Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Black Hat USA
July 31 - August 5, 2021
Las Vegas, NV, USA
SecTor
November 4 - October 30, 2021
Toronto, ON, Canada
Black Hat Europe
November 8-11, 2021
Virtual Event
Event Updates
Level Up Your Kubernetes Security Skills at Black Hat USA
Black Hat Staff,
Gain access to a broad spectrum of in-depth cybersecurity Briefings and Trainings.
By Black Hat Staff , 7/16/2020
Comment0 comments  |  Read  |  Post a Comment
Stay on the Cutting Edge of Mobile Security
Black Hat Staff,
Here are some of the mobile-focused Briefings, Trainings, and Arsenal tools that will be explored at Black Hat USA.
By Black Hat Staff , 7/15/2020
Comment0 comments  |  Read  |  Post a Comment
Get Cutting-Edge Healthcare Cybersecurity Insights at Black Hat USA
Black Hat Staff,
Bad actors are on the lookout for ways to attack healthcare organizations, so it's important for cybersecurity pros to stay informed about the latest trends and threats in the industry.
By Black Hat Staff , 7/14/2020
Comment0 comments  |  Read  |  Post a Comment
More Event Updates
News & Commentary
FragAttacks Foil 2 Decades of Wireless Security
Robert Lemos, Contributing WriterNews
Wireless security protocols have improved, but product vendors continue to make implementation errors that allow a variety of attacks.
By Robert Lemos Contributing Writer, 8/6/2021
Comment0 comments  |  Read  |  Post a Comment
Researchers Call for 'CVE' Approach for Cloud Vulnerabilities
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
New research suggests isolation among cloud customer accounts may not be a given -- and the researchers behind the findings issue a call to action for cloud security.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/6/2021
Comment1 Comment  |  Read  |  Post a Comment
HTTP/2 Implementation Errors Exposing Websites to Serious Risks
Jai Vijayan, Contributing WriterNews
Organizations that don't implement end-to-end HTTP/2 are vulnerable to attacks that redirect users to malicious sites and other threats, security researcher reveals at Black Hat USA.
By Jai Vijayan Contributing Writer, 8/5/2021
Comment0 comments  |  Read  |  Post a Comment
CISA Launches JCDC, the Joint Cyber Defense Collaborative
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
"We can't do this alone," the new CISA director told attendees in a keynote at Black Hat USA today.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/5/2021
Comment0 comments  |  Read  |  Post a Comment
Incident Responders Explore Microsoft 365 Attacks in the Wild
Kelly Sheridan, Staff Editor, Dark ReadingNews
Mandiant experts discuss the novel techniques used to evade detection, automate data theft, and achieve persistent access.
By Kelly Sheridan Staff Editor, Dark Reading, 8/5/2021
Comment0 comments  |  Read  |  Post a Comment
Researchers Find Significant Vulnerabilities in macOS Privacy Protections
Robert Lemos, Contributing WriterNews
Attacks require executing code on a system but foil Apple's approach to protecting private data and systems files.
By Robert Lemos Contributing Writer, 8/5/2021
Comment0 comments  |  Read  |  Post a Comment
A New Approach to Securing Authentication Systems' Core Secrets
Kelly Sheridan, Staff Editor, Dark ReadingNews
Researchers at Black Hat USA explain issues around defending "Golden Secrets" and present an approach to solving the problem.
By Kelly Sheridan Staff Editor, Dark Reading, 8/5/2021
Comment0 comments  |  Read  |  Post a Comment
Organizations Still Struggle to Hire & Retain Infosec Employees: Report
Joan Goodchild, Staff EditorNews
Security leaders are challenged to fill application security and cloud computing jobs in particular, survey data shows.
By Joan Goodchild Staff Editor, 8/5/2021
Comment0 comments  |  Read  |  Post a Comment
Why Supply Chain Attacks Are Destined to Escalate
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
In his keynote address at Black Hat USA on Wednesday, Matt Tait, chief operating officer at Corellium, called for software platform vendors and security researchers to do their part to thwart the fallout of software supply chain compromises.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/5/2021
Comment0 comments  |  Read  |  Post a Comment
New Normal Demands New Security Leadership Structure
Kelly Sheridan, Staff Editor, Dark ReadingNews
At the inaugural Omdia Analyst Summit, experts discuss where the past year has created gaps in traditional security strategy and how organizations can fill them.
