Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Black Hat Asia
March 26-29, 2019
Singapore
Black Hat USA
August 3-8, 2019
Las Vegas, NV, USA
Black Hat Europe
December 2-5, 2019
London UK
8/2/2019
09:00 AM
Black Hat Staff
Black Hat Staff
Event Updates
50%
50%

Learn to Safeguard Critical Industrial Targets at Black Hat USA

Cybersecurity experts will share their latest insights and strategies for protecting industrial sites and equipment, from electric motors to satellites.

Some of the most grievous cybersecurity breaches happen at industrial facilities responsible for providing critical services like power, so it pays to stay on top of what’s happening in the field of industrial security. Black Hat USA offers an entire track of Smart Grid and Industrial Security Briefings that will help you do just that. As you prepare to attend the event next week in Las Vegas be sure not to overlook some of the most promising industrial cybersecurity Briefings.

Sensor and Process Fingerprinting in Industrial Control Systems will equip you with a full understanding of the most common cyber and cyber-physical attack vectors to critical infrastructure. You’ll learn practical detection and defense strategies for both cyber and physical attacks on industrial targets and enjoy full video walkthroughs of attacks and defenses in a state-of-the-art water treatment testbed.

Attacking Electric Motors for Fun and Profit is another great Briefing to check out because it promises a useful breakdown of electric motor vulnerabilities and defense strategies, based on a wide analysis of electric motors used in everything from cars to industrial robots to phones. It’s rare to see this level of cybersecurity analysis for electric motors, so expect to walk away with a better understanding of how to compromise motors using techniques like pin-control attacks disrupting PWM, DOS or injection network attacks, sensor attacks, and exploiting the lack of security controls of software libraries on electric motor controllers.

For a broader perspective on industrial system cybersecurity make time for Cybersecurity Risk Assessment for Safety-Critical Systems, a Briefing from Honeywell on the vulnerabilities of truly critical infrastructure. Much of this Briefing is focused on space, so you can expect to learn all about the weak points in the satellite systems and networks that support agriculture, transportation, and the military. Plus, you’ll learn about a new technique for assessing security risks for safety-critical systems like space systems and enjoy a discussion on what the next steps should be in advancing cybersecurity for space systems.

Black Hat USA returns to the Mandalay Bay in Las Vegas August 3-8, 2019. For more information on what’s happening at the event and how to register, check out the Black Hat website.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
For Cybersecurity to Be Proactive, Terrains Must Be Mapped
Craig Harber, Chief Technology Officer at Fidelis Cybersecurity,  10/8/2019
A Realistic Threat Model for the Masses
Lysa Myers, Security Researcher, ESET,  10/9/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-10759
PUBLISHED: 2019-10-15
safer-eval before 1.3.4 are vulnerable to Arbitrary Code Execution. A payload using constructor properties can escape the sandbox and execute arbitrary code.
CVE-2019-10760
PUBLISHED: 2019-10-15
safer-eval before 1.3.2 are vulnerable to Arbitrary Code Execution. A payload using constructor properties can escape the sandbox and execute arbitrary code.
CVE-2019-17397
PUBLISHED: 2019-10-15
In the DoorDash application through 11.5.2 for Android, the username and password are stored in the log during authentication, and may be available to attackers via logcat.
CVE-2019-12944
PUBLISHED: 2019-10-15
Glue Smart Lock 2.7.8 devices do not properly block guest access in certain situations where the network connection is unavailable.
CVE-2019-17195
PUBLISHED: 2019-10-15
Connect2id Nimbus JOSE+JWT before v7.9 can throw various uncaught exceptions while parsing a JWT, which could result in an application crash (potential information disclosure) or a potential authentication bypass.