Over 40 interviews streaming live right from Black Hat USA, July 26-27, from 2 p.m. - 7 p.m. Eastern Time (11 - 4 P.T.).
The Dark Reading News Desk returns to Las Vegas today, bringing you live video coverage of Black Hat USA straight from the Mandalay Bay Wednesday, July 26 and Thursday, July 27 from 2 p.m. to 7 p.m. Eastern Time (11 a.m. to 4 p.m. P.T.). Watch the Day 1 interviews here.
We'll be conducting over 40 interviews with a wide variety of Black Hat speakers and sponsors, including Dino Dai Zovi, Billy Rios, Ruben Santamarta, Paul Vixie, Chris Wysopal, Mikko Hypponen and Robert Lee.
We'll talk about the Shadow Brokers, ransomware-resilient file systems, IoT honeypots, Active Directory botnets, exploiting exploits, hacking Tesla, threat hunting, machine learning, killer robots and much more.
It all starts right here at 2:00 p.m. Eastern Time (11 a.m. Pacific) Wednesday, July 26.
Follow along on Twitter @DarkReading and #DRNewsDesk to see who's coming to the stage next.
Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio
5 Emerging Cyber Threats to Watch for in 2019Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Norton Security (Windows client) prior to 22.16.3 and SEP SBE (Windows client) prior to Cloud Agent 3.00.31.2817, NIS-126.96.36.199 & SEP-12.1.7484.7002, may be susceptible to a DLL Preloading vulnerability, which is a type of issue that can occur when an application looks to call a DLL for executi...
A Buffer Overflow in Network::AuthenticationClient::VerifySignature in /bin/astro in Neato Botvac Connected 2.2.0 allows a remote attacker to execute arbitrary code with root privileges via a crafted POST request to a nucleo.neatocloud.com:4443/vendors/neato/robots/[robot_serial]/messages Neato clou...
DaviewIndy 8.98.7 and earlier versions have a Heap-based overflow vulnerability, triggered when the user opens a specific file that is mishandled by Daview.exe. Attackers could exploit this and arbitrary code execution. .
DaviewIndy 8.98.7 and earlier versions have a Heap-based overflow vulnerability, triggered when the user opens a malformed JPEG2000 format file that is mishandled by Daview.exe. Attackers could exploit this and arbitrary code execution.