Black Hat Asia
March 26-29, 2019
Singapore
Black Hat USA
August 3-8, 2019
Las Vegas, NV, USA
Black Hat Europe
December 3-6, 2019
London UK
10/2/2018
05:00 PM
Black Hat Staff
Black Hat Staff
Event Updates
50%
50%

Sharpen Your Security Skills at Black Hat Trainings Chicago!

Black Hat is bringing its highly-regarded Trainings to Chicago next month, October 22 and 23.Don't miss this opportunity to develop your skills in some of the most technical, hands-on security courses available.

From infrastructure hacking to physical pentesting, there’s a course for hackers and security pros of all experience levels at this special Trainings event, held in Chicago’s beautiful Sheraton Grand Hotel.

Black Hat Trainings will fill this premier waterfront hotel with experts from around the industry eager to help you hone your craft and learn new tricks. For example, there’s a fast-paced two-day class on “Advanced Infrastructure Hacking – 2018 Edition” in which infosec security experts from NotSoSecure Global Services will teach you a wide variety of neat, new and ridiculous techniques to compromise modern operating systems and networking devices.

If physical security is more your thing, CORE Group will be there to present a promising two-day class on “Physical Penetration Testing.” Those who attend this session will leave with a full awareness of how to best protect buildings and grounds from unauthorized access, as well as how to compromise most existing physical security in order to gain access themselves. Attendees will not only learn how to distinguish good locks and access control from poor ones, but they will also become well-versed in picking and bypassing many of the most common locks used in North America in order to assess their own company's security posture, or to augment their career as a penetration tester!

Of course, space in Black Hat Trainings is limited and courses fill up quickly. Register early to secure your seat in the course of your choice and save on your pass!

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Russia Hacked Clinton's Computers Five Hours After Trump's Call
Robert Lemos, Technology Journalist/Data Researcher,  4/19/2019
Tips for the Aftermath of a Cyberattack
Kelly Sheridan, Staff Editor, Dark Reading,  4/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-11350
PUBLISHED: 2019-04-19
CloudBees Jenkins Operations Center 2.150.2.3, when an expired trial license exists, allows Cleartext Password Storage and Retrieval via the proxy configuration page.
CVE-2019-11351
PUBLISHED: 2019-04-19
TeamSpeak 3 Client before 3.2.5 allows remote code execution in the Qt framework.
CVE-2019-2039
PUBLISHED: 2019-04-19
In rw_i93_sm_detect_ndef of rw_i93.cc, there is a possible out-of-bound read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1...
CVE-2019-2040
PUBLISHED: 2019-04-19
In rw_i93_process_ext_sys_info of rw_i93.cc, there is a possible out-of-bound read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-9. Androi...
CVE-2019-2041
PUBLISHED: 2019-04-19
In the configuration of NFC modules on certain devices, there is a possible failure to distinguish individual devices due to an insecure default value. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Produc...