Black Hat USA
August 4-9, 2018
Las Vegas, NV, USA
Black Hat Trainings
October 22-23, 2018
Chicago, IL USA
Black Hat Europe
December 3-6, 2018
London UK
Event Updates
Transparent Orchestration of Security to Accelerate the Digital Transformation Journey
Black Hat Staff,
The extension of infrastructures from on-premises IT environments to multiple cloud ecosystems delivers organizations newly transformed digital services with increased value.
By Sumedh Thakar, Chief Product Officer, Qualys , 6/27/2018
Comment0 comments  |  Read  |  Post a Comment
Black Hat USA 2018:
Comandeering Voice Enabled Devices
Black Hat Staff,
Researchers Amichai Shulman, Ron Marcovich, Tal Be'ery and Yuval Ron will detail a vulnerability of Microsofts Cortana in their Black Hat USA Briefing Open Sesame: Picking Locks with Cortana.
By Black Hat Staff , 6/18/2018
Comment0 comments  |  Read  |  Post a Comment
Announcing: Black Hat Europe 2018
Black Hat Staff,
Black Hat Europe returns to the ExCeL London, December 3-6, 2018
By Black Hat Staff , 6/13/2018
Comment0 comments  |  Read  |  Post a Comment
More Event Updates
News & Commentary
Using Threat Deception on Malicious Insiders
Dark Reading Staff, CommentaryVideo
Illusive Networks CEO Ofer Israeli reveals how distributed deception technology can be as effective against insider threats as it is against outsiders, since it thwarts the lateral movement common to both.
By Dark Reading Staff , 8/17/2018
Comment0 comments  |  Read  |  Post a Comment
Filtering the Threat Intelligence Tsunami
Dark Reading Staff, CommentaryVideo
Reversing Labs CEO Mario Vuksan contends that SOCs are overwhelmed by global threat intelligence, and can benefit more from a targeted "pull" model that focuses on YARA-type binary pattern matching.
By Dark Reading Staff , 8/17/2018
Comment0 comments  |  Read  |  Post a Comment
Ensuring Web Applications Are Hardened, Secure
Dark Reading Staff, CommentaryVideo
Ofer Maor of Synopsys Software Integrity Group describes how automated testing can non-intrusively pinpoint where developers may be inadvertently exposing data and/or violating compliance mandates.
By Dark Reading Staff , 8/17/2018
Comment0 comments  |  Read  |  Post a Comment
Assessing & Mitigating Increased Exposure to Third-Party Risk
Dark Reading Staff, CommentaryVideo
As we increasingly connect with each other digitally, CyberGRX CRO Scott Schneider believes we need to be much more diligent about sharing validated insight into the infosec maturity of our organizations.
By Dark Reading Staff , 8/17/2018
Comment0 comments  |  Read  |  Post a Comment
Leveraging the Power of your End-Users Human Cognition
Dark Reading Staff, CommentaryVideo
Cofense CEO Rohyt Belani makes a case for more aggressively leveraging the unique ability of your most perceptive and well-trained end-users to help you more quickly spot and stop email threats.
By Dark Reading Staff , 8/17/2018
Comment0 comments  |  Read  |  Post a Comment
How Orchestration, Automation Help SOCs Do More With Less
Dark Reading Staff, CommentaryVideo
Splunks Haiyan Song and Oliver Friedrichs - co-founder of recently acquired Phantom - explain how security orchestration, automation, and response (SOAR) can empower SOCs to do more with less.
By Dark Reading Staff , 8/17/2018
Comment0 comments  |  Read  |  Post a Comment
Simplifying Defense Across the MITRE ATT&CK Matrix
Dark Reading Staff, CommentaryVideo
Endgames Mark Dufresne says SOCs can achieve better results within their existing staff and budget constraints with AI- and visualization-empowered, unified defense across the MITRE ATT&CK matrix.
By Dark Reading Staff , 8/17/2018
Comment0 comments  |  Read  |  Post a Comment
The Rise of Bespoke Ransomware
Dark Reading Staff, CommentaryVideo
Drawing from a recent study by SophosLabs, Principal Research Scientist Chester Wisniewski highlights a shift to the rise of more targeted and sophisticated ransomware threats, such as SamSam.
