Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Author

 Black Hat Staff
RSS
E-Mail

Profile of Black Hat Staff

News & Commentary Posts: 196
Articles by Black Hat Staff

Shifting Left in the Cybersecurity Defense Lifecycle

2/28/2019
Identifying your risk posture should be the first objective of all cybersecurity programs. Yet, this is where organizations often fail, due to weak visibility and understanding during the crucial identify phase of the cybersecurity lifecycle. Focusing on protect, detect, respond, recover without an understanding of risk posture leads to failed security strategies.

Post a Comment

Protect DNS, Protect business

10/29/2018
DNS plays a critical role in every network. However, it is often overlooked by many security solutions and not integrated into cyber hygiene programs, leaving an easily-accessed back door open for criminals into many networks.

Post a Comment

THE NEW NETWORK EDGE THE SERVER

10/22/2018
One of the most damaging aspects of modern cyberattacks is when an attacker achieves persistence the ability to penetrate a network and dwell for long periods of time, moving from system to system and gathering valuable data. The goal of the security industry must be to deny an attacker from moving freely once inside.

Post a Comment

Black Hat Asia 2018:
First Briefings Announced

12/13/2017
Black Hat Asia returns to Singapore, March 20-23, 2018 with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier solutions and service providers in the Business Hall, and more.

Post a Comment

Black Hat USA 2017:
Data Forensices and Incident Response Roadmap

6/5/2017
Strong data forensics and incident response capabilities are critical for agile breach detection and mitigation. Challenges of multiple access points, the influx of mobile and connected devices and the large amount of resulting data makes this an arduous task. Build these highly sought after skills at Black Hat USA with the Data Forensics and Incident Response track

Post a Comment

Black Hat USA 2017:
Predominance of Internet of Things

5/30/2017
Expected rise in IoT breaches and complexities points to a need for advanced knowledge of IoT practicalities and fundamentals. Navigate the dynamic threat landscape with these Black Hat USA offerings and view the Briefings IoT Track to begin customizing your Black Hat USA experience.

Post a Comment

Black Hat USA 2017:
Security Challenges in the Enterprise

5/2/2017
Growing costs of incident management and remediation have heightened the need for new breach mitigation strategies and tools. Enterprise systems are particularly susceptible to compromise with unique challenges to risk visibility and assessment. Unobstructed view and comprehensive knowledge of the threat surface is critical to preempting attack vectors and mitigating breach incidents.

Post a Comment
Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-10062
PUBLISHED: 2021-05-13
The HTMLSanitizer class in html-sanitizer.ts in all released versions of the Aurelia framework 1.x repository is vulnerable to XSS. The sanitizer only attempts to filter SCRIPT elements, which makes it feasible for remote attackers to conduct XSS attacks via (for example) JavaScript code in an attri...
CVE-2020-23995
PUBLISHED: 2021-05-13
An information disclosure vulnerability in ILIAS before 5.3.19, 5.4.12 and 6.0 allows remote authenticated attackers to get the upload data path via a workspace upload.
CVE-2020-23996
PUBLISHED: 2021-05-13
A local file inclusion vulnerability in ILIAS before 5.3.19, 5.4.10 and 6.0 allows remote authenticated attackers to execute arbitrary code via the import of personal data.
CVE-2021-29510
PUBLISHED: 2021-05-13
Pydantic is a data validation and settings management using Python type hinting. In affected versions passing either `'infinity'`, `'inf'` or `float('inf')` (or their negatives) to `datetime` or `date` fields causes validation to run forever with 100% CPU usage (on one CPU). Pydantic has been patche...
CVE-2021-23906
PUBLISHED: 2021-05-13
An issue was discovered in the Headunit NTG6 in the MBUX Infotainment System on Mercedes-Benz vehicles through 2021. A Message Length is not checked in the HiQnet Protocol, leading to remote code execution.