Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

Black Hats Focus on Apps

DC convention shows security researchers are shifting away from network infrastructure - and toward applications

Last summer's Black Hat convention in Las Vegas was a feast of attack vectors ranging from device driver flaws to network vulnerabilities to holes in copiers and printers. As the black hats prepare to meet again in Washington, D.C. next week, however, there is one clear theme: applications.

Of the 22 "briefings" scheduled for the convocation of security researchers Wed. and Thurs., 13 deal directly with issues and flaws related to applications. The schedule reinforces experts' assertions that attackers -- and the researchers who follow them -- are shifting their attention away from traditional network infrastructure vectors and focusing on software, where holes are easier to find.

Three of the sessions deal with databases, particularly Oracle. David Litchfield will present a session on advanced Oracle attack techniques, and Amichai Shulman, co-founder and CTO of Imperva, will discuss exploitable flaws in database communications protocols. Security researcher Cesar Cerrudo will do a live audit of Oracle's latest and most secure release, Oracle 10gR2, to see if he can expose vulnerabilities in the software.

Web applications will also be under the microscope. Michael Sutton, security evangelist at SPI Dynamics, will present a session on fuzzing tools for detecting vulnerabilities in applications -- an approach that has long been popular in the networking space. Consultants Chuck Willis and Rohyt Beranyi will offer a look at Web application incident response and forensics, an area where many companies are seeking skills as the number of attacks increase.

Some of the Black Hat presenters will discuss software problems where they occur most often: in the development process. Experts from Mitre will make recommendations on new standards the company is proposing for secure development.

"The secure software development community is developing a standard dictionary of the weaknesses that lead to exploitable software vulnerabilities," according to Mitre's presentation abstract. "The Common Weakness Enumeration (CWE) and related efforts are intended to serve as a unifying language of discourse, and act as a measuring stick for comparing the tools and services that analyze software for security issues."

The conference will be keynoted by Jim Christy, director of futures exploration for the Department of Defense's Cyber Crime Center.

— Tim Wilson, Site Editor, Dark Reading

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-0324
PUBLISHED: 2021-06-14
Product: AndroidVersions: Android SoCAndroid ID: A-175402462
CVE-2021-0467
PUBLISHED: 2021-06-14
In Chromecast bootROM, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege in the bootloader, with physical USB access, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: Andr...
CVE-2021-21554
PUBLISHED: 2021-06-14
Dell PowerEdge R640, R740, R740XD, R840, R940, R940xa, MX740c, MX840c, and, Dell Precision 7920 Rack Workstation BIOS contain a stack-based buffer overflow vulnerability in systems with Intel Optane DC Persistent Memory installed. A local malicious user with high privileges may potentially exploit t...
CVE-2021-21555
PUBLISHED: 2021-06-14
Dell PowerEdge R640, R740, R740XD, R840, R940, R940xa, MX740c, MX840c, and T640 Server BIOS contain a heap-based buffer overflow vulnerability in systems with NVDIMM-N installed. A local malicious user with high privileges may potentially exploit this vulnerability, leading to a denial of Service, a...
CVE-2021-21556
PUBLISHED: 2021-06-14
Dell PowerEdge R640, R740, R740XD, R840, R940, R940xa, MX740c, MX840c, and T640 Server BIOS contain a stack-based buffer overflow vulnerability in systems with NVDIMM-N installed. A local malicious user with high privileges may potentially exploit this vulnerability, leading to a denial of Service, ...