Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Latest Content tagged with Black Hat
Page 1 / 2   >   >>
US National Cyber Director: Toward a New Cybersecurity Social Contract
News  |  5/16/2022  | 
In a Black Hat Asia keynote Fireside Chat, US National Cyber Director Chris Inglis outlined his vision of an effective cybersecurity public-private partnership strategy.
CISO Shares Top Strategies to Communicate Security's Value to the Biz
News  |  5/13/2022  | 
In a keynote address at Black Hat Asia in Singapore this week, CISO and former NASA security engineer George Do discussed his go-to model for measuring security effectiveness and getting others in the organization to listen.
Black Hat Asia: Democracy's Survival Depends on Taming Technology
News  |  5/13/2022  | 
The conference opens with stark outlook on the future of global democracy -- currently squeezed between Silicon Valley and China.
Transforming SQL Queries Bypasses WAF Security
News  |  5/12/2022  | 
A team of university researchers finds a machine learning-based approach to generating HTTP requests that slip past Web application firewalls.
Known macOS Vulnerabilities Led Researcher to Root Out New Flaws
News  |  5/12/2022  | 
Researcher shares how he unearthed newer bugs in Apple's operating system by closer scrutiny of previous research, including vulnerabilities that came out of the Pwn2Own competition.
1,000+ Attacks in 2 Years: How the SideWinder APT Sheds Its Skin
News  |  5/5/2022  | 
Researcher to reveal fresh details at Black Hat Asia on a tenacious cyber-espionage group attacking specific military, law enforcement, aviation, and other entities in Central and South Asia.
How to Negotiate With Ransomware Attackers
News  |  11/15/2021  | 
Security researchers investigate the ransom negotiation process to create strategies businesses can use if they face an attack.
Cloud Attack Analysis Unearths Lessons for Security Pros
News  |  11/11/2021  | 
Researchers detail their investigation of a cryptomining campaign stealing AWS credentials and how attackers have evolved their techniques.
What Happens If Time Gets Hacked
News  |  11/11/2021  | 
Renowned hardware security expert raises alarm on the risk and dangers of cyberattackers targeting the current time-synchronization infrastructure.
Hacker-for-Hire Group Spied on More Than 3,500 Targets in 18 Months
News  |  11/10/2021  | 
Russian-speaking "Void Balaur" group's victims include politicians, dissidents, human rights activists, doctors, and journalists, security vendor discloses at Black Hat Europe 2021.
ChaosDB: Researchers Share Technical Details of Azure Flaw
News  |  11/10/2021  | 
Wiz researchers who discovered a severe flaw in the Azure Cosmos DB database discussed the full extent of the vulnerability at Black Hat Europe.
Securing the Public: Who Should Take Charge?
News  |  11/10/2021  | 
International policy expert Marietke Schaake explores the intricacies of protecting the public as governments depend on private companies to build and secure digital infrastructure.
Dark Reading Video News Desk Comes to Black Hat Europe
News  |  11/10/2021  | 
While attendees join Black Hat Europe 2021 virtually and live in London, we bring you prerecorded interviews from remote offices around the world.
Researcher Details Vulnerabilities Found in AWS API Gateway
News  |  11/10/2021  | 
AWS fixed the security flaws that left the API service at risk of so-called HTTP header-smuggling attacks, says the researcher who discovered them.
Free Tool Scans Web Servers for Vulnerability to HTTP Header-Smuggling Attacks
News  |  11/1/2021  | 
A researcher will release an open source tool at Black Hat Europe next week that roots out server weaknesses to a sneaky type of attack.
APTs, Teleworking, and Advanced VPN Exploits: The Perfect Storm
News  |  10/29/2021  | 
A Mandiant researcher shares the details of an investigation into the misuse of Pulse Secure VPN devices by suspected state-sponsored threat actors.
Read Between the Lines: Finding Flaws in EPUB Reading Systems
News  |  10/27/2021  | 
Security researchers who analyzed 97 free EPUB reading applications found half are not compliant with security recommendations.
