Vulnerabilities / Threats
8/2/2016
02:45 PM
Marilyn Cohodas
Marilyn Cohodas
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

Dark Reading Radio at Black Hat 2016: 2 Shows, 4 #BHUSA Presenters

Even if you can't physically be at Black Hat USA 2016, Dark Reading offers a virtual alternative to engage with presenters about hot show topics and trends.

Couldn’t make the trip? Not to worry. Dark Reading editors over the last few weeks have interviewed key Black Hat figures and presenters to give you a taste of the show in two pre-recorded Dark Reading Radio episodes to be broadcast Wednesday Aug 3 and Thursday Aug 4.

Here’s the lineup:

Dark Reading Radio at Black Hat 2016, Episode 1:
Date/Time: Wednesday, August 03, 2016, 1:00 p.m. New York / 10:00 a.m. Las Vegas
Guests: Black Hat General Manager Steve Wylie & Bugcrowd Senior Director of Researcher Operations Kymberlee Price

In this episode, Editor In Chief Tim Wilson talks with Black Hat General Manager Steve Wylie about the many programs and sessions being offered at this week’s Black Hat USA conference, highlighting some of the show’s most important keynote adresses, hot topics in the briefings, and new programs built around security careers and startup companies. He also tells Tim what makes Black Hat a different type of information security event – from in-depth training to social functions that bring security pros together.

In the second segment of the radio show, Kymberlee Price, give yours truly a behind the scenes look at how to build a security incident response team using crowd sourcing. Kymberlee is senior director of researcher operations at Bugcrowd. She’ll be offering some takeaways and tips from her Black Hat 16 briefing Building a Product Security Incident Response Team: Learnings from the Hivemind, which she is presenting this week at the Mandalay Bay in Las Vegas.

Dark Reading Radio at Black Hat 2016, Episode 2
Date/Time: Thursday, August 04, 2016, 1:00 p.m. New York / 10:00 a.m. Las Vegas
Guests:  Wesley McGrew, Director of Cyber Operations at Horne Cyber & Konstantin Berlin, Senior Research Engineer at Invincea Labs

In this special episode of Dark Reading Radio, Executive Editor Kelly Jackson Higgins talks to Wesley McGrew, director of cyber operations at Horne Cyber, about his research on hacking penetration testers, "Secure Penetration Testing Operations: Demonstrated Weaknesses In Learning Material And Tools." McGrew over the past few years has been examining vulnerabilities and security weaknesses in penetration testing tools, processes, and practices, and will release his homegrown Snagterpreter tool at Black Hat that allows an attacker to hijack, monitor, and alter traffic between the pen tester and his or her target/client.

Capping things off, is Sara Peters interview with Konstantin Berlin, senior research engineer at Invincea Labs. Berlin hones in one of the key cybersecurity promises of machine learning (particularly "deep learning") for security analysis, with a focus on how to take give organizations more information about unfamiliar code than simply "it's benign" or "it's malicious." His talk is, "An AI Approach To Malware Similarity Analysis: Mapping The Malware Genome with a Deep Neural Network."

Hope you to see you in the radio studio on Wednesday and Thursday. And if you can't make it this week, you can view the show in our archives at your convenience. (Registration is Required.)

 

 

Marilyn has been covering technology for business, government, and consumer audiences for over 20 years. Prior to joining UBM, Marilyn worked for nine years as editorial director at TechTarget Inc., where she launched six Websites for IT managers and administrators supporting ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.