Black Hat USA
August 4-9, 2018
Las Vegas, NV, USA
Black Hat Trainings
October 22-23, 2018
Chicago, IL USA
Black Hat Europe
December 3-6, 2018
London UK
Event Updates
Transparent Orchestration of Security to Accelerate the Digital Transformation Journey
Black Hat Staff,
The extension of infrastructures from on-premises IT environments to multiple cloud ecosystems delivers organizations newly transformed digital services with increased value.
By Sumedh Thakar, Chief Product Officer, Qualys , 6/27/2018
Comment0 comments  |  Read  |  Post a Comment
Black Hat USA 2018:
Comandeering Voice Enabled Devices
Black Hat Staff,
Researchers Amichai Shulman, Ron Marcovich, Tal Be'ery and Yuval Ron will detail a vulnerability of Microsofts Cortana in their Black Hat USA Briefing Open Sesame: Picking Locks with Cortana.
By Black Hat Staff , 6/18/2018
Comment0 comments  |  Read  |  Post a Comment
Announcing: Black Hat Europe 2018
Black Hat Staff,
Black Hat Europe returns to the ExCeL London, December 3-6, 2018
By Black Hat Staff , 6/13/2018
Comment0 comments  |  Read  |  Post a Comment
More Event Updates
News & Commentary
Miller & Valasek: Security Stakes Higher for Autonomous Vehicles
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Car hacking specialists shift gears and work on car defense in their latest gigs - at GM subsidiary Cruise Automation.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/15/2018
Comment1 Comment  |  Read  |  Post a Comment
2018 Pwnie Awards: Who Pwned, Who Got Pwned
Kelly Sheridan, Staff Editor, Dark Reading
A team of security experts round up the best and worst of the year in cybersecurity at Black Hat 2018.
By Kelly Sheridan Staff Editor, Dark Reading, 8/15/2018
Comment0 comments  |  Read  |  Post a Comment
New PHP Exploit Chain Highlights Dangers of Deserialization
Ericka Chickowski, Contributing Writer, Dark ReadingNews
PHP unserialization can be triggered by other vulnerabilities previously considered low-risk.
By Ericka Chickowski Contributing Writer, Dark Reading, 8/15/2018
Comment0 comments  |  Read  |  Post a Comment
Hacker Unlocks 'God Mode' and Shares the 'Key'
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
At Black Hat USA and DEF CON, researcher Christopher Domas showed how he found backdoors that may exist in many different CPUs.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 8/13/2018
Comment0 comments  |  Read  |  Post a Comment
NSA Brings Nation-State Details to DEF CON
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Hackers were eager to hear the latest from the world of nation-state cybersecurity.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 8/10/2018
Comment0 comments  |  Read  |  Post a Comment
IoT Malware Discovered Trying to Attack Satellite Systems of Airplanes, Ships
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Researcher Ruben Santamarta shared the details of his successful hack of an in-flight airplane Wi-Fi network and other findings at Black Hat USA today.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/9/2018
Comment0 comments  |  Read  |  Post a Comment
Cloud Intelligence Throwdown: Amazon vs. Google vs. Microsoft
Kelly Sheridan, Staff Editor, Dark ReadingNews
A closer look at native threat intelligence capabilities built into major cloud platforms and discussion of their strengths and shortcomings.
By Kelly Sheridan Staff Editor, Dark Reading, 8/9/2018
Comment0 comments  |  Read  |  Post a Comment
Dark Reading News Desk Live at Black Hat USA 2018
Sara Peters, Senior Editor at Dark ReadingNews
Watch here Wednesday and Thursday, 2 p.m. - 6 p.m. ET to see over 40 live video interviews straight from the Black Hat USA conference in Las Vegas.
