Black Hat USA
August 4-9, 2018
Las Vegas, NV, USA
Black Hat Trainings
October 22-23, 2018
Chicago, IL USA
Black Hat Europe
December 3-6, 2018
London UK
Event Updates
Black Hat Europe: Stock Up On New Security Tools and Training
Black Hat Staff,
If you work in cybersecurity it's important to stay abreast of the latest tools and techniques, and theres no better place to do that than Black Hat Europe in London next month.
By Black Hat Staff , 11/20/2018
Comment0 comments  |  Read  |  Post a Comment
Black Hat Europe Speaker Q&A: SoarTechs Fernando Maymi on Synthetic Humans
Black Hat Staff,
Ahead of his Black Hat Europe appearance, SoarTechs Fernando Maymi explains how and why synthetic humans are critical to the future of cybersecurity.
By Black Hat Staff , 11/16/2018
Comment0 comments  |  Read  |  Post a Comment
Learn How to Better Protect your Network at Black Hat Europe
Black Hat Staff,
Whether youre sussing out vulnerabilities or defending enterprise networks, Black Hat Europes lineup of Briefings, Trainings, and Arsenal tools will help you take things to the next level.
By Black Hat Staff , 11/15/2018
Comment0 comments  |  Read  |  Post a Comment
More Event Updates
News & Commentary
Black Hat: European Security Pros Wrestling With Potential Breaches, Privacy Issues
Tim Wilson, Editor in Chief, Dark Reading, News
Black Hat Europe attendee survey shows European cybersecurity leaders are uncertain of their ability to protect end user data and are fearful of a near-term breach of critical infrastructure.
By Tim Wilson, Editor in Chief, Dark Reading , 11/14/2018
Comment0 comments  |  Read  |  Post a Comment
7 Cool New Security Tools to be Revealed at Black Hat Europe
Ericka Chickowski, Contributing Writer, Dark Reading
Black Hat Europe's Arsenal lineup will include demoes of new security tools, from AI malware research to container orchestration.
By Ericka Chickowski Contributing Writer, Dark Reading, 11/12/2018
Comment0 comments  |  Read  |  Post a Comment
Finding Gold in the Threat Intelligence Rush
Kelly Sheridan, Staff Editor, Dark ReadingNews
Researchers sift through millions of threat intel observations to determine where to best find valuable threat data.
By Kelly Sheridan Staff Editor, Dark Reading, 11/7/2018
Comment0 comments  |  Read  |  Post a Comment
New Bluetooth Vulnerabilities Exposed in Aruba, Cisco, Meraki Access Points
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
'BleedingBit' could give attackers control of the wireless network from a remote vantage point.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 11/1/2018
Comment0 comments  |  Read  |  Post a Comment
Hardware Cyberattacks: How Worried Should You Be?
Kelly Sheridan, Staff Editor, Dark ReadingNews
How to fit hardware threats into your security model as hardware becomes smaller, faster, cheaper, and more complex.
By Kelly Sheridan Staff Editor, Dark Reading, 10/31/2018
Comment1 Comment  |  Read  |  Post a Comment
DeepPhish: Simulating Malicious AI to Act Like an Adversary
Kelly Sheridan, Staff Editor, Dark ReadingNews
How researchers developed an algorithm to simulate cybercriminals' use of artificial intelligence and explore the future of phishing.
By Kelly Sheridan Staff Editor, Dark Reading, 10/26/2018
Comment1 Comment  |  Read  |  Post a Comment
Side-Channel Attack Exposes User Accounts on Facebook, XBox, Other Social Sites
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Researcher will demonstrate at Black Hat Europe his team's recent discovery: a way to exploit popular user-blocking feature on social media and other sites.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 10/25/2018
Comment0 comments  |  Read  |  Post a Comment
New Security Woes for Popular IoT Protocols
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Researchers at Black Hat Europe will detail denial-of-service and other flaws in MQTT, CoAP machine-to-machine communications protocols that imperil industrial and other IoT networks online.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 10/18/2018
Comment0 comments  |  Read  |  Post a Comment
IBM Builds 'SOC on Wheels' to Drive Cybersecurity Training
Kelly Sheridan, Staff Editor, Dark ReadingNews
A tractor trailer housing a Cyber Tactical Operation Center will travel throughout the US and Europe for incident response training, security support, and education.
By Kelly Sheridan Staff Editor, Dark Reading, 10/15/2018
Comment1 Comment  |  Read  |  Post a Comment
How Secure are our Voting Systems for November 2018?
