Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Black Hat Asia
March 26-29, 2019
Singapore
Black Hat USA
August 3-8, 2019
Las Vegas, NV, USA
Black Hat Europe
December 2-5, 2019
London UK
Event Updates
Crack the Defenses of iOS and other Platforms at Black Hat USA
Black Hat Staff,
Get the latest insights into how to attack and defend platforms like iOS, MacOS, and Windows 10 at this upcoming August security conference.
By Black Hat Staff , 7/19/2019
Comment0 comments  |  Read  |  Post a Comment
Master Next-Level Network Defense Techniques at Black Hat USA
Dark Reading,
Brush up on new DDOS defense tricks, 5G network vulnerabilities, and applications of military strategy to cybersecurity.
By Dark Reading , 7/17/2019
Comment0 comments  |  Read  |  Post a Comment
Black Hat USA Arsenal Serves Up A Smorgasbord of Cybersecurity Tools
Black Hat Staff,
Visit the Arsenal this August to go hands-on with hackable gadgets and catch live demos of open-source security tools from some of the best in the business.
By Black Hat Staff , 7/12/2019
Comment0 comments  |  Read  |  Post a Comment
More Event Updates
News & Commentary
RDP Bug Takes New Approach to Host Compromise
Kelly Sheridan, Staff Editor, Dark ReadingNews
Researchers show how simply connecting to a rogue machine can silently compromise the host.
By Kelly Sheridan Staff Editor, Dark Reading, 7/18/2019
Comment2 comments  |  Read  |  Post a Comment
Open Source Hacking Tool Grows Up
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Koadic toolkit gets upgrades and a little love from nation-state hackers.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 7/18/2019
Comment0 comments  |  Read  |  Post a Comment
DevOps' Inevitable Disruption of Security Strategy
Ericka Chickowski, Contributing WriterNews
Black Hat USA programming will dive into the ways DevOps-driven shifts in practices and tools are introducing both new vulnerabilities and new ways of securing enterprises.
By Ericka Chickowski Contributing Writer, 7/9/2019
Comment0 comments  |  Read  |  Post a Comment
Researchers Poke Holes in Siemens Simatic S7 PLCs
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Black Hat USA session will reveal how they reverse-engineered the proprietary cryptographic protocol to attack the popular programmable logic controller.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 7/8/2019
Comment0 comments  |  Read  |  Post a Comment
7 Hot Cybersecurity Trends to Be Highlighted at Black Hat
Ericka Chickowski, Contributing Writer
Just some of the research and ideas worth checking out at this year's 'security summer camp.'
By Ericka Chickowski Contributing Writer, 7/8/2019
Comment2 comments  |  Read  |  Post a Comment
Black Hat Q&A: Understanding NSAs Quest to Open Source Ghidra
Black Hat Staff,  News
National Security Agency researcher Brian Knighton offers a preview of his August Black Hat USA talk on the evolution of Ghidra.
By Alex Wawro, Special to Dark Reading , 7/3/2019
Comment1 Comment  |  Read  |  Post a Comment
'Human Side-Channels': Behavioral Traces We Leave Behind
Kelly Sheridan, Staff Editor, Dark ReadingNews
How writing patterns, online activities, and other unintentional identifiers can be used in cyber offense and defense.
By Kelly Sheridan Staff Editor, Dark Reading, 7/2/2019
Comment1 Comment  |  Read  |  Post a Comment
Inside MLS, the New Protocol for Secure Enterprise Messaging
Kelly Sheridan, Staff Editor, Dark ReadingNews
As personal messaging platforms see the rise of end-to-end encryption, businesses struggle to provide strong levels of security.
By Kelly Sheridan Staff Editor, Dark Reading, 6/27/2019
Comment1 Comment  |  Read  |  Post a Comment
A Socio-Technical Approach to Cybersecurity's Problems
Kelly Sheridan, Staff Editor, Dark ReadingNews
Researchers explore how modern security problems can be solved with an examination of society, technology, and security.
