Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Black Hat USA
July 31 - August 5, 2021
Las Vegas, NV, USA
SecTor
November 4 - October 30, 2021
Toronto, ON, Canada
Black Hat Europe
November 8-11, 2021
Virtual Event
Event Updates
Level Up Your Kubernetes Security Skills at Black Hat USA
Black Hat Staff,
Gain access to a broad spectrum of in-depth cybersecurity Briefings and Trainings.
By Black Hat Staff , 7/16/2020
Comment0 comments  |  Read  |  Post a Comment
Stay on the Cutting Edge of Mobile Security
Black Hat Staff,
Here are some of the mobile-focused Briefings, Trainings, and Arsenal tools that will be explored at Black Hat USA.
By Black Hat Staff , 7/15/2020
Comment0 comments  |  Read  |  Post a Comment
Get Cutting-Edge Healthcare Cybersecurity Insights at Black Hat USA
Black Hat Staff,
Bad actors are on the lookout for ways to attack healthcare organizations, so it's important for cybersecurity pros to stay informed about the latest trends and threats in the industry.
By Black Hat Staff , 7/14/2020
Comment0 comments  |  Read  |  Post a Comment
More Event Updates
News & Commentary
How to Negotiate With Ransomware Attackers
Kelly Sheridan, Staff Editor, Dark ReadingNews
Security researchers investigate the ransom negotiation process to create strategies businesses can use if they face an attack.
By Kelly Sheridan Staff Editor, Dark Reading, 11/15/2021
Comment0 comments  |  Read  |  Post a Comment
Cloud Attack Analysis Unearths Lessons for Security Pros
Kelly Sheridan, Staff Editor, Dark ReadingNews
Researchers detail their investigation of a cryptomining campaign stealing AWS credentials and how attackers have evolved their techniques.
By Kelly Sheridan Staff Editor, Dark Reading, 11/11/2021
Comment0 comments  |  Read  |  Post a Comment
What Happens If Time Gets Hacked
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Renowned hardware security expert raises alarm on the risk and dangers of cyberattackers targeting the current time-synchronization infrastructure.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 11/11/2021
Comment0 comments  |  Read  |  Post a Comment
Hacker-for-Hire Group Spied on More Than 3,500 Targets in 18 Months
Jai Vijayan, Contributing WriterNews
Russian-speaking "Void Balaur" group's victims include politicians, dissidents, human rights activists, doctors, and journalists, security vendor discloses at Black Hat Europe 2021.
By Jai Vijayan Contributing Writer, 11/10/2021
Comment0 comments  |  Read  |  Post a Comment
ChaosDB: Researchers Share Technical Details of Azure Flaw
Kelly Sheridan, Staff Editor, Dark ReadingNews
Wiz researchers who discovered a severe flaw in the Azure Cosmos DB database discussed the full extent of the vulnerability at Black Hat Europe.
By Kelly Sheridan Staff Editor, Dark Reading, 11/10/2021
Comment0 comments  |  Read  |  Post a Comment
Securing the Public: Who Should Take Charge?
Kelly Sheridan, Staff Editor, Dark ReadingNews
International policy expert Marietke Schaake explores the intricacies of protecting the public as governments depend on private companies to build and secure digital infrastructure.
By Kelly Sheridan Staff Editor, Dark Reading, 11/10/2021
Comment0 comments  |  Read  |  Post a Comment
Dark Reading Video News Desk Comes to Black Hat Europe
Dark Reading Staff, News
While attendees join Black Hat Europe 2021 virtually and live in London, we bring you prerecorded interviews from remote offices around the world.
By Dark Reading Staff , 11/10/2021
Comment0 comments  |  Read  |  Post a Comment
Researcher Details Vulnerabilities Found in AWS API Gateway
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
AWS fixed the security flaws that left the API service at risk of so-called HTTP header-smuggling attacks, says the researcher who discovered them.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 11/10/2021
Comment0 comments  |  Read  |  Post a Comment
Free Tool Scans Web Servers for Vulnerability to HTTP Header-Smuggling Attacks
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
A researcher will release an open source tool at Black Hat Europe next week that roots out server weaknesses to a sneaky type of attack.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 11/1/2021
Comment0 comments  |  Read  |  Post a Comment
APTs, Teleworking, and Advanced VPN Exploits: The Perfect Storm
Kelly Sheridan, Staff Editor, Dark ReadingNews
A Mandiant researcher shares the details of an investigation into the misuse of Pulse Secure VPN devices by suspected state-sponsored threat actors.
