Vulnerabilities / Threats // Advanced Threats
8/4/2014
04:24 PM
Tim Wilson
Tim Wilson
Commentary
50%
50%

Dark Reading Plans Special Coverage Of Black Hat USA 2014

Radio shows, daily newsletter, and panel sessions highlight Dark Reading's comprehensive coverage of the Black Hat conference.

LAS VEGAS, NEVADA — The Black Hat USA 2014 conference is under way here this week, and Dark Reading is preparing a broad range of special coverage for this year's show.

To begin with, we have already posted more than 30 session previews, speaker announcements, radio show broadcasts, and other items about the show. You'll find all of our show coverage -- both today and all through this exciting week -- on Dark Reading's special Black Hat News page, which is now a regular feature of the Dark Reading site. On this page, you will find a constant stream of news from the show, including news stories, interviews, and onsite commentary from our editorial team and from expert contributors who are here in Las Vegas.

On Tuesday, editors Kelly Jackson Higgins and Tim Wilson will be doing live interviews with top security industry speakers at the annual Black Hat Executive Summit, an invitation-only gathering of IT security exectives from around the globe. Among the interviews are Phyllis Schneck, Deputy Under Secretary for Cybersecurity at the Department of Homeland Security's National Protection and Programs Directorate; Rod Beckstrom, Chief Security Advisor at Samsung and former President and CEO of ICANN; and Paul Vixie, CEO of Farsight and member of the Internet Hall of Fame.

On Wednesday and Thursday, the Dark Reading team will launch the first-ever edition of its Black Hat Radio program, which will offer live interviews with top speakers from the conference. Among the interviews are Jim Reavis, co-founder of the Cloud Security Alliance and Tom Cross, Director of Security Research at Lancope, who will discuss their presentations at Black Hat. Check the Dark Reading Radio section of the DR homepage for the latest schedule of radio shows and interviews.

On Thursday, Dark Reading will sponsor two special workshops on security research: The Future of Responsible Disclosure and Attribution: What It Means For Enterprise Security. The disclosure panel will focus on how researchers reveal security vulnerabilities and features experts Tod Beardsley of Rapid7 and Metasploit; Dino Dai Zovi of @ Square; Vinnie Liu of Bishop Fox; and Katie Moussouris of HackerOne. The attribution panel will focus on the nature and value of identifying your attacker and features Adam Meyers of CrowdStrike; Chris Nutt of Mandiant/FireEye; Chris Porter of the Verizon Cyber Intelligence Center; and Lucas Zaichkowsky of AccessData.

On Tuesday, Wednesday and Thursday, Dark Reading will send out a daily newsletter to its subscribers as well as Black Hat conference attendees. The newsletter, which will feature show-focused news and commentary as well as highlights of each day's Black Hat events, will be mailed automatically to Dark Reading newsletter subscribers. If you have not subscribed and would like to receive the newsletters, you can sign up here.

During the course of this Black Hat week, as well as later this month, Dark Reading will add many more news stories, columns, slide shows, photos, and radio broadcasts to its archive of Black Hat coverage. For all the latest from the show, as well as the opportunity to comment and add to the discussion, keep an eye on Dark Reading in the days ahead. We look forward to the conference!

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-1421
Published: 2014-11-25
mountall 1.54, as used in Ubuntu 14.10, does not properly handle the umask when using the mount utility, which allows local users to bypass intended access restrictions via unspecified vectors.

CVE-2014-3605
Published: 2014-11-25
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-6407. Reason: This candidate is a reservation duplicate of CVE-2014-6407. Notes: All CVE users should reference CVE-2014-6407 instead of this candidate. All references and descriptions in this candidate have been removed to pre...

CVE-2014-7839
Published: 2014-11-25
DocumentProvider in RESTEasy 2.3.7 and 3.0.9 does not configure the (1) external-general-entities or (2) external-parameter-entities features, which allows remote attackers to conduct XML external entity (XXE) attacks via unspecified vectors.

CVE-2014-8001
Published: 2014-11-25
Buffer overflow in decode.cpp in Cisco OpenH264 1.2.0 and earlier allows remote attackers to execute arbitrary code via an encoded media file.

CVE-2014-8002
Published: 2014-11-25
Use-after-free vulnerability in decode_slice.cpp in Cisco OpenH264 1.2.0 and earlier allows remote attackers to execute arbitrary code via an encoded media file.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?