By Kelly Sheridan Staff Editor, Dark Reading, 6/24/2019
Comment0 comments  |  Read  |  Post a Comment
With GDPR's 'Right of Access,' Who Really Has Access?
Kelly Sheridan, Staff Editor, Dark ReadingNews
How a security researcher learned organizations willingly hand over sensitive data with little to no identity verification.
By Kelly Sheridan Staff Editor, Dark Reading, 6/19/2019
Comment0 comments  |  Read  |  Post a Comment
Black Hat Q&A: Defending Against Cheaper, Accessible Deepfake Tech
Black Hat Staff,  News
ZeroFoxs Matt Price and Mike Price discuss their work researching cybersecurity responses to the rising tide of deepfake videos.
By Alex Wawro, Special to Dark Reading , 6/13/2019
Comment0 comments  |  Read  |  Post a Comment
Black Hat Q&A: Bruce Schneier Calls For Public-Interest Technologists
Black Hat Staff,  News
Ahead of his 2019 Black Hat USA talk, cybersecurity luminary Bruce Schneier explains why its so important for tech experts to be actively involved in setting public policy.
By Alex Wawro, Special to Dark Reading , 5/20/2019
Comment0 comments  |  Read  |  Post a Comment
Inside Cyber Battlefields, the Newest Domain of War
Kelly Sheridan, Staff Editor, Dark ReadingNews
In his Black Hat Asia keynote, Mikko Hypponen explored implications of "the next arms race" and why cyber will present challenges never before seen in warfare.
By Kelly Sheridan Staff Editor, Dark Reading, 3/28/2019
Comment3 comments  |  Read  |  Post a Comment
Security Firm to Offer Free Hacking Toolkit
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
CQTools suite includes both exploit kits and information-extraction functions, its developers say.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 2/27/2019
Comment0 comments  |  Read  |  Post a Comment
Whose Line Is It? When Voice Phishing Attacks Get Sneaky
Kelly Sheridan, Staff Editor, Dark ReadingNews
Researchers investigate malicious apps designed to intercept calls to legitimate numbers, making voice phishing attacks harder to detect.
By Kelly Sheridan Staff Editor, Dark Reading, 2/27/2019
Comment3 comments  |  Read  |  Post a Comment
Toyota Prepping 'PASTA' for its GitHub Debut
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Carmaker's open source car-hacking tool platform soon will be available to the research community.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 2/14/2019
Comment0 comments  |  Read  |  Post a Comment
Researchers Dig into Microsoft Office Functionality Flaws
Kelly Sheridan, Staff Editor, Dark ReadingNews
An ongoing study investigating security bugs in Microsoft Office has so far led to two security patches.
By Kelly Sheridan Staff Editor, Dark Reading, 2/13/2019
Comment1 Comment  |  Read  |  Post a Comment
New Zombie 'POODLE' Attack Bred from TLS Flaw
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Citrix issues update for encryption weakness dogging the popular security protocol.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 2/8/2019
Comment1 Comment  |  Read  |  Post a Comment
Security Matters When It Comes to Mergers & Acquisitions
Matt Rose, Global Director Application Security Strategy, at CheckmarxCommentary
The recently disclosed Marriott breach exposed a frequently ignored issue in the M&A process.
By Matt Rose Global Director Application Security Strategy, at Checkmarx, 1/8/2019
Comment1 Comment  |  Read  |  Post a Comment
The Coolest Hacks of 2018
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
In-flight airplanes, social engineers, and robotic vacuums were among the targets of resourceful white-hat hackers this year.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 12/28/2018
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Twitter Feed
Current Conversations
More Conversations
Black Hat
Black Hat is the most technical and relevant global information security event series in the world. For more than 20 years, Black Hat has provided attendees with the very latest in information security research, development, and trends. These high-profile global Briefings and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors.
www.blackhat.com
White Papers
Video
All Black Hat Videos
Register for Dark Reading Newsletters
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Back Issues | Must Reads
Cartoon Contest