scan for vulnerabilities in the system.
Black Hat USA 2016: Digital Communication Security
Event Updates  |  6/6/2016  | 
In a global population of 7.395 billion people, 3.419 billion people are internet users and of those, 2.307 billion people communicate via social media (according to the study Digital in 2016 by We Are Social). Since a large portion of the worlds population communicates using the internet, cyber security is a priority for users.
Black Hat USA 2016: Mobile Hacking
Event Updates  |  5/17/2016  | 
Over 1.4 billion people across the world are using Android devices, according to Google. Unlike Apples iOS, Android is not tied to a specific manufacturer, allowing it to account for 81.6% of the smartphone operating system market (Statistica). However, since Android dominates the smartphone market, it presents an ideal opportunity for hackers to tap into a large base of user information. Its essential for Android users, as well as iOS users, to learn how to protect themselves.
Black Hat USA 2016: Locking Down Your Platform Security
Event Updates  |  5/3/2016  | 
Only 38% of international organizations reveal they feel prepared to handle a sophisticated cyberattack, according to ISACA International (2015 Global Cybersecurity Status Report). The refinement of hacking technology is continuously evolving and learning how to heighten your security measures is critical. Not taking an active role in improving platform security could put your companys proprietary information at risk.
Black Hat Europe 2015: Just the Attacks, Ma'am
Event Updates  |  10/27/2015  | 
Allow us to channel an early 2000, sweating, hyperkinetic Steve Ballmer: exploits, exploits, exploits, exploits! Today's Black Hat Europe 2015 Briefing highlights are all about novel and sometimes devastating new attacks against systems of all kinds. Can they get you as pumped up as Steve? Let's find out.
Black Hat Europe 2015: Gaps in the Corporate Armor
Event Updates  |  10/20/2015  | 
In today's Intel Update, we're going big... enterprise big, with a selection of Black Hat Europe 2015 Briefing highlights that focus on vulnerabilities affecting large organizations. Few targets are more tempting to criminals (or have more to lose) so let's take a peek at a few promisingly tender spots tucked behind corporate veils.
Black Hat Europe 2015: The Best Response
Event Updates  |  10/13/2015  | 
Forensics and incident response: two disciplines in ever-higher demand in today's world of subtle intrusions and stealthy attacks. This trio of Black Hat Europe 2015 Briefings highlights grapple with different aspects of the art of intelligent counter-intelligence.
Black Hat Europe 2015: Cracking Crypto
Event Updates  |  9/28/2015  | 
It's largely thanks to the hard work of decades of cryptographers that we're able to keep so much sensitive data safe, secret, and secure. But today's Black Hat Europe 2015 Briefing highlights remind that no crypto scheme's unbeatable, showcasing a variety of attacks with the potential to lay bare important secrets.
Page 1 / 2   >   >>


12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/15/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.