Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Black Hat Asia
March 26-29, 2019
Singapore
Black Hat USA
August 3-8, 2019
Las Vegas, NV, USA
Black Hat Europe
December 3-6, 2019
London UK
Event Updates
Come to Black Hat USA for the Latest Hardware Hacks
Black Hat Staff,
Cars. Vending machines. Hotel suites. Security experts will share the tools and techniques theyve used to break into all these things and more at Black Hat USA in October.
By Black Hat Staff , 6/19/2019
Comment0 comments  |  Read  |  Post a Comment
Find Your Next Favorite Cybersecurity Tool at the Black Hat USA Arsenal
Black Hat Staff,
Learn new enterprise-grade techniques for identifying vulnerabilities, improving Active Directory security, and building trust with customers at Black Hat USA this summer.
By Black Hat Staff , 6/17/2019
Comment0 comments  |  Read  |  Post a Comment
Black Hat USA Offers Fresh Perspectives on Enterprise Cybersecurity
Black Hat Staff,
Learn new enterprise-grade techniques for identifying vulnerabilities, improving Active Directory security, and building trust with customers at Black Hat USA this summer.
By Black Hat Staff , 6/10/2019
Comment0 comments  |  Read  |  Post a Comment
More Event Updates
News & Commentary
With GDPR's 'Right of Access,' Who Really Has Access?
Kelly Sheridan, Staff Editor, Dark ReadingNews
How a security researcher learned organizations willingly hand over sensitive data with little to no identity verification.
By Kelly Sheridan Staff Editor, Dark Reading, 6/19/2019
Comment0 comments  |  Read  |  Post a Comment
Black Hat Q&A: Defending Against Cheaper, Accessible Deepfake Tech
Black Hat Staff,  News
ZeroFoxs Matt Price and Mike Price discuss their work researching cybersecurity responses to the rising tide of deepfake videos.
By Alex Wawro, Special to Dark Reading , 6/13/2019
Comment0 comments  |  Read  |  Post a Comment
Black Hat Q&A: Bruce Schneier Calls For Public-Interest Technologists
Black Hat Staff,  News
Ahead of his 2019 Black Hat USA talk, cybersecurity luminary Bruce Schneier explains why its so important for tech experts to be actively involved in setting public policy.
By Alex Wawro, Special to Dark Reading , 5/20/2019
Comment0 comments  |  Read  |  Post a Comment
Inside Cyber Battlefields, the Newest Domain of War
Kelly Sheridan, Staff Editor, Dark ReadingNews
In his Black Hat Asia keynote, Mikko Hypponen explored implications of "the next arms race" and why cyber will present challenges never before seen in warfare.
By Kelly Sheridan Staff Editor, Dark Reading, 3/28/2019
Comment3 comments  |  Read  |  Post a Comment
Security Firm to Offer Free Hacking Toolkit
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
CQTools suite includes both exploit kits and information-extraction functions, its developers say.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 2/27/2019
Comment0 comments  |  Read  |  Post a Comment
Whose Line Is It? When Voice Phishing Attacks Get Sneaky
Kelly Sheridan, Staff Editor, Dark ReadingNews
Researchers investigate malicious apps designed to intercept calls to legitimate numbers, making voice phishing attacks harder to detect.
By Kelly Sheridan Staff Editor, Dark Reading, 2/27/2019
Comment3 comments  |  Read  |  Post a Comment
Toyota Prepping 'PASTA' for its GitHub Debut
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Carmaker's open source car-hacking tool platform soon will be available to the research community.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 2/14/2019
Comment0 comments  |  Read  |  Post a Comment
Researchers Dig into Microsoft Office Functionality Flaws
Kelly Sheridan, Staff Editor, Dark ReadingNews
An ongoing study investigating security bugs in Microsoft Office has so far led to two security patches.