By Sara Peters Senior Editor at Dark Reading, 8/9/2018
Comment1 Comment  |  Read  |  Post a Comment
No, The Mafia Doesn't Own Cybercrime: Study
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Organized crime does, however, sometimes provide money-laundering and other expertise to cybercriminals.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/8/2018
Comment0 comments  |  Read  |  Post a Comment
Researchers Release Free TRITON/TRISIS Malware Detection Tools
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Team of experts re-creates the TRITON/TRISIS attack to better understand the epic hack of an energy plant that ultimately failed.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/8/2018
Comment0 comments  |  Read  |  Post a Comment
Google Engineering Lead on Lessons Learned From Chrome's HTTPS Push
Kelly Sheridan, Staff Editor, Dark ReadingNews
Google engineering director Parisa Tabriz took the Black Hat keynote stage to detail the Chrome transition and share advice with security pros.
By Kelly Sheridan Staff Editor, Dark Reading, 8/8/2018
Comment6 comments  |  Read  |  Post a Comment
Understanding Firewalls: Build Them Up, Tear Them Down
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
A presentation at Black Hat USA will walk attendees through developing a firewall for MacOS, and then poking holes in it.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 8/8/2018
Comment0 comments  |  Read  |  Post a Comment
Spot the Bot: Researchers Open-Source Tools to Hunt Twitter Bots
Kelly Sheridan, Staff Editor, Dark ReadingNews
Their goal? To create a means of differentiating legitimate from automated accounts and detail the process so other researchers can replicate it.
By Kelly Sheridan Staff Editor, Dark Reading, 8/6/2018
Comment0 comments  |  Read  |  Post a Comment
Google Researcher Unpacks Rare Android Malware Obfuscation Library
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Analysis exposes the lengths malware authors will go to in order to protect their code from disassembly and reverse engineering.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 8/1/2018
Comment0 comments  |  Read  |  Post a Comment
10 More Women in Security You May Not Know But Should
Kelly Sheridan, Staff Editor, Dark Reading
The second installment in a series highlighting women who are driving change in cybersecurity but may not be on your radar yet.
By Kelly Sheridan Staff Editor, Dark Reading, 7/31/2018
Comment1 Comment  |  Read  |  Post a Comment
Automating Kernel Exploitation for Better Flaw Remediation
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Black Hat researchers plan on open sourcing a new framework they say can help organizations get a better rein on vulnerability fixes for kernel bugs.
By Ericka Chickowski Contributing Writer, Dark Reading, 7/27/2018
Comment0 comments  |  Read  |  Post a Comment
Stealth Mango Proves Malware Success Doesn't Require Advanced Tech
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
At Black Hat USA, a pair of researchers will show how unsophisticated software can still be part of a successful surveillance campaign.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 7/26/2018
Comment6 comments  |  Read  |  Post a Comment
The ABCs of Hacking a Voting Machine
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
A hacker who successfully infiltrated a voting machine at last year's DEF CON will demonstrate at Black Hat USA how he did it, as well as what he later found stored on other decommissioned WinVote machines.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 7/25/2018
Comment1 Comment  |  Read  |  Post a Comment
Iranian Hacker Group Waging Widespread Espionage Campaign in Middle East
Jai Vijayan, Freelance writerNews
Unlike other threat actors that have a narrow set of targets, Leafminer has over 800 organizations in its sights, Symantec says.
By Jai Vijayan Freelance writer, 7/25/2018
Comment0 comments  |  Read  |  Post a Comment
Software is Achilles Heel of Hardware Cryptocurrency Wallets
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Upcoming Black Hat talk will detail software vulnerabilities that can put private cryptocurrency wallets and currency exchange services at risk.
By Ericka Chickowski Contributing Writer, Dark Reading, 7/23/2018
Comment0 comments  |  Read  |  Post a Comment
More Stories
Twitter Feed
Current Conversations
More Conversations
Black Hat
Black Hat is the most technical and relevant global information security event series in the world. For more than 19 years, Black Hat has provided attendees with the very latest in information security research, development, and trends. These high-profile global Briefings and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors.
www.blackhat.com
White Papers
Video
Register for Dark Reading Newsletters
Current Issue
Cartoon Contest