The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Next-Generation Supply Chain Security
Jun 07, 2023
Here's What Zero Trust Really Means
Jun 13, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter Sign-Up
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Next-Generation Supply Chain Security
Jun 07, 2023
Here's What Zero Trust Really Means
Jun 13, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Next-Generation Supply Chain Security
Jun 07, 2023
Here's What Zero Trust Really Means
Jun 13, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter Sign-Up
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
How to Launch a Threat Hunting Program | Webinar <REGISTER>
Event
How to Accelerate XDR Outcomes: Bridging the Gap Between Network and Endpoint | Webinar <REGISTER>
Report
Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | <READ IT NOW>
Previous
Next
The Global Leader in Cybersecurity Events & Trainings.
Click
here
to learn more.
Black Hat News
Updates and insights from Black Hat.
Severe RCE Bugs Open Thousands of Industrial IoT Devices to Cyberattack
Researchers found 11 vulnerabilities in products from three industrial cellular router vendors that attackers can exploit through various vectors, bypassing all security layers.
May 16, 2023
Researchers found 11 vulnerabilities in products from three industrial cellular router vendors that attackers can exploit through various vectors, bypassing all security layers.
by Elizabeth Montalbano, Contributor, Dark Reading
May 16, 2023
5 MIN READ
Article
'Very Noisy': For the Black Hat NOC, It's All Malicious Traffic All the Time
Black Hat Asia's NOC team gives a look inside what's really happening on the cyberfront during these events.
May 12, 2023
Black Hat Asia's NOC team gives a look inside what's really happening on the cyberfront during these events.
by Tara Seals, Managing Editor, News, Dark Reading
May 12, 2023
5 MIN READ
Article
Firmware Looms as the Next Frontier for Cybersecurity
Software bugs are ubiquitous, and we're familiar with hardware threats. But what about the gap in the middle? Two researchers at Black Hat Asia will attempt to focus our attention there.
April 28, 2023
Software bugs are ubiquitous, and we're familiar with hardware threats. But what about the gap in the middle? Two researchers at Black Hat Asia will attempt to focus our attention there.
by Nate Nelson, Contributing Writer, Dark Reading
April 28, 2023
4 MIN READ
Article
Popular Fitness Apps Leak Location Data Even When Users Set Privacy Zones
Unsophisticated attackers can pinpoint where a person lives by lifting metadata from Strava and other apps, even if they're using a feature specifically aimed at protecting their location information.
April 19, 2023
Unsophisticated attackers can pinpoint where a person lives by lifting metadata from Strava and other apps, even if they're using a feature specifically aimed at protecting their location information.
by Elizabeth Montalbano, Contributor, Dark Reading
April 19, 2023
6 MIN READ
Article
Black Hat Flashback: The Deadly Consequences of Weak Medical Device Security
Hacking to kill: Dark Reading's Fahmida Y. Rashid reflects on the monumental Black Hat 2011 moment when Jay Radcliffe showed how to hack his insulin pump.
January 10, 2023
Hacking to kill: Dark Reading's Fahmida Y. Rashid reflects on the monumental Black Hat 2011 moment when Jay Radcliffe showed how to hack his insulin pump.
by Becky Bracken, Editor, Dark Reading
January 10, 2023
1 MIN READ
Video
Black Hat Flashback: The Day That Dan Kaminsky Saved the Internet
Dark Reading's Kelly Jackson Higgins explains the enormous legacy left behind by Dan Kaminsky and his seminal "Great DNS Vulnerability" talk at Black Hat 2008.
January 03, 2023
Dark Reading's Kelly Jackson Higgins explains the enormous legacy left behind by Dan Kaminsky and his seminal "Great DNS Vulnerability" talk at Black Hat 2008.
by Becky Bracken, Editor, Dark Reading
January 03, 2023
1 MIN READ
Video
Live From London: Next-Gen Cybersecurity Takes Stage at Black Hat Europe
Check out our slideshow detailing the emerging cybersecurity trends in cloud, creating a defensible Internet, malware evolution, and more that lit up audiences in London.
