Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Black Hat Asia
March 26-29, 2019
Singapore
Black Hat USA
August 3-8, 2019
Las Vegas, NV, USA
Black Hat Europe
December 3-6, 2019
London UK
6/7/2019
09:00 AM
Black Hat Staff
Black Hat Staff
Event Updates
50%
50%

Learn the Latest Hacking Techniques at Black Hat Trainings Virginia

At Black Hat's upcoming Trainings-only October event you'll have opportunities to get up to speed on the newest hacking tricks for operating systems and cloud providers.

Come spend two days honing your cybersecurity skills at Black Hat Trainings in Virginia, an October event offering some of the most practical, hands-on courses in the business.

Get up to speed on Python hacking in two days flat by attending Python Hacker Bootcamp - Zero to Hero, a Training designed to teach you hacker programming methodology. Instead of learning formal programming practices that you might never use, this course focuses on core concepts taught through information security-centric projects.

Hands-on labs accompany each lecture to help you focus on solving commonplace and real-world security challenges. The labs have been designed to apply to both attackers and defenders. The entire bootcamp is designed to be fun, practical, and fast-paced.

If you’re more interested in getting inside the minds of cloud hackers, sign up for Astute Hunting in the Cloud - Bring The Thunder! This two-day Training is a great opportunity to get your hands dirty and find the hackers hiding within the systems of top cloud computing providers.

With a focus on AWS and Azure, you will discover the tactics, techniques, and procedures (TTPs) needed to hunt threats in your cloud environment. You’ll get inside the mind of a cloud hacker, see the vulnerabilities, and understand what clues attackers often leave behind.

Advanced Infrastructure Hacking - 2019 Edition is a fast-paced version of the original four-day class, concentrated down into two efficient days of training and demos.

This course focuses on the vulnerabilities of operating systems and covers a wide variety of neat, new and ridiculous techniques to compromise modern OSes, networking devices and everything in-between. While prior pentest experience is not a strict requirement, familiarity with both Linux and Windows command line syntax will be greatly beneficial for attendees.

These cutting-edge Black Hat Trainings and many more will be taking place October 17 and 18 at the Hilton Alexandria Mark Center in Alexandria, Virginia. From infrastructure hacking to incident response, there's a course for hackers and security pros of all experience levels, so register today.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
7 Truths About BEC Scams
Ericka Chickowski, Contributing Writer,  6/13/2019
DNS Firewalls Could Prevent Billions in Losses to Cybercrime
Curtis Franklin Jr., Senior Editor at Dark Reading,  6/13/2019
Can Your Patching Strategy Keep Up with the Demands of Open Source?
Tim Mackey, Principal Security Strategist, CyRC, at Synopsys,  6/18/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-9561
PUBLISHED: 2019-06-19
In llcp_util_parse_connect of llcp_util.cc, there is a possible out-of-bound read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-7.0 Android-7...
CVE-2018-9563
PUBLISHED: 2019-06-19
In llcp_util_parse_cc of llcp_util.cc, there is a possible out-of-bound read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-7.0 Android-7.1.1 ...
CVE-2018-9564
PUBLISHED: 2019-06-19
In llcp_util_parse_link_params of llcp_util.cc, there is a possible out-of-bound read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-7.0 Andro...
CVE-2019-2003
PUBLISHED: 2019-06-19
In addLinks of Linkify.java, there is a possible phishing vector due to an unusual root cause. This could lead to remote code execution or misdirection of clicks with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-7.0 Android-...
CVE-2019-2017
PUBLISHED: 2019-06-19
In rw_t2t_handle_tlv_detect_rsp of rw_t2t_ndef.cc, there is a possible out-of-bound write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-7.0 ...