Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

02:30 PM
Connect Directly

Dark Reading Video News Desk Returns to Black Hat

Coming to you prerecorded from in front of carefully arranged bookcases around the world ...!

Usually, the Dark Reading News Desk comes to you each year "live from sunny Las Vegas at the lovely Mandalay Bay hotel" with a lineup of live video interviews with the greatest researchers about what they're presenting at Black Hat USA. This year, the situation is a little different.

For 2020, Black Hat USA has transformed into Black Hat Virtual, moving out of Vegas and onto the Internet. And when the action kicks off next week, the Dark Reading News Desk team will be there. (The desk won't.)

Interviews will begin going live at Black Hat Virtual and on DarkReading.com next Wednesday, Aug. 5, at 2 p.m. ET/11 a.m. PT. Black Hat Virtual attendees will be able to find interviews by visiting the conference's "Dark Reading News Desk" tab. Everyone else -- keep your eyes on Dark Reading. We'll update this page with new links as videos become available.

Here's the programming schedule:

DAY 1: Wednesday, August 5

2:00 ET -- Attack of the Clone: Tamaghna Basu tells us how he created an AI bot to mimic him, how it could be used in social engineering attacks, and what the experience taught him about the value of true human connections.

2:20 ET -- Building Cybersecurity Strategies in Sub-Saharan Africa: Evelyn Kilel and Laura Tich of Shehacks Ke discuss how they are working to build cybersecurity strategies that suit the needs and capabilities of developing nations. (For further reading, see Kelly Sheridan's piece on Dark Reading.)

2:35 ET -- Russian Election Interference: What's Next?: Nate Beach-Westmoreland takes a look back at the past 10 years of Russian election interference and disinformation campaigns. What can we learn from the past, and what should we expect as the 2020 US presidential election approaches?

2:50 ET -- (Sponsored) Voatz Sits Down with Dark Reading: Nimit Sawhney, co-founder and CEO of mobile elections platform Voatz, speaks to Dark Reading contributing editor Terry Sweeney.


  • 3:10 ET -- A Paramedic's Guide to Cybersecurity: In this segment, the Dark Reading News Desk speaks to several guests about healthcare cybersecurity. We begin with Rich Mogull, infosec pro and paramedic, for a discussion about what lessons cybersecurity can learn from emergency medical services and the parallels that already exist. (For more, see Kelly Sheridan's piece on Dark Reading.)
  • 3:35 ET -- How An Electronic Medical Record System Flaw Exacerbated the Opioid Crisis: Mitch Parker, CISO of Indiana University Health, explains how healthcare appsec vulnerabilities and abuse can go undetected in small medical centers -- at great cost.
  • 3:50 ET -- A Most Personal Threat: Implantable Medical Devices: Alan Michaels, director of the Electronic Systems Lab at the Virginia Tech Hume Center, explains why implanted medical devices could pose a threat to secure communication facilities. (For more, see Curt Franklin's piece on Dark Reading.)
  • 4:00 ET -- HealthScare: Prioritizing Medical AppSec Research: Seth Fogie, information security director at Penn Medicine, explains what healthcare app vulnerabilities really matter in the day-to-day business of providing patient care.

4:15 ET -- (Sponsored) Synopsys Sits Down with Dark Reading: Tim Mackey, principal security strategist at the Synopsys Cybersecurity Research Center, speaks to Dark Reading contributing editor Terry Sweeney.

4:35 ET -- Pen Testers Who Got Busted for Doing Their Jobs Tell All: Coalfire's Gary De Mercurio and Justin Wynn share the inside story of their infamous arrest last year while conducting a contracted red team engagement in an Iowa courthouse -- and what it took to clear their names.

4:50 ET --(Sponsored) SynerComm Sits Down with Dark Reading: Brian Judd, VP of information assurance at SynerComm, speaks to Dark Reading contributing editor Terry Sweeney. 

5:15 ET -- DIVERSITY IN INFOSEC: A Deeper Look

  • 5:15 ET --What to Tell Young People of Color About InfoSec Careers: Juliet Okafor, CEO and founder of Revolution Cyber, and Paul Brager, director of global OT security programs at Baker Hughes, talk about the unique lessons and hard truths they provide when mentoring young, black cybersecurity professionals.
  • 5:40 ET -- Developing Community for Woman Infosec Pros in India: Vandana Verma tells us how women in India are finding support, education, and love of cybersecurity through the growing InfosecGirls community.
  • 6:00 ET -- Supporting Women in InfoSec:Maxine Holt, research director at Omdia, explains why the time is right for women to step into more cybersecurity jobs now. (For more, read Maxine Holt's piece on Dark Reading.)

DAY 2:Thursday, August6

2:00 ET -- A Real-World Tool for Organizing, Integrating Your Other Tools: Omdia Cybersecurity Accelerator analyst Eric Parizo describes the value overwhelmed security managers may find in a security product integration framework (SPIF).

2:20 ET -- Counting for Good: Hardware Counters Un-mask Malware: Nick Gregory, research scientist at Capsule8, talks about his session with Capsule8 data scientist Harini Kannan, "Uncommon Sense: Detecting Exploits With Novel Hardware Performance Counters and Machine Learning Magic."

