Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Black Hat Asia
May 4-7, 2021
Virtual Event
Black Hat USA
July 31 - August 5, 2021
Las Vegas, NV, USA
Black Hat Europe
November 8-11, 2021
Virtual Event
7/17/2019
09:00 AM
Dark Reading
Dark Reading
Event Updates
50%
50%

Master Next-Level Network Defense Techniques at Black Hat USA

Brush up on new DDOS defense tricks, 5G network vulnerabilities, and applications of military strategy to cybersecurity.

Network technology advances at a blistering pace, so it’s critical that cybersecurity professionals stay on top of the latest network vulnerabilities, hacks, and exploits. There’s no better place to do that than Black Hat USA in Las Vegas this August, where an entire Network Defense track of Briefing is dedicated to keep you abreast of the latest happenings in network security.

Defense Against Rapidly Morphing DDOS offers a rare opportunity to learn from the sustained, rapidly-morphing DDOS attacks ProtonMail suffered in 2018. Researchers created an attack toolkit that mimics the ProtonMail attacks and used it to study the efficacy of various defenses against similar threats. What they found: a combination of an unsupervised machine learning algorithm to determine a baseline, perform anomaly detection and mitigation, and another machine learning algorithm to tune the performance of the first, yielded the most effective defense. Attend this Briefing to learn how to apply these lessons to your own cybersecurity work.

In Operational Templates for State-Level Attack and Collective Defense of Countries you will examine templates for attacking and defending nations. Militaries have long used doctrinal templates – models based on known or postulated adversary doctrine – to support traditional kinetic warfare training and warfighting. The same approach works well for defending in cyberspace. You’ll receive templates of ways threat actors could disrupt or defeat a country, considering various time horizons and degrees of attribution. Expect to leave this talk with a playbook for how nations might be attacked and defended, a methodology for creating templates and scenarios useful for your own defensive planning, and an enhanced understanding of our collective vulnerability and the need for teamwork to overcome the problem!

Finally, don’t miss New Vulnerabilities in 5G Networks if you’re at all curious about what to expect from the oncoming wave of 5G devices and networks. Researchers will break down the security features of 5G radio networks and reveal new vulnerabilities affecting both the operator infrastructure and end-devices (including mobiles, NB-IoT, laptop etc). You’ll also learn how these new vulnerabilities in the 5G/4G security standards can be exploited using low-cost hardware and software platforms and discover a cool new automated tool to carry out practical evaluation and share data-sets with the research community.

Black Hat USA returns to the Mandalay Bay in Las Vegas August 3-8, 2019. For more information on what’s happening at the event and how to register, check out the Black Hat website.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31793
PUBLISHED: 2021-05-06
An issue exists on NightOwl WDB-20-V2 WDB-20-V2_20190314 devices that allows an unauthenticated user to gain access to snapshots and video streams from the doorbell. The binary app offers a web server on port 80 that allows an unauthenticated user to take a snapshot from the doorbell camera via the ...
CVE-2021-31916
PUBLISHED: 2021-05-06
An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel before 5.12. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a syst...
CVE-2021-31918
PUBLISHED: 2021-05-06
A flaw was found in tripleo-ansible version as shipped in Red Hat Openstack 16.1. The Ansible log file is readable to all users during stack update and creation. The highest threat from this vulnerability is to data confidentiality.
CVE-2019-25043
PUBLISHED: 2021-05-06
ModSecurity 3.x before 3.0.4 mishandles key-value pair parsing, as demonstrated by a "string index out of range" error and worker-process crash for a "Cookie: =abc" header.
CVE-2020-18889
PUBLISHED: 2021-05-06
Cross Site Request Forgery (CSRF) vulnerability in puppyCMS v5.1 that can change the admin's password via /admin/settings.php.