Black Hat Europe
December 4-7, 2017
London UK
Black Hat Asia
March 20-23, 2018
Black Hat USA
August 4-9, 2018
Las Vegas, NV, USA
09:00 AM
Black Hat Staff
Black Hat Staff
Event Updates

Black Hat Asia 2018:
First Briefings Announced

Black Hat Asia returns to Singapore, March 20-23, 2018 with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier solutions and service providers in the Business Hall, and more.

As our Review Board members continue to work their way through a record number of submissions, we are releasing new selections in batches. Below are the first announced Black Hat Asia 2018 Briefings, with links to their abstracts.

A Deal with the Devil: Breaking Smart Contracts
By David Wong & Mason Hemmel

Analyzing & Breaking Exploit Mitigations and PRNGs on QNX for Automotive, Industrial, Medical and other Embedded Systems
By Ali Abbasi & Jos Wetzels

Breaking State-of-the-Art Binary Code Obfuscation via Program Synthesis
By Moritz Contag & Tim Blazytko

Breaking the Attack Graph: How to Leverage Graphs to Strengthen Security in a Domain Environment
By Marina Simakov

Counter-Infiltration: Future-Proof Counter Attacks Against Exploit Kit Infrastructure
By Yin Minn Pa Pa

Cyber Comrades: Alliance-Building in Cyberspace
By Kenneth Geers

Documenting the Undocumented: The Rise and Fall of AMSI
By Tal Liberman

I Don't Want to Sleep Tonight: Subverting Intel TXT with S3 Sleep
By Jun-Hyeok Park & Seunghun Han

Invoke-DOSfuscation: Techniques FOR %F IN (-style) DO (S-level CMD Obfuscation)
By Daniel Bohannon

RustZone: Writing Trusted Applications in Rust
By Eric Evenchick

Black Hat will release new Briefings on a regular basis. Keep an eye out for more announcements and register today to lock in early rates and save.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Who Does What in Cybersecurity at the C-Level
Steve Zurier, Freelance Writer,  3/16/2018
Trump Administration Slaps Sanctions on Russian Hackers, Operatives
Kelly Jackson Higgins, Executive Editor at Dark Reading,  3/15/2018
The Case for Integrating Physical Security & Cybersecurity
Paul Kurtz, CEO & Cofounder, TruSTAR Technology,  3/20/2018
Register for Dark Reading Newsletters
White Papers
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.