Who's In Your Wallet? Exploring Mobile Wallet Security
News  |  10/25/2021  | 
Security flaws in contactless payments for transportation systems could lead to fraud for stolen devices, researchers find.
Applying Behavioral Psychology to Strengthen Your Incident Response Team
News  |  10/11/2021  | 
A deep-dive study on the inner workings of incident response teams leads to a framework to apply behavioral psychology principles to CSIRTs.
FragAttacks Foil 2 Decades of Wireless Security
News  |  8/6/2021  | 
Wireless security protocols have improved, but product vendors continue to make implementation errors that allow a variety of attacks.
Researchers Call for 'CVE' Approach for Cloud Vulnerabilities
News  |  8/6/2021  | 
New research suggests isolation among cloud customer accounts may not be a given -- and the researchers behind the findings issue a call to action for cloud security.
HTTP/2 Implementation Errors Exposing Websites to Serious Risks
News  |  8/5/2021  | 
Organizations that don't implement end-to-end HTTP/2 are vulnerable to attacks that redirect users to malicious sites and other threats, security researcher reveals at Black Hat USA.
CISA Launches JCDC, the Joint Cyber Defense Collaborative
News  |  8/5/2021  | 
"We can't do this alone," the new CISA director told attendees in a keynote at Black Hat USA today.
Incident Responders Explore Microsoft 365 Attacks in the Wild
News  |  8/5/2021  | 
Mandiant experts discuss the novel techniques used to evade detection, automate data theft, and achieve persistent access.
Researchers Find Significant Vulnerabilities in macOS Privacy Protections
News  |  8/5/2021  | 
Attacks require executing code on a system but foil Apple's approach to protecting private data and systems files.
A New Approach to Securing Authentication Systems' Core Secrets
News  |  8/5/2021  | 
Researchers at Black Hat USA explain issues around defending "Golden Secrets" and present an approach to solving the problem.
Organizations Still Struggle to Hire & Retain Infosec Employees: Report
News  |  8/5/2021  | 
Security leaders are challenged to fill application security and cloud computing jobs in particular, survey data shows.
Why Supply Chain Attacks Are Destined to Escalate
News  |  8/5/2021  | 
In his keynote address at Black Hat USA on Wednesday, Matt Tait, chief operating officer at Corellium, called for software platform vendors and security researchers to do their part to thwart the fallout of software supply chain compromises.
New Normal Demands New Security Leadership Structure
News  |  8/2/2021  | 
At the inaugural Omdia Analyst Summit, experts discuss where the past year has created gaps in traditional security strategy and how organizations can fill them.
Multiple Zero-Day Flaws Discovered in Popular Hospital Pneumatic Tube System
News  |  8/2/2021  | 
"PwnedPiper" flaws could allow attackers to disrupt delivery of lab samples or steal hospital employee credentials, new research shows.
8 Security Tools to be Unveiled at Black Hat USA
Slideshows  |  7/28/2021  | 
Security researchers and practitioners share a host of new cyber tools for penetration testing, reverse engineering, malware defense, and more.
7 Hot Cyber Threat Trends to Expect at Black Hat
Slideshows  |  7/22/2021  | 
A sneak peek of some of the main themes at Black Hat USA next month.
Researchers Create New Approach to Detect Brand Impersonation
News  |  7/16/2021  | 
A team of Microsoft researchers developed and trained a Siamese Neural Network to detect brand impersonation attacks.
New Framework Aims to Describe & Address Complex Social Engineering Attacks
News  |  7/9/2021  | 
As attackers use more synthetic media in social engineering campaigns, a new framework is built to describe threats and provide countermeasures.
Microsoft Releases Emergency Patch for 'PrintNightmare' Vuln
News  |  7/7/2021  | 
It urges organizations to immediately apply security update, citing exploit activity.
Researchers Learn From Nation-State Attackers' OpSec Mistakes
News  |  7/6/2021  | 
Security researchers discuss how a series of simple and consistent mistakes helped them learn more about ITG18, better known as Charming Kitten.
