Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Black Hat Asia
March 26-29, 2019
Singapore
Black Hat USA
August 3-8, 2019
Las Vegas, NV, USA
Black Hat Europe
December 2-5, 2019
London UK
6/7/2019
09:00 AM
Black Hat Staff
Black Hat Staff
Event Updates
50%
50%

Learn the Latest Hacking Techniques at Black Hat Trainings Virginia

At Black Hat's upcoming Trainings-only October event you'll have opportunities to get up to speed on the newest hacking tricks for operating systems and cloud providers.

Come spend two days honing your cybersecurity skills at Black Hat Trainings in Virginia, an October event offering some of the most practical, hands-on courses in the business.

Get up to speed on Python hacking in two days flat by attending Python Hacker Bootcamp - Zero to Hero, a Training designed to teach you hacker programming methodology. Instead of learning formal programming practices that you might never use, this course focuses on core concepts taught through information security-centric projects.

Hands-on labs accompany each lecture to help you focus on solving commonplace and real-world security challenges. The labs have been designed to apply to both attackers and defenders. The entire bootcamp is designed to be fun, practical, and fast-paced.

If you’re more interested in getting inside the minds of cloud hackers, sign up for Astute Hunting in the Cloud - Bring The Thunder! This two-day Training is a great opportunity to get your hands dirty and find the hackers hiding within the systems of top cloud computing providers.

With a focus on AWS and Azure, you will discover the tactics, techniques, and procedures (TTPs) needed to hunt threats in your cloud environment. You’ll get inside the mind of a cloud hacker, see the vulnerabilities, and understand what clues attackers often leave behind.

Advanced Infrastructure Hacking - 2019 Edition is a fast-paced version of the original four-day class, concentrated down into two efficient days of training and demos.

This course focuses on the vulnerabilities of operating systems and covers a wide variety of neat, new and ridiculous techniques to compromise modern OSes, networking devices and everything in-between. While prior pentest experience is not a strict requirement, familiarity with both Linux and Windows command line syntax will be greatly beneficial for attendees.

These cutting-edge Black Hat Trainings and many more will be taking place October 17 and 18 at the Hilton Alexandria Mark Center in Alexandria, Virginia. From infrastructure hacking to incident response, there's a course for hackers and security pros of all experience levels, so register today.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Florida Town Pays $600K to Ransomware Operators
Curtis Franklin Jr., Senior Editor at Dark Reading,  6/20/2019
Pledges to Not Pay Ransomware Hit Reality
Robert Lemos, Contributing Writer,  6/21/2019
AWS CISO Talks Risk Reduction, Development, Recruitment
Kelly Sheridan, Staff Editor, Dark Reading,  6/25/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-10164
PUBLISHED: 2019-06-26
PostgreSQL versions 10.x before 10.9 and versions 11.x before 11.4 are vulnerable to a stack-based buffer overflow. Any authenticated user can overflow a stack-based buffer by changing the user's own password to a purpose-crafted value. This often suffices to execute arbitrary code as the PostgreSQL...
CVE-2019-11583
PUBLISHED: 2019-06-26
The issue searching component in Jira before version 8.1.0 allows remote attackers to deny access to Jira service via denial of service vulnerability in issue search when ordering by "Epic Name".
CVE-2019-4234
PUBLISHED: 2019-06-26
IBM PureApplication System 2.2.3.0 through 2.2.5.3 weakness in the implementation of locking feature in pattern editor. An attacker by intercepting the subsequent requests can bypass business logic to modify the pattern to unlocked state. IBM X-Force ID: 159416.
CVE-2019-4235
PUBLISHED: 2019-06-26
IBM PureApplication System 2.2.3.0 through 2.2.5.3 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 159417.
CVE-2019-4241
PUBLISHED: 2019-06-26
IBM PureApplication System 2.2.3.0 through 2.2.5.3 could allow an authenticated user with local access to bypass authentication and obtain administrative access. IBM X-Force ID: 159467.