Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats //

Advanced Threats

Dark Reading Plans Special Coverage Of Black Hat USA 2014

Radio shows, daily newsletter, and panel sessions highlight Dark Reading's comprehensive coverage of the Black Hat conference.

LAS VEGAS, NEVADA — The Black Hat USA 2014 conference is under way here this week, and Dark Reading is preparing a broad range of special coverage for this year's show.

To begin with, we have already posted more than 30 session previews, speaker announcements, radio show broadcasts, and other items about the show. You'll find all of our show coverage -- both today and all through this exciting week -- on Dark Reading's special Black Hat News page, which is now a regular feature of the Dark Reading site. On this page, you will find a constant stream of news from the show, including news stories, interviews, and onsite commentary from our editorial team and from expert contributors who are here in Las Vegas.

On Tuesday, editors Kelly Jackson Higgins and Tim Wilson will be doing live interviews with top security industry speakers at the annual Black Hat Executive Summit, an invitation-only gathering of IT security exectives from around the globe. Among the interviews are Phyllis Schneck, Deputy Under Secretary for Cybersecurity at the Department of Homeland Security's National Protection and Programs Directorate; Rod Beckstrom, Chief Security Advisor at Samsung and former President and CEO of ICANN; and Paul Vixie, CEO of Farsight and member of the Internet Hall of Fame.

On Wednesday and Thursday, the Dark Reading team will launch the first-ever edition of its Black Hat Radio program, which will offer live interviews with top speakers from the conference. Among the interviews are Jim Reavis, co-founder of the Cloud Security Alliance and Tom Cross, Director of Security Research at Lancope, who will discuss their presentations at Black Hat. Check the Dark Reading Radio section of the DR homepage for the latest schedule of radio shows and interviews.

On Thursday, Dark Reading will sponsor two special workshops on security research: The Future of Responsible Disclosure and Attribution: What It Means For Enterprise Security. The disclosure panel will focus on how researchers reveal security vulnerabilities and features experts Tod Beardsley of Rapid7 and Metasploit; Dino Dai Zovi of @ Square; Vinnie Liu of Bishop Fox; and Katie Moussouris of HackerOne. The attribution panel will focus on the nature and value of identifying your attacker and features Adam Meyers of CrowdStrike; Chris Nutt of Mandiant/FireEye; Chris Porter of the Verizon Cyber Intelligence Center; and Lucas Zaichkowsky of AccessData.

On Tuesday, Wednesday and Thursday, Dark Reading will send out a daily newsletter to its subscribers as well as Black Hat conference attendees. The newsletter, which will feature show-focused news and commentary as well as highlights of each day's Black Hat events, will be mailed automatically to Dark Reading newsletter subscribers. If you have not subscribed and would like to receive the newsletters, you can sign up here.

During the course of this Black Hat week, as well as later this month, Dark Reading will add many more news stories, columns, slide shows, photos, and radio broadcasts to its archive of Black Hat coverage. For all the latest from the show, as well as the opportunity to comment and add to the discussion, keep an eye on Dark Reading in the days ahead. We look forward to the conference!

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/1/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Threat from the Internet--and What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15478
PUBLISHED: 2020-07-01
The Journal theme before 3.1.0 for OpenCart allows exposure of sensitive data via SQL errors.
CVE-2020-6261
PUBLISHED: 2020-07-01
SAP Solution Manager (Trace Analysis), version 7.20, allows an attacker to perform a log injection into the trace file, due to Incomplete XML Validation. The readability of the trace file is impaired.
CVE-2020-15471
PUBLISHED: 2020-07-01
In nDPI through 3.2, the packet parsing code is vulnerable to a heap-based buffer over-read in ndpi_parse_packet_line_info in lib/ndpi_main.c.
CVE-2020-15472
PUBLISHED: 2020-07-01
In nDPI through 3.2, the H.323 dissector is vulnerable to a heap-based buffer over-read in ndpi_search_h323 in lib/protocols/h323.c, as demonstrated by a payload packet length that is too short.
CVE-2020-15473
PUBLISHED: 2020-07-01
In nDPI through 3.2, the OpenVPN dissector is vulnerable to a heap-based buffer over-read in ndpi_search_openvpn in lib/protocols/openvpn.c.