By Kelly Sheridan Staff Editor, Dark Reading, 10/29/2021
Comment0 comments  |  Read  |  Post a Comment
Read Between the Lines: Finding Flaws in EPUB Reading Systems
Kelly Sheridan, Staff Editor, Dark ReadingNews
Security researchers who analyzed 97 free EPUB reading applications found half are not compliant with security recommendations.
By Kelly Sheridan Staff Editor, Dark Reading, 10/27/2021
Comment0 comments  |  Read  |  Post a Comment
Who's In Your Wallet? Exploring Mobile Wallet Security
Kelly Sheridan, Staff Editor, Dark ReadingNews
Security flaws in contactless payments for transportation systems could lead to fraud for stolen devices, researchers find.
By Kelly Sheridan Staff Editor, Dark Reading, 10/25/2021
Comment0 comments  |  Read  |  Post a Comment
Applying Behavioral Psychology to Strengthen Your Incident Response Team
Kelly Sheridan, Staff Editor, Dark ReadingNews
A deep-dive study on the inner workings of incident response teams leads to a framework to apply behavioral psychology principles to CSIRTs.
By Kelly Sheridan Staff Editor, Dark Reading, 10/11/2021
Comment0 comments  |  Read  |  Post a Comment
FragAttacks Foil 2 Decades of Wireless Security
Robert Lemos, Contributing WriterNews
Wireless security protocols have improved, but product vendors continue to make implementation errors that allow a variety of attacks.
By Robert Lemos Contributing Writer, 8/6/2021
Comment0 comments  |  Read  |  Post a Comment
Researchers Call for 'CVE' Approach for Cloud Vulnerabilities
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
New research suggests isolation among cloud customer accounts may not be a given -- and the researchers behind the findings issue a call to action for cloud security.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/6/2021
Comment1 Comment  |  Read  |  Post a Comment
HTTP/2 Implementation Errors Exposing Websites to Serious Risks
Jai Vijayan, Contributing WriterNews
Organizations that don't implement end-to-end HTTP/2 are vulnerable to attacks that redirect users to malicious sites and other threats, security researcher reveals at Black Hat USA.
By Jai Vijayan Contributing Writer, 8/5/2021
Comment0 comments  |  Read  |  Post a Comment
CISA Launches JCDC, the Joint Cyber Defense Collaborative
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
"We can't do this alone," the new CISA director told attendees in a keynote at Black Hat USA today.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/5/2021
Comment0 comments  |  Read  |  Post a Comment
Incident Responders Explore Microsoft 365 Attacks in the Wild
Kelly Sheridan, Staff Editor, Dark ReadingNews
Mandiant experts discuss the novel techniques used to evade detection, automate data theft, and achieve persistent access.
By Kelly Sheridan Staff Editor, Dark Reading, 8/5/2021
Comment0 comments  |  Read  |  Post a Comment
Researchers Find Significant Vulnerabilities in macOS Privacy Protections
Robert Lemos, Contributing WriterNews
Attacks require executing code on a system but foil Apple's approach to protecting private data and systems files.
By Robert Lemos Contributing Writer, 8/5/2021
Comment0 comments  |  Read  |  Post a Comment
A New Approach to Securing Authentication Systems' Core Secrets
Kelly Sheridan, Staff Editor, Dark ReadingNews
Researchers at Black Hat USA explain issues around defending "Golden Secrets" and present an approach to solving the problem.
By Kelly Sheridan Staff Editor, Dark Reading, 8/5/2021
Comment0 comments  |  Read  |  Post a Comment
More Stories
Twitter Feed
Current Conversations
More Conversations
Black Hat
Black Hat is the most technical and relevant global information security event series in the world. For more than 20 years, Black Hat has provided attendees with the very latest in information security research, development, and trends. These high-profile global Briefings and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors.
www.blackhat.com
White Papers
Video
Register for Dark Reading Newsletters
Current Issue
How Enterprises Are Assessing Cybersecurity Risk in Today's Environment
The adoption of cloud services spurred by the COVID-19 pandemic has resulted in pressure on cyber-risk professionals to focus on vulnerabilities and new exposures that stem from pandemic-driven changes. Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns.
Cartoon