2:35 ET -- (Sponsored) Intel Sits Down with Dark Reading: Tom Garrison, vice president and general manager of client security strategy & initiatives at Intel, speaks to Dark Reading contributing editor Terry Sweeney.


  • 2:55 ET -- Remotely Hacking Operations Technology Systems: Marco Balduzzi, senior research scientist at Trend Micro, tells us how the often-overlooked ICS protocol gateways contain serious vulnerabilities that allow attackers to hack OT systems remotely. (For more, see Kelly Jackson Higgins' piece on Dark Reading.)
  • 3:10 ET -- The Long Shadow of Stuxnet: New Microsoft Print Spooler Vulns Revealed: SafeBreach researchers Peleg Hader and Tomer Bar detail the three vulnerabilities they found in Windows Print Spoolerthat could allow an attacker to sneak into the network throughan old printer service mechanism. 

3:30 ET --(Sponsored) Symantec (a division of Broadcom) Sits Down with Dark Reading: Jon DiMaggio, senior threat intelligence analyst at Symantec, a division of Broadcom, speaks to Dark Reading contributing editor Terry Sweeney.

3:50 ET -- IOT SECURITY: A Deeper Look

  • 3:50 ET -- Using IoT Botnets to Manipulate the Energy Market: Georgia Tech PhD candidateTohid Shekari talks about the session he and Georgia Tech professor Raheem Beyah gave about a stealthy and adaptable way to use IoT botnets for financial gain or market downfall.
  • 4:10 ET -- Why Satellite Communication Eavesdropping Will Remain A Problem: Oxford PhD candidate James Pavur shows that SATCOM security has still made no progress since previous Black Hat disclosures, and discusses the physical and economic limitations that make it unlikely to improve anytime soon.

4:30 ET --(Sponsored) Webroot (an OpenText Company) Sits Down with Dark Reading: Hal Lonas, SVP & CTO, SMB & Consumer, at Webroot (an OpenText Company), speaks to Dark Reading contributing editor Terry Sweeney.

4:50 ET -- CLOUD SECURITY: A Deeper Look

  • 4:50 ET -- Office 365's Vast Attack Surface & All the Ways You Don't Know You're Being Exploited Through It: Mandiant incident response managers Josh Madeley and Doug Bienstock describe how thoroughly Microsoft 365 (formerly known as Office 365) extends into corporate networks, describe both sophisticated and simple attacks they've detected, and suggest mitigations as businesses rely more heavily on the cloud. (For more, see Kelly Sheridan's piece on Dark Reading.)
  • 5:10 ET -- Exploiting Google Cloud Platform: Security engineer Dylan Ayrey and Cruise senior infrastructure security engineer Allison Donovan describe fundamental weaknesses in GCP identity management that enable privilege escalation and lateral movement.

5:25 --  On ‘Invisible Salamanders’ and Insecure Messages --  Cornell researcher Paul Grubbs discusses how vulnerabilities found in Facebook Messenger encryption could mean trouble for your secure messages. (For more, see Curt Franklin's piece on Dark Reading.)

5:40 ET -- Where Dark Reading Goes Next: Dark Reading editor-in-chief Tim Wilson gives a complete rundown of all the Dark Reading projects you might not even know about, his insight into the future of the security industry, and how we plan to cover it.

Related Content:




Register now for this year's fully virtual Black Hat USA, scheduled to take place August 1–6, and get more information about the event on the Black Hat website. Click for details on conference informationand to register.

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
'BootHole' Vulnerability Exposes Secure Boot Devices to Attack
Kelly Sheridan, Staff Editor, Dark Reading,  7/29/2020
Average Cost of a Data Breach: $3.86 Million
Jai Vijayan, Contributing Writer,  7/29/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-08-05
Affected versions of Atlassian Fisheye allow remote attackers to view the HTTP password of a repository via an Information Disclosure vulnerability in the logging feature. The affected versions are before version 4.8.3.
PUBLISHED: 2020-08-04
In solidus before versions 2.8.6, 2.9.6, and 2.10.2, there is an bility to change order address without triggering address validations. This vulnerability allows a malicious customer to craft request data with parameters that allow changing the address of the current order without changing the shipm...
PUBLISHED: 2020-08-04
Extreme Analytics in Extreme Management Center before allows unauthenticated reflected XSS via a parameter in a GET request, aka CFD-4887.
PUBLISHED: 2020-08-04
save-server (npm package) before version 1.05 is affected by a CSRF vulnerability, as there is no CSRF mitigation (Tokens etc.). The fix introduced in version version 1.05 unintentionally breaks uploading so version v1.0.7 is the fixed version. This is patched by implementing Double submit. The CSRF...
PUBLISHED: 2020-08-04
An exploitable arbitrary file delete vulnerability exists in SoftPerfect RAM Disk 4.1 spvve.sys driver. A specially crafted I/O request packet (IRP) can allow an unprivileged user to delete any file on the filesystem. An attacker can send a malicious IRP to trigger this vulnerability.