Vulnerabilities / Threats // Advanced Threats
8/4/2014
04:24 PM
Tim Wilson
Tim Wilson
Commentary
50%
50%

Dark Reading Plans Special Coverage Of Black Hat USA 2014

Radio shows, daily newsletter, and panel sessions highlight Dark Reading's comprehensive coverage of the Black Hat conference.

LAS VEGAS, NEVADA — The Black Hat USA 2014 conference is under way here this week, and Dark Reading is preparing a broad range of special coverage for this year's show.

To begin with, we have already posted more than 30 session previews, speaker announcements, radio show broadcasts, and other items about the show. You'll find all of our show coverage -- both today and all through this exciting week -- on Dark Reading's special Black Hat News page, which is now a regular feature of the Dark Reading site. On this page, you will find a constant stream of news from the show, including news stories, interviews, and onsite commentary from our editorial team and from expert contributors who are here in Las Vegas.

On Tuesday, editors Kelly Jackson Higgins and Tim Wilson will be doing live interviews with top security industry speakers at the annual Black Hat Executive Summit, an invitation-only gathering of IT security exectives from around the globe. Among the interviews are Phyllis Schneck, Deputy Under Secretary for Cybersecurity at the Department of Homeland Security's National Protection and Programs Directorate; Rod Beckstrom, Chief Security Advisor at Samsung and former President and CEO of ICANN; and Paul Vixie, CEO of Farsight and member of the Internet Hall of Fame.

On Wednesday and Thursday, the Dark Reading team will launch the first-ever edition of its Black Hat Radio program, which will offer live interviews with top speakers from the conference. Among the interviews are Jim Reavis, co-founder of the Cloud Security Alliance and Tom Cross, Director of Security Research at Lancope, who will discuss their presentations at Black Hat. Check the Dark Reading Radio section of the DR homepage for the latest schedule of radio shows and interviews.

On Thursday, Dark Reading will sponsor two special workshops on security research: The Future of Responsible Disclosure and Attribution: What It Means For Enterprise Security. The disclosure panel will focus on how researchers reveal security vulnerabilities and features experts Tod Beardsley of Rapid7 and Metasploit; Dino Dai Zovi of @ Square; Vinnie Liu of Bishop Fox; and Katie Moussouris of HackerOne. The attribution panel will focus on the nature and value of identifying your attacker and features Adam Meyers of CrowdStrike; Chris Nutt of Mandiant/FireEye; Chris Porter of the Verizon Cyber Intelligence Center; and Lucas Zaichkowsky of AccessData.

On Tuesday, Wednesday and Thursday, Dark Reading will send out a daily newsletter to its subscribers as well as Black Hat conference attendees. The newsletter, which will feature show-focused news and commentary as well as highlights of each day's Black Hat events, will be mailed automatically to Dark Reading newsletter subscribers. If you have not subscribed and would like to receive the newsletters, you can sign up here.

During the course of this Black Hat week, as well as later this month, Dark Reading will add many more news stories, columns, slide shows, photos, and radio broadcasts to its archive of Black Hat coverage. For all the latest from the show, as well as the opportunity to comment and add to the discussion, keep an eye on Dark Reading in the days ahead. We look forward to the conference!

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-2849
Published: 2015-07-07
SQL injection vulnerability in main.ant in the ANTlabs InnGate firmware on IG 3100, InnGate 3.01 E, InnGate 3.10 E, InnGate 3.10 M, SG 4, and SSG 4 devices, when https is used, allows remote attackers to execute arbitrary SQL commands via the ppli parameter.

CVE-2015-2850
Published: 2015-07-07
Cross-site scripting (XSS) vulnerability in index-login.ant in the ANTlabs InnGate firmware on IG 3100, InnGate 3.01 E, InnGate 3.10 E, InnGate 3.10 M, SG 4, and SSG 4 devices allows remote attackers to inject arbitrary web script or HTML via the msg parameter.

CVE-2015-3216
Published: 2015-07-07
Race condition in a certain Red Hat patch to the PRNG lock implementation in the ssleay_rand_bytes function in OpenSSL, as distributed in openssl-1.0.1e-25.el7 in Red Hat Enterprise Linux (RHEL) 7 and other products, allows remote attackers to cause a denial of service (application crash) by establi...

CVE-2014-3653
Published: 2015-07-06
Cross-site scripting (XSS) vulnerability in the template preview function in Foreman before 1.6.1 allows remote attackers to inject arbitrary web script or HTML via a crafted provisioning template.

CVE-2014-5406
Published: 2015-07-06
The Hospira LifeCare PCA Infusion System before 7.0 does not validate network traffic associated with sending a (1) drug library, (2) software update, or (3) configuration change, which allows remote attackers to modify settings or medication data via packets on the (a) TELNET, (b) HTTP, (c) HTTPS, ...

Dark Reading Radio
Archived Dark Reading Radio
Marc Spitler, co-author of the Verizon DBIR will share some of the lesser-known but most intriguing tidbits from the massive report