Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Black Hat USA
August 1-6, 2020
Las Vegas, NV, USA
Black Hat Asia
September 29 - October 2, 2020
Singapore
Black Hat Europe
November 9-12, 2020
London UK
10/10/2019
01:30 PM
Black Hat Staff
Black Hat Staff
Event Updates
50%
50%

Check Out New Cybersecurity Tools in the Black Hat Europe Arsenal

Black Hat Europe returns to the Excel in London December 2-5 bearing a cornucopia of intriguing cybersecurity tools in its Arsenal.

Need some new cybersecurity tools? Check out the Arsenal at Black Hat Europe in London this December, where you can see live demonstrations of the latest open-source security tools!

Taking place once again at The Excel in London, this year’s Black Hat Europe event will feature an Arsenal fully loaded with tools to help you tackle everything from repelling malware to cracking passwords.

For example, you could catch a demonstration of CrackQ: Intelligent Password Cracking, a Pytho- based queuing system for managing hash cracking using Hashcat. CrackQ was born from the frustration of using similar tools and adds some new and interesting additional features as solutions to these frustrations, So swing by and check it out.

AVCLASS++: Yet Another Massive Malware Labeling Tool will introduce you to open-source AVCLASS successor AVCLASS++, an improved malware-labeling tool that might be just what you need to stay on top of your work. AVCLASS++ is built to perform labeling more accurately than the vanilla one, and even if you have never used AVCLASS, AVCLASS++ is designed to be easy to use and support both practitioners (such as SOC operators, CSIRT members, and malware analysts) and academic researchers.

Speaking of research, don’t overlook the more education-focused tools in the Black Hat Europe Arsenal. Haaukins: A Highly Accessible and Automated Virtualization Platform for Security Education, for example, offers a highly accessible platform for security education, affording you room to try out ethical hacking and penetration testing using Kali Linux through a browser. It makes it possible to conduct trainings for even large groups without the need for installing virtual environments or other tools; the participants can work on their own laptops through their web browser of choice, and have access within a couple of minutes.

Find further details on these and many other cool tools in the Arsenal lineup for Black Hat Europe, which returns to The Excel in London December 2-5, 2019. For more information on what’s happening at the event and how to register, check out the Black Hat website.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/28/2020
The Problem with Artificial Intelligence in Security
Dr. Leila Powell, Lead Security Data Scientist, Panaseer,  5/26/2020
GDPR Enforcement Loosens Amid Pandemic
Seth Rosenblatt, Contributing Writer,  5/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-4248
PUBLISHED: 2020-05-28
IBM Security Identity Governance and Intelligence 5.2.6 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 175484.
CVE-2020-8329
PUBLISHED: 2020-05-28
A denial of service vulnerability was reported in the firmware prior to version 1.01 used in Lenovo Printer LJ4010DN that could be triggered by a remote user sending a crafted packet to the device, causing an error to be displayed and preventing printer from functioning until the printer is rebooted...
CVE-2020-8330
PUBLISHED: 2020-05-28
A denial of service vulnerability was reported in the firmware prior to version 1.01 used in Lenovo Printer LJ4010DN that could be triggered by a remote user sending a crafted packet to the device, preventing subsequent print jobs until the printer is rebooted.
CVE-2020-4231
PUBLISHED: 2020-05-28
IBM Security Identity Governance and Intelligence 5.2.6 could allow an authenticated user to perform unauthorized commands due to hazardous input validation. IBM X-Force ID: 175335.
CVE-2020-4232
PUBLISHED: 2020-05-28
IBM Security Identity Governance and Intelligence 5.2.6 could allow an attacker to enumerate usernames to find valid login credentials which could be used to attempt further attacks against the system. IBM X-Force ID: 175336.