By Dark Reading Staff , 8/17/2018
Comment0 comments  |  Read  |  Post a Comment
Miller & Valasek: Security Stakes Higher for Autonomous Vehicles
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Car hacking specialists shift gears and work on car defense in their latest gigs - at GM subsidiary Cruise Automation.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/15/2018
Comment1 Comment  |  Read  |  Post a Comment
2018 Pwnie Awards: Who Pwned, Who Got Pwned
Kelly Sheridan, Staff Editor, Dark Reading
A team of security experts round up the best and worst of the year in cybersecurity at Black Hat 2018.
By Kelly Sheridan Staff Editor, Dark Reading, 8/15/2018
Comment0 comments  |  Read  |  Post a Comment
New PHP Exploit Chain Highlights Dangers of Deserialization
Ericka Chickowski, Contributing Writer, Dark ReadingNews
PHP unserialization can be triggered by other vulnerabilities previously considered low-risk.
By Ericka Chickowski Contributing Writer, Dark Reading, 8/15/2018
Comment0 comments  |  Read  |  Post a Comment
Hacker Unlocks 'God Mode' and Shares the 'Key'
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
At Black Hat USA and DEF CON, researcher Christopher Domas showed how he found backdoors that may exist in many different CPUs.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 8/13/2018
Comment0 comments  |  Read  |  Post a Comment
NSA Brings Nation-State Details to DEF CON
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Hackers were eager to hear the latest from the world of nation-state cybersecurity.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 8/10/2018
Comment0 comments  |  Read  |  Post a Comment
IoT Malware Discovered Trying to Attack Satellite Systems of Airplanes, Ships
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Researcher Ruben Santamarta shared the details of his successful hack of an in-flight airplane Wi-Fi network and other findings at Black Hat USA today.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/9/2018
Comment0 comments  |  Read  |  Post a Comment
Cloud Intelligence Throwdown: Amazon vs. Google vs. Microsoft
Kelly Sheridan, Staff Editor, Dark ReadingNews
A closer look at native threat intelligence capabilities built into major cloud platforms and discussion of their strengths and shortcomings.
By Kelly Sheridan Staff Editor, Dark Reading, 8/9/2018
Comment0 comments  |  Read  |  Post a Comment
Dark Reading News Desk Live at Black Hat USA 2018
Sara Peters, Senior Editor at Dark ReadingNews
Watch here Wednesday and Thursday, 2 p.m. - 6 p.m. ET to see over 40 live video interviews straight from the Black Hat USA conference in Las Vegas.
By Sara Peters Senior Editor at Dark Reading, 8/9/2018
Comment1 Comment  |  Read  |  Post a Comment
No, The Mafia Doesn't Own Cybercrime: Study
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Organized crime does, however, sometimes provide money-laundering and other expertise to cybercriminals.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/8/2018
Comment0 comments  |  Read  |  Post a Comment
Researchers Release Free TRITON/TRISIS Malware Detection Tools
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Team of experts re-creates the TRITON/TRISIS attack to better understand the epic hack of an energy plant that ultimately failed.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/8/2018
Comment0 comments  |  Read  |  Post a Comment
Google Engineering Lead on Lessons Learned From Chrome's HTTPS Push
Kelly Sheridan, Staff Editor, Dark ReadingNews
Google engineering director Parisa Tabriz took the Black Hat keynote stage to detail the Chrome transition and share advice with security pros.
By Kelly Sheridan Staff Editor, Dark Reading, 8/8/2018
Comment6 comments  |  Read  |  Post a Comment
Understanding Firewalls: Build Them Up, Tear Them Down
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
A presentation at Black Hat USA will walk attendees through developing a firewall for MacOS, and then poking holes in it.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 8/8/2018
Comment0 comments  |  Read  |  Post a Comment
More Stories
Twitter Feed
Current Conversations
More Conversations
Black Hat
Black Hat is the most technical and relevant global information security event series in the world. For more than 19 years, Black Hat has provided attendees with the very latest in information security research, development, and trends. These high-profile global Briefings and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors.
www.blackhat.com
White Papers
Video
Register for Dark Reading Newsletters
Current Issue
Cartoon Contest