Dark Reading Staff, CommentaryVideo
Anomali CEO Hugh Njemanze discusses the importance of sharing threat intelligence across the countrys highly decentralized voting systems to safeguard the integrity of upcoming elections.
By Dark Reading Staff , 9/14/2018
Comment3 comments  |  Read  |  Post a Comment
4 Practical Measures to Improve Election Security Now
Chris Wysopal,  Chief Technology Officer, CA Veracode Commentary
It's more critical than ever for states to protect our democratic system and voting infrastructure from foreign cyber espionage.
By Chris Wysopal Chief Technology Officer, CA Veracode , 9/11/2018
Comment1 Comment  |  Read  |  Post a Comment
Lessons From the Black Hat USA NOC
Curtis Franklin Jr., Senior Editor at Dark ReadingCommentary
The conference's temporary network operations center provides a snapshot of what is possible when a variety of professionals work together.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 8/30/2018
Comment0 comments  |  Read  |  Post a Comment
Overestimating WebAssembly's Security Benefits Is Risky for Developers
Dark Reading Staff, CommentaryVideo
Although WebAssembly technology promises both better performance and better security to developers, it also creates a new risk for native exploits in the browser.
By Dark Reading Staff , 8/29/2018
Comment0 comments  |  Read  |  Post a Comment
Researcher Cracks San Francisco's Emergency Siren System
Dark Reading Staff, CommentaryVideo
Bastille researcher Balint Seeber discusses the process of creating SirenJack and cracking one of a city's critical safety systems.
By Dark Reading Staff , 8/24/2018
Comment2 comments  |  Read  |  Post a Comment
What a Forensic Analysis of 'Worst Voting Machine Ever' Turned Up
Dark Reading Staff, CommentaryVideo
University of Copenhagen associate professor discusses what he found when he dug into some decommissioned WinVote voting machines.
By Dark Reading Staff , 8/22/2018
Comment0 comments  |  Read  |  Post a Comment
The Uncertain Fate of WHOIS, & Other Matters of Internet Accountability
Dark Reading Staff, CommentaryVideo
Paul Vixie discusses the uncertain fate of WHOIS in the age of GDPR, the risks of domain name homographs, and other underpinnings of the Internet that are hard to trust and harder to fix.
By Dark Reading Staff , 8/20/2018
Comment1 Comment  |  Read  |  Post a Comment
How Better Intel Can Reduce, Prevent Payment Card Fraud
Dark Reading Staff, CommentaryVideo
Royal Bank of Canada machine learning researcher and Terbium Labs chief scientist discuss how they use intelligence about the carding market to predict the next payment card fraud victims.
By Dark Reading Staff , 8/20/2018
Comment0 comments  |  Read  |  Post a Comment
Malicious Cryptomining & Other Shifting Threats
Dark Reading Staff, CommentaryVideo
Skybox Security CMO Michelle Johnson Cobb discloses research results that include a spike in malicious cryptomining during Bitcoins peak, a shift to outside-the-perimeter mobile threats, and more.
By Dark Reading Staff , 8/17/2018
Comment0 comments  |  Read  |  Post a Comment
The Economics of AI-Enabled Security
Dark Reading Staff, CommentaryVideo
While AI greatly enhances security, Securonix CTO Tanuj Gulati points out the need for predictable cost models that insulate SOCs from the variables of massive data volume and intense real-time processing.
By Dark Reading Staff , 8/17/2018
Comment0 comments  |  Read  |  Post a Comment
Using Threat Deception on Malicious Insiders
Dark Reading Staff, CommentaryVideo
Illusive Networks CEO Ofer Israeli reveals how distributed deception technology can be as effective against insider threats as it is against outsiders, since it thwarts the lateral movement common to both.
By Dark Reading Staff , 8/17/2018
Comment0 comments  |  Read  |  Post a Comment
More Stories
Twitter Feed
Current Conversations
Posted by SaulMorris
Current Conversations i agree
In reply to: Re: Jamie Tomasello
Post Your Own Reply
Posted by mariamartin
Current Conversations yeah it's great
In reply to: Re: Great
Post Your Own Reply
More Conversations
Black Hat
Black Hat is the most technical and relevant global information security event series in the world. For more than 19 years, Black Hat has provided attendees with the very latest in information security research, development, and trends. These high-profile global Briefings and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors.
www.blackhat.com
White Papers
Video
Register for Dark Reading Newsletters
Current Issue
Cartoon Contest