Microsoft Issues New CVE for 'PrintNightmare' Flaw
News  |  7/2/2021  | 
Company says remote code execution issue in all Windows versions is different from one in Windows Print Spooler that it had patched last month, though both affect same function.
Attackers Already Unleashing Malware for Apple macOS M1 Chip
News  |  6/30/2021  | 
Apple security expert Patrick Wardle found that some macOS malware written for the new M1 processor can bypass anti-malware tools.
The Danger of Action Bias: Is It Always Better to Act Quickly?
News  |  6/28/2021  | 
Experts discuss the meaning of action bias and how it presents a threat to IT security leaders, practitioners, and users.
New DNS Name Server Hijack Attack Exposes Businesses, Government Agencies
News  |  6/23/2021  | 
Researchers found a "novel" class of DNS vulnerabilities in AWS Route53 and other DNS-as-a-service offerings that leak sensitive information on corporate and government customers, with one simple registration step.
Survey Seeks to Learn How 2020 Changed Security
Quick Hits  |  6/23/2021  | 
Respondents to a new Dark Reading/Omdia survey will be entered into a drawing for a Black Hat Black Card.
New Techniques Emerge for Abusing Windows Services to Gain System Control
News  |  5/6/2021  | 
Organizations should apply principles of least privilege to mitigate threats, security researcher says.
Researchers Explore Active Directory Attack Vectors
News  |  5/3/2021  | 
Incident responders who investigate attacks targeting Active Directory discuss methods used to gain entry, elevate privileges, and control target systems.
Dark Reading Celebrates 15th Anniversary
Commentary  |  5/3/2021  | 
Cybersecurity news site begins 16th year with plans to improve site, deliver more content on cyber threats and best practices.
Researchers Connect Complex Specs to Software Vulnerabilities
News  |  4/29/2021  | 
Following their release of 70 different vulnerabilities in different implementations of TCP/IP stacks over the past year, two companies find a common link.
Do Cyberattacks Affect Stock Prices? It Depends on the Breach
News  |  4/27/2021  | 
A security researcher explores how data breaches, ransomware attacks, and other types of cybercrime influence stock prices.
10 Free Security Tools at Black Hat Asia 2021
Slideshows  |  4/22/2021  | 
Researchers are set to demonstrate a plethora of tools for conducting pen tests, vulnerability assessments, data forensics, and a wide range of other use cases.
Security Gaps in IoT Access Control Threaten Devices and Users
News  |  4/16/2021  | 
Researchers spot problems in how IoT vendors delegate device access across multiple clouds and users.
Cartoon Caption Winner: Insider Threat
Commentary  |  2/8/2021  | 
And the winner of Dark Reading's January cartoon caption contest is ...
DoJ's Microsoft 365 Email Accounts Compromised in SolarWinds Attacks
Quick Hits  |  1/6/2021  | 
Three percent of email accounts were breached, the Department of Justice reports.
Page 1 / 2   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Practical Network Security Approaches for a Multicloud, Hybrid IT World
The report covers areas enterprises should focus on for their multicloud/hybrid cloud security strategy: -increase visibility over the environment -learning cloud-specific skills -relying on established security frameworks -re-architecting the network
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-30333
PUBLISHED: 2022-05-09
RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected.
CVE-2022-23066
PUBLISHED: 2022-05-09
In Solana rBPF versions 0.2.26 and 0.2.27 are affected by Incorrect Calculation which is caused by improper implementation of sdiv instruction. This can lead to the wrong execution path, resulting in huge loss in specific cases. For example, the result of a sdiv instruction may decide whether to tra...
CVE-2022-28463
PUBLISHED: 2022-05-08
ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow.
CVE-2022-28470
PUBLISHED: 2022-05-08
marcador package in PyPI 0.1 through 0.13 included a code-execution backdoor.
CVE-2022-1620
PUBLISHED: 2022-05-08
NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.