December 16, 2022
Check out our slideshow detailing the emerging cybersecurity trends in cloud, creating a defensible Internet, malware evolution, and more that lit up audiences in London.
by Dark Reading Staff, Dark Reading
December 16, 2022
10 MIN READ
Slideshow
Metaparasites & the Dark Web: Scammers Turn on Their Own
Sophos research unveiled at Black Hat Europe details a thriving subeconomy of fraud on the cybercrime underground, aimed at Dark Web forum users.
December 12, 2022
Sophos research unveiled at Black Hat Europe details a thriving subeconomy of fraud on the cybercrime underground, aimed at Dark Web forum users.
by Tara Seals, Managing Editor, News, Dark Reading
December 12, 2022
6 MIN READ
Article
3 Ways Attackers Bypass Cloud Security
At Black Hat Europe, a security researcher details the main evasion techniques attackers are currently using in the cloud.
December 09, 2022
At Black Hat Europe, a security researcher details the main evasion techniques attackers are currently using in the cloud.
by Kelly Jackson Higgins, Editor-in-Chief, Dark Reading
December 09, 2022
3 MIN READ
Article
Hacker Fails for the Win
Security researchers share their biggest initial screwups in some of their key vulnerability discoveries.
December 08, 2022
Security researchers share their biggest initial screwups in some of their key vulnerability discoveries.
by Kelly Jackson Higgins, Editor-in-Chief, Dark Reading
December 08, 2022
3 MIN READ
Article
For Cyberattackers, Popular EDR Tools Can Turn into Destructive Data Wipers
Microsoft, three others release patches to fix a vulnerability in their respective products that enables such manipulation. Other EDR products potentially are affected as well.
December 07, 2022
Microsoft, three others release patches to fix a vulnerability in their respective products that enables such manipulation. Other EDR products potentially are affected as well.
by Jai Vijayan, Contributing Writer, Dark Reading
December 07, 2022
4 MIN READ
Article
SOC Turns to Homegrown Machine Learning to Catch Cyber Intruders
A do-it-yourself machine learning system helped a French bank detect three types of exfiltration attacks missed by current rules-based systems, attendees will learn at Black Hat Europe.
December 02, 2022
A do-it-yourself machine learning system helped a French bank detect three types of exfiltration attacks missed by current rules-based systems, attendees will learn at Black Hat Europe.
by Robert Lemos, Contributing Writer, Dark Reading
December 02, 2022
4 MIN READ
Article
Wipermania: Malware Remains a Potent Threat, 10 Years Since 'Shamoon'
An in-depth analysis of system-destroying malware families presented at Black Hat Middle East & Africa shows a growing nuance in terms of how they're deployed.
November 15, 2022
An in-depth analysis of system-destroying malware families presented at Black Hat Middle East & Africa shows a growing nuance in terms of how they're deployed.
by Jai Vijayan, Contributing Writer, Dark Reading
November 15, 2022
5 MIN READ
Article
Cookies for MFA Bypass Gain Traction Among Cyberattackers
Multifactor authentication has gained adoption among organizations as a way of improving security over passwords alone, but increasing theft of browser cookies undermines that security.
November 11, 2022
Multifactor authentication has gained adoption among organizations as a way of improving security over passwords alone, but increasing theft of browser cookies undermines that security.
by Robert Lemos, Contributing Writer, Dark Reading
November 11, 2022
4 MIN READ
Article
Highlights of the 2022 Pwnie Awards
Since 2007, the Pwnies have celebrated the good, the bad, and the wacky in cybersecurity. Enjoy some of the best moments of this year's ceremony.
September 16, 2022
Since 2007, the Pwnies have celebrated the good, the bad, and the wacky in cybersecurity. Enjoy some of the best moments of this year's ceremony.
by Karen Spiegelman, Features Editor
September 16, 2022
12 MIN READ
Slideshow