Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Black Hat USA
August 1-6, 2020
Las Vegas, NV, USA
Black Hat Asia
September 29 - October 2, 2020
Singapore
Black Hat Europe
November 9-12, 2020
London UK
11/29/2018
09:00 AM
Black Hat Staff
Black Hat Staff
Event Updates
50%
50%

Black Hat Europe: Get the Nation-State Perspective on Cybersecurity

Attendees of Black Hat Europe in London next week will hear about worldwide cybersecurity developments and challenges from the Global Commission on the Stability of Cyberspace's Marina Kaljurand.

Are you ready for Black Hat Europe in London next week? It promises to be jam-packed with valuable learning opportunities! So as you’re planning out your schedule be sure to leave time between seeing old friends and making new ones to attend some of this year’s most intriguing Briefings, Trainings, and Arsenal demos.

Most notably, check out this year’s keynote, Developments and Challenges in Cybersecurity from the Nation-State Perspective. Presented by Global Commission on the Stability of Cyberspace chair and former Estonian Foreign Minister Marina Kaljurand, this premier talk will address the lessons learned from the politically-motivated cyberattacks Estonia weathered in 2007.

It’s a unique opportunity to learn from firsthand accounts of nation-state cyberwarfare. Kaljurand intends to shed light on the challenges we face in 2018/2019, the role of states and other stakeholders in global cybersecurity, and what the future holds. She’ll also introduce you to the work of the Global Commission on Stability in Cyberspace, which is a multi-stakeholder model that contributes to international discussion and policy-making. Don’t miss it!

If you’re after more in-depth learning, know that there’s still time to register for many of the 2-Day Trainings next week, including Mandiant’s Windows Enterprise Incident Response. This intensive course is designed to teach fundamental investigative techniques needed to respond to today's landscape of threat actors and intrusion scenarios. Completely redeveloped with all new material in 2016, the class is built upon a series of hands-on labs that highlight the phases of a targeted attack, key sources of evidence, and forensic analysis know-how.

Stop by the Black Hat Europe Arsenal to enjoy demos of some potential new tools, including VirusTotal Graph: Investigation, which is a  free visualization tool built on top of the VirusTotal data set. The tool helps you study the relationship between files, urls, domains and IP addresses through an easy navigation interface. By exploring and expanding each of the nodes in your graph, you can build the network and quickly see the connections across the samples you are studying.

You might also want to check out Kurukshetra, a web framework to host reasonably complex secure coding challenges. Developed with the aim of being the first open-source secure coding framework, it’s composed of two components:

  • A backend framework written in PHP, which manages and leverages the underlying docker system to provide a secure sandbox for the challenge execution;
  • Tthe frontend, which is a user-facing web app providing necessary controls, for the admin to host and modify the challenges, and the user to execute and view the result of each of his input.

To close out this year's conference, join Black Hat founder Jeff Moss and members of the esteemed Black Hat Review Board for an insightful conversation on the most pressing issues facing the InfoSec community. This special Locknote: Conclusions and Key Takeaways from Black Hat Europe 2018 Briefing, held at the end of the final day (Thursday, December 6) will review key takeaways coming out of Black Hat Europe and how these trends will impact future security strategies.

Black Hat Europe returns to The Excel in London December 3-6, 2018. For more information on what’s happening at the event and how to register, check out the Black Hat website.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
'BootHole' Vulnerability Exposes Secure Boot Devices to Attack
Kelly Sheridan, Staff Editor, Dark Reading,  7/29/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-17364
PUBLISHED: 2020-08-05
USVN (aka User-friendly SVN) before 1.0.9 allows XSS via SVN logs.
CVE-2020-4481
PUBLISHED: 2020-08-05
IBM UrbanCode Deploy (UCD) 6.2.7.3, 6.2.7.4, 7.0.3.0, and 7.0.4.0 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 181848.
CVE-2020-5608
PUBLISHED: 2020-08-05
CAMS for HIS CENTUM CS 3000 (includes CENTUM CS 3000 Small) R3.08.10 to R3.09.50, CENTUM VP (includes CENTUM VP Small, Basic) R4.01.00 to R6.07.00, B/M9000CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01 allows a remote unauthenticated attacker to bypass authentication and send altered c...
CVE-2020-5609
PUBLISHED: 2020-08-05
Directory traversal vulnerability in CAMS for HIS CENTUM CS 3000 (includes CENTUM CS 3000 Small) R3.08.10 to R3.09.50, CENTUM VP (includes CENTUM VP Small, Basic) R4.01.00 to R6.07.00, B/M9000CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01 allows a remote unauthenticated attacker to cre...
CVE-2020-8607
PUBLISHED: 2020-08-05
An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentia...