Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Black Hat USA
August 1-6, 2020
Las Vegas, NV, USA
Black Hat Asia
September 29 - October 2, 2020
Singapore
Black Hat Europe
November 9-12, 2020
London UK
6/7/2019
09:00 AM
Black Hat Staff
Black Hat Staff
Event Updates
50%
50%

Learn the Latest Hacking Techniques at Black Hat Trainings Virginia

At Black Hat's upcoming Trainings-only October event you'll have opportunities to get up to speed on the newest hacking tricks for operating systems and cloud providers.

Come spend two days honing your cybersecurity skills at Black Hat Trainings in Virginia, an October event offering some of the most practical, hands-on courses in the business.

Get up to speed on Python hacking in two days flat by attending Python Hacker Bootcamp - Zero to Hero, a Training designed to teach you hacker programming methodology. Instead of learning formal programming practices that you might never use, this course focuses on core concepts taught through information security-centric projects.

Hands-on labs accompany each lecture to help you focus on solving commonplace and real-world security challenges. The labs have been designed to apply to both attackers and defenders. The entire bootcamp is designed to be fun, practical, and fast-paced.

If you’re more interested in getting inside the minds of cloud hackers, sign up for Astute Hunting in the Cloud - Bring The Thunder! This two-day Training is a great opportunity to get your hands dirty and find the hackers hiding within the systems of top cloud computing providers.

With a focus on AWS and Azure, you will discover the tactics, techniques, and procedures (TTPs) needed to hunt threats in your cloud environment. You’ll get inside the mind of a cloud hacker, see the vulnerabilities, and understand what clues attackers often leave behind.

Advanced Infrastructure Hacking - 2019 Edition is a fast-paced version of the original four-day class, concentrated down into two efficient days of training and demos.

This course focuses on the vulnerabilities of operating systems and covers a wide variety of neat, new and ridiculous techniques to compromise modern OSes, networking devices and everything in-between. While prior pentest experience is not a strict requirement, familiarity with both Linux and Windows command line syntax will be greatly beneficial for attendees.

These cutting-edge Black Hat Trainings and many more will be taking place October 17 and 18 at the Hilton Alexandria Mark Center in Alexandria, Virginia. From infrastructure hacking to incident response, there's a course for hackers and security pros of all experience levels, so register today.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/4/2020
Abandoned Apps May Pose Security Risk to Mobile Devices
Robert Lemos, Contributing Writer,  5/29/2020
Cybersecurity Spending Hits 'Temporary Pause' Amid Pandemic
Kelly Jackson Higgins, Executive Editor at Dark Reading,  6/2/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13817
PUBLISHED: 2020-06-04
ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows remote attackers to cause a denial of service (daemon exit or system time change) by predicting transmit timestamps for use in spoofed packets. The victim must be relying on unauthenticated IPv4 time sources. There must be an off-path attac...
CVE-2020-13818
PUBLISHED: 2020-06-04
In Zoho ManageEngine OpManager before 125144, when <cachestart> is used, directory traversal validation can be bypassed.
CVE-2020-6640
PUBLISHED: 2020-06-04
An improper neutralization of input vulnerability in the Admin Profile of FortiAnalyzer may allow a remote authenticated attacker to perform a stored cross site scripting attack (XSS) via the Description Area.
CVE-2020-9292
PUBLISHED: 2020-06-04
An unquoted service path vulnerability in the FortiSIEM Windows Agent component may allow an attacker to gain elevated privileges via the AoWinAgt executable service path.
CVE-2019-16150
PUBLISHED: 2020-06-04
Use of a hard-coded cryptographic key to encrypt security sensitive data in local storage and configuration in FortiClient for Windows prior to 6.4.0 may allow an attacker with access to the local storage or the configuration backup file to decrypt the sensitive data via knowledge of the hard-coded ...