By Kelly Sheridan Staff Editor, Dark Reading, 2/13/2019
Comment1 Comment  |  Read  |  Post a Comment
New Zombie 'POODLE' Attack Bred from TLS Flaw
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Citrix issues update for encryption weakness dogging the popular security protocol.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 2/8/2019
Comment1 Comment  |  Read  |  Post a Comment
Security Matters When It Comes to Mergers & Acquisitions
Matt Rose, Global Director Application Security Strategy, at CheckmarxCommentary
The recently disclosed Marriott breach exposed a frequently ignored issue in the M&A process.
By Matt Rose Global Director Application Security Strategy, at Checkmarx, 1/8/2019
Comment1 Comment  |  Read  |  Post a Comment
The Coolest Hacks of 2018
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
In-flight airplanes, social engineers, and robotic vacuums were among the targets of resourceful white-hat hackers this year.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 12/28/2018
Comment1 Comment  |  Read  |  Post a Comment
2018 In the Rearview Mirror
Kelly Jackson Higgins, Executive Editor at Dark ReadingCommentary
Among this year's biggest news stories: epic hardware vulnerabilities, a more lethal form of DDoS attack, Olympic 'false flags,' hijacked home routers, fileless malware and a new world's record for data breaches.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 12/20/2018
Comment0 comments  |  Read  |  Post a Comment
'PowerSnitch' Hacks Androids via Power Banks
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Researcher demonstrates how attackers could steal data from smartphones while they're charging.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 12/8/2018
Comment4 comments  |  Read  |  Post a Comment
Toyota Builds Open-Source Car-Hacking Tool
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
PASTA testing platform specs will be shared via open-source.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 12/5/2018
Comment2 comments  |  Read  |  Post a Comment
Windows 10 Security Questions Prove Easy for Attackers to Exploit
Kelly Sheridan, Staff Editor, Dark ReadingNews
New research shows how attackers can abuse security questions in Windows 10 to maintain domain privileges.
By Kelly Sheridan Staff Editor, Dark Reading, 12/5/2018
Comment4 comments  |  Read  |  Post a Comment
Former Estonian Foreign Minister Urges Cooperation in Cyberattack Attribution, Policy
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Nations must band together to face nation-state cyberattack threats, said Marina Kaljurand.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 12/5/2018
Comment0 comments  |  Read  |  Post a Comment
London Blue BEC Cybercrime Gang Unmasked
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Security firm turned the tables on attackers targeting its chief financial officer in an email-borne financial scam.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 12/4/2018
Comment0 comments  |  Read  |  Post a Comment
Black Hat: European Security Pros Wrestling With Potential Breaches, Privacy Issues
Tim Wilson, Editor in Chief, Dark Reading, News
Black Hat Europe attendee survey shows European cybersecurity leaders are uncertain of their ability to protect end user data and are fearful of a near-term breach of critical infrastructure.
By Tim Wilson, Editor in Chief, Dark Reading , 11/14/2018
Comment0 comments  |  Read  |  Post a Comment
7 Cool New Security Tools to be Revealed at Black Hat Europe
Ericka Chickowski, Contributing Writer
Black Hat Europe's Arsenal lineup will include demoes of new security tools, from AI malware research to container orchestration.
By Ericka Chickowski Contributing Writer, 11/12/2018
Comment0 comments  |  Read  |  Post a Comment
Finding Gold in the Threat Intelligence Rush
Kelly Sheridan, Staff Editor, Dark ReadingNews
Researchers sift through millions of threat intel observations to determine where to best find valuable threat data.
By Kelly Sheridan Staff Editor, Dark Reading, 11/7/2018
Comment0 comments  |  Read  |  Post a Comment
More Stories
Twitter Feed
Current Conversations
More Conversations
Black Hat
Black Hat is the most technical and relevant global information security event series in the world. For more than 19 years, Black Hat has provided attendees with the very latest in information security research, development, and trends. These high-profile global Briefings and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors.
www.blackhat.com
White Papers
Video
Register for Dark Reading Newsletters
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Cartoon