Black Hat USA
August 4-9, 2018
Las Vegas, NV, USA
Black Hat Trainings
October 22-23, 2018
Chicago, IL USA
Black Hat Europe
December 3-6, 2018
London UK
Event Updates
Black Hat Europe: Get the Nation-State Perspective on Cybersecurity
Black Hat Staff,
Attendees of Black Hat Europe in London next week will hear about worldwide cybersecurity developments and challenges from the Global Commission on the Stability of Cyberspaces Marina Kaljurand.
By Black Hat Staff , 11/29/2018
Comment0 comments  |  Read  |  Post a Comment
See the Future of Cybersecurity at Black Hat Europe
Black Hat Staff,
New tools, techniques, and a plan for training a new generation of crack security experts are all in the cards for attendees of Black Hat Europe in London next week.
By Black Hat Staff , 11/27/2018
Comment0 comments  |  Read  |  Post a Comment
Black Hat Europe: Stock Up On New Security Tools and Training
Black Hat Staff,
If you work in cybersecurity it's important to stay abreast of the latest tools and techniques, and theres no better place to do that than Black Hat Europe in London next month.
By Black Hat Staff , 11/20/2018
Comment1 Comment  |  Read  |  Post a Comment
More Event Updates
News & Commentary
'PowerSnitch' Hacks Androids via Power Banks
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Researcher demonstrates how attackers could steal data from smartphones while they're charging.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 12/8/2018
Comment3 comments  |  Read  |  Post a Comment
Toyota Builds Open-Source Car-Hacking Tool
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
PASTA testing platform specs will be shared via open-source.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 12/5/2018
Comment1 Comment  |  Read  |  Post a Comment
Windows 10 Security Questions Prove Easy for Attackers to Exploit
Kelly Sheridan, Staff Editor, Dark ReadingNews
New research shows how attackers can abuse security questions in Windows 10 to maintain domain privileges.
By Kelly Sheridan Staff Editor, Dark Reading, 12/5/2018
Comment1 Comment  |  Read  |  Post a Comment
Former Estonian Foreign Minister Urges Cooperation in Cyberattack Attribution, Policy
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Nations must band together to face nation-state cyberattack threats, said Marina Kaljurand.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 12/5/2018
Comment0 comments  |  Read  |  Post a Comment
London Blue BEC Cybercrime Gang Unmasked
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Security firm turned the tables on attackers targeting its chief financial officer in an email-borne financial scam.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 12/4/2018
Comment0 comments  |  Read  |  Post a Comment
Black Hat: European Security Pros Wrestling With Potential Breaches, Privacy Issues
Tim Wilson, Editor in Chief, Dark Reading, News
Black Hat Europe attendee survey shows European cybersecurity leaders are uncertain of their ability to protect end user data and are fearful of a near-term breach of critical infrastructure.
By Tim Wilson, Editor in Chief, Dark Reading , 11/14/2018
Comment0 comments  |  Read  |  Post a Comment
7 Cool New Security Tools to be Revealed at Black Hat Europe
Ericka Chickowski, Contributing Writer, Dark Reading
Black Hat Europe's Arsenal lineup will include demoes of new security tools, from AI malware research to container orchestration.
By Ericka Chickowski Contributing Writer, Dark Reading, 11/12/2018
Comment0 comments  |  Read  |  Post a Comment
Finding Gold in the Threat Intelligence Rush
Kelly Sheridan, Staff Editor, Dark ReadingNews
Researchers sift through millions of threat intel observations to determine where to best find valuable threat data.
By Kelly Sheridan Staff Editor, Dark Reading, 11/7/2018
Comment0 comments  |  Read  |  Post a Comment
New Bluetooth Vulnerabilities Exposed in Aruba, Cisco, Meraki Access Points
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
'BleedingBit' could give attackers control of the wireless network from a remote vantage point.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 11/1/2018
Comment0 comments  |  Read  |  Post a Comment
Hardware Cyberattacks: How Worried Should You Be?
Kelly Sheridan, Staff Editor, Dark ReadingNews
How to fit hardware threats into your security model as hardware becomes smaller, faster, cheaper, and more complex.
