Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

5/29/2013
08:28 PM
50%
50%

Black Hat USA Reminds Early Reg Deadline For July Show Ends Friday

Organizers are expecting at least 6,500 security industry professionals at the exclusive gathering

[NOTE: Black Hat and Dark Reading are both part of UBM Tech. As the key July 27th-August 1st information security event in Las Vegas approaches, we'll be sharing information about the show directly from its creators here on Dark Reading.]

Organizers of Black Hat USA 2013 are giving a final reminder that today, Friday, May 31st, is the final day for early registration for the Black Hat USA 2013 show, coming to Caesar's Palace in Las Vegas in late July. Organizers are expecting at least 6,500 security industry professionals at the exclusive gathering July 27th through August 1st, as the industry gathers for the most intensely technical and relevant global information security event in the world.

Click here for more of Dark Reading's Black Hat articles.

As part of the two-day Briefings part of the event, organizers are excited to welcome General Keith Alexander -- Commander, U.S. Cyber Command/Director, National Security Agency/Chief, Central Security Service (NSA/CSS) -- presenting the Day One keynote address. The following day, they'll introduce Brian Muirhead - Chief Engineer, NASA Jet Propulsion Laboratory, and former Chief Architect for both NASA's Constellation program and the Mars Pathfinder Mission, who will present the Day Two keynote with an inspirational talk called "Take Risk, Don't Fail."

Compelling, timely, and relevant content is the lifeblood of Black Hat USA 2013 -- and once again, this show is where the absolute latest attack and defense research is released. Organizers have an impressive lineup of editorial, knowledge-transfer oriented Briefings -- with more than 50 highly technical presentations already announced, and even more on the way. And prior to the Briefings, Black Hat also provides a comprehensive roster of some of the most rigorous Training classes to be found anywhere in the InfoSec space. In fact, more than 40 percent of the Trainings offered are exclusive to Black Hat USA 2013 and will be available nowhere else this year.

Elsewhere, Black Hat USA 2013 is also pleased to once again host Arsenal--a Tool/Demo area showcasing the work of independent researchers and the open-source community. Organizers are also introducing a number of sponsored workshops for the first time, with in-depth talks from top companies in the space and, of course, the Sponsor Hall, which brings together the most important solutions providers in the business. Oh, and there might be a party or two thrown by companies in the space to help delegates unwind after the intense focus of each day.

So check out the rapidly growing set of Briefings talks, as well as a comprehensive set of two- and four-day trainings, before the early reduced-rate registration ends this evening, Friday, May 31st.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5162
PUBLISHED: 2020-02-25
An exploitable improper access control vulnerability exists in the iw_webs account settings functionality of the Moxa AWK-3131A firmware version 1.13. A specially crafted user name entry can cause the overwrite of an existing user account password, resulting in remote shell access to the device as t...
CVE-2019-5165
PUBLISHED: 2020-02-25
An exploitable authentication bypass vulnerability exists in the hostname processing of the Moxa AWK-3131A firmware version 1.13. A specially configured device hostname can cause the device to interpret select remote traffic as local traffic, resulting in a bypass of web authentication. An attacker ...
CVE-2020-9383
PUBLISHED: 2020-02-25
An issue was discovered in the Linux kernel through 5.5.6. set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it, aka CID-2e90ca68b0d2.
CVE-2019-5136
PUBLISHED: 2020-02-25
An exploitable privilege escalation vulnerability exists in the iw_console functionality of the Moxa AWK-3131A firmware version 1.13. A specially crafted menu selection string can cause an escape from the restricted console, resulting in system access as the root user. An attacker can send commands ...
CVE-2019-5137
PUBLISHED: 2020-02-25
The usage of hard-coded cryptographic keys within the ServiceAgent binary allows for the decryption of captured traffic across the network from or to the Moxa AWK-3131A firmware version 1.13.