By Kelly Sheridan Staff Editor, Dark Reading, 8/2/2021
Comment0 comments  |  Read  |  Post a Comment
Multiple Zero-Day Flaws Discovered in Popular Hospital Pneumatic Tube System
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
"PwnedPiper" flaws could allow attackers to disrupt delivery of lab samples or steal hospital employee credentials, new research shows.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/2/2021
Comment0 comments  |  Read  |  Post a Comment
8 Security Tools to be Unveiled at Black Hat USA
Ericka Chickowski, Contributing Writer
Security researchers and practitioners share a host of new cyber tools for penetration testing, reverse engineering, malware defense, and more.
By Ericka Chickowski Contributing Writer, 7/28/2021
Comment0 comments  |  Read  |  Post a Comment
7 Hot Cyber Threat Trends to Expect at Black Hat
Ericka Chickowski, Contributing Writer
A sneak peek of some of the main themes at Black Hat USA next month.
By Ericka Chickowski Contributing Writer, 7/22/2021
Comment1 Comment  |  Read  |  Post a Comment
Researchers Create New Approach to Detect Brand Impersonation
Kelly Sheridan, Staff Editor, Dark ReadingNews
A team of Microsoft researchers developed and trained a Siamese Neural Network to detect brand impersonation attacks.
By Kelly Sheridan Staff Editor, Dark Reading, 7/16/2021
Comment0 comments  |  Read  |  Post a Comment
New Framework Aims to Describe & Address Complex Social Engineering Attacks
Kelly Sheridan, Staff Editor, Dark ReadingNews
As attackers use more synthetic media in social engineering campaigns, a new framework is built to describe threats and provide countermeasures.
By Kelly Sheridan Staff Editor, Dark Reading, 7/9/2021
Comment0 comments  |  Read  |  Post a Comment
Microsoft Releases Emergency Patch for 'PrintNightmare' Vuln
Jai Vijayan, Contributing WriterNews
It urges organizations to immediately apply security update, citing exploit activity.
By Jai Vijayan Contributing Writer, 7/7/2021
Comment0 comments  |  Read  |  Post a Comment
Security 101: The 'PrintNightmare' Flaw
Jai Vijayan, Contributing Writer
A closer look at the printer software vulnerability - and what you can do about it.
By Jai Vijayan Contributing Writer, 7/7/2021
Comment0 comments  |  Read  |  Post a Comment
Researchers Learn From Nation-State Attackers' OpSec Mistakes
Kelly Sheridan, Staff Editor, Dark ReadingNews
Security researchers discuss how a series of simple and consistent mistakes helped them learn more about ITG18, better known as Charming Kitten.
By Kelly Sheridan Staff Editor, Dark Reading, 7/6/2021
Comment0 comments  |  Read  |  Post a Comment
Microsoft Issues New CVE for 'PrintNightmare' Flaw
Jai Vijayan, Contributing WriterNews
Company says remote code execution issue in all Windows versions is different from one in Windows Print Spooler that it had patched last month, though both affect same function.
By Jai Vijayan Contributing Writer, 7/2/2021
Comment0 comments  |  Read  |  Post a Comment
Attackers Already Unleashing Malware for Apple macOS M1 Chip
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Apple security expert Patrick Wardle found that some macOS malware written for the new M1 processor can bypass anti-malware tools.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 6/30/2021
Comment0 comments  |  Read  |  Post a Comment
More Stories
Twitter Feed
Current Conversations
More Conversations
Black Hat
Black Hat is the most technical and relevant global information security event series in the world. For more than 20 years, Black Hat has provided attendees with the very latest in information security research, development, and trends. These high-profile global Briefings and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors.
www.blackhat.com
White Papers
Video
Register for Dark Reading Newsletters
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Cartoon