By Kelly Sheridan Staff Editor, Dark Reading, 10/31/2018
Comment1 Comment  |  Read  |  Post a Comment
DeepPhish: Simulating Malicious AI to Act Like an Adversary
Kelly Sheridan, Staff Editor, Dark ReadingNews
How researchers developed an algorithm to simulate cybercriminals' use of artificial intelligence and explore the future of phishing.
By Kelly Sheridan Staff Editor, Dark Reading, 10/26/2018
Comment1 Comment  |  Read  |  Post a Comment
Side-Channel Attack Exposes User Accounts on Facebook, XBox, Other Social Sites
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Researcher will demonstrate at Black Hat Europe his team's recent discovery: a way to exploit popular user-blocking feature on social media and other sites.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 10/25/2018
Comment0 comments  |  Read  |  Post a Comment
New Security Woes for Popular IoT Protocols
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Researchers at Black Hat Europe will detail denial-of-service and other flaws in MQTT, CoAP machine-to-machine communications protocols that imperil industrial and other IoT networks online.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 10/18/2018
Comment0 comments  |  Read  |  Post a Comment
IBM Builds 'SOC on Wheels' to Drive Cybersecurity Training
Kelly Sheridan, Staff Editor, Dark ReadingNews
A tractor trailer housing a Cyber Tactical Operation Center will travel throughout the US and Europe for incident response training, security support, and education.
By Kelly Sheridan Staff Editor, Dark Reading, 10/15/2018
Comment1 Comment  |  Read  |  Post a Comment
How Secure are our Voting Systems for November 2018?
Dark Reading Staff, CommentaryVideo
Anomali CEO Hugh Njemanze discusses the importance of sharing threat intelligence across the countrys highly decentralized voting systems to safeguard the integrity of upcoming elections.
By Dark Reading Staff , 9/14/2018
Comment4 comments  |  Read  |  Post a Comment
4 Practical Measures to Improve Election Security Now
Chris Wysopal,  Chief Technology Officer, CA Veracode Commentary
It's more critical than ever for states to protect our democratic system and voting infrastructure from foreign cyber espionage.
By Chris Wysopal Chief Technology Officer, CA Veracode , 9/11/2018
Comment1 Comment  |  Read  |  Post a Comment
Lessons From the Black Hat USA NOC
Curtis Franklin Jr., Senior Editor at Dark ReadingCommentary
The conference's temporary network operations center provides a snapshot of what is possible when a variety of professionals work together.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 8/30/2018
Comment0 comments  |  Read  |  Post a Comment
Overestimating WebAssembly's Security Benefits Is Risky for Developers
Dark Reading Staff, CommentaryVideo
Although WebAssembly technology promises both better performance and better security to developers, it also creates a new risk for native exploits in the browser.
By Dark Reading Staff , 8/29/2018
Comment0 comments  |  Read  |  Post a Comment
Researcher Cracks San Francisco's Emergency Siren System
Dark Reading Staff, CommentaryVideo
Bastille researcher Balint Seeber discusses the process of creating SirenJack and cracking one of a city's critical safety systems.
By Dark Reading Staff , 8/24/2018
Comment2 comments  |  Read  |  Post a Comment
What a Forensic Analysis of 'Worst Voting Machine Ever' Turned Up
Dark Reading Staff, CommentaryVideo
University of Copenhagen associate professor discusses what he found when he dug into some decommissioned WinVote voting machines.
By Dark Reading Staff , 8/22/2018
Comment0 comments  |  Read  |  Post a Comment
More Stories
Twitter Feed
Current Conversations
More Conversations
Black Hat
Black Hat is the most technical and relevant global information security event series in the world. For more than 19 years, Black Hat has provided attendees with the very latest in information security research, development, and trends. These high-profile global Briefings and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors.
www.blackhat.com
White Papers
Video
Register for Dark Reading Newsletters
Current Issue
10 Best Practices That Could Reshape Your IT Security Department
This Dark Reading Tech Digest, explores ten best practices that could reshape IT security departments.
Cartoon Contest