Black Hat Asia 2016 
March 29 - April 1, 2016 | Marina Bay Sands | Singapore
Black Hat is returning to Asia again in 2016, and we have quite an event in store. Here the brightest professionals and researchers in the industry will come together for a total of four days--two days of deeply technical hands-on Trainings, followed by two days of the latest research and vulnerability disclosures at our Briefings. Black Hat Asia will run March 29 - April 1, 2016 at the Marina Bay Sands in Singapore.

For more information and to save $350 on your Briefings Pass by January 30, visit




Check out these online events that are available from the comfort of your computer!  View our complete list of Upcoming Webinars so you can attend a live session or our Webinar Archives for webinars that are available On-Demand!

Upcoming Webinars


10:00am PT 1:00pm ET Fooling The Hacker: What Your Enterprise Can Learn
10:00am PT 1:00pm ET Security For the Internet of Things – The Missing Link
11:00am PT 2:00pm ET Cybersecurity: How to Win the Big Game
9:00am PT 12:00pm ET How to Survive a Data Breach
10:00am PT 1:00pm ET How Bad Breaches Happen to Good Companies
10:00am PT 1:00pm ET Mythbusting the Hacker’s Playbook
10:00am PT 1:00pm ET How Wi-Fi and Bluetooth Low Energy (BLE) are Changing the Wireless World
10:00am PT 1:00pm ET Outsmart Ransomware Attacks with the Right Protection Strategy
11:00am PT 2:00pm ET Malware: New Threats and Trends
11:00am PT 2:00pm ET Spearphishing, Whaling, and Other Targeted Social Engineering Attacks On Your Users
11:00am PT 2:00pm ET How to Get Cloud Security into Your Budget


Don't forget to view our complete list of Webinar Archives for webinars that are available On-Demand!

Register for Dark Reading Newsletters
White Papers
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
According to industry estimates, about a million new IT security jobs will be created in the next two years but there aren't enough skilled professionals to fill them. On top of that, there isn't necessarily a clear path to a career in security. Dark Reading Executive Editor Kelly Jackson Higgins hosts guests Carson Sweet, co-founder and CTO of CloudPassage, which published a shocking study of the security gap in top US undergrad computer science programs, and Rodney Petersen, head of NIST's new National Initiative for Cybersecurity Education.