Advertisement
Top

Tag: Black Hat


Cyber-crime, Malware

Three ransomware gangs consecutively attacked the same network

August 9, 2022

Via: Help Net Security

Hive, LockBit and BlackCat, three prominent ransomware gangs, consecutively attacked the same network, according to Sophos. The first two attacks took place within two hours, and the third attack took place two weeks later. Each ransomware gang left its own […]


Hacker, Threats & Malware

Booming dark web gig economy is a rising threat

March 30, 2021

Via: CSO Online

“I need a site hacker for $2,000,” “Break this site for $10K,” “Can you collect information from our competitors’ websites?” or “Can you delete reviews? Budget $300.” Posts like these, in which individuals try to hire black hats, have flooded […]


Threats & Malware, Vulnerabilities

Apple expands bug bounty program, opens it to all researchers, raises rewards

August 9, 2019

Via: Help Net Security

Three years ago at the Black Hat conference, Apple announced its first bug bounty program, which was invite-only and limited to iOS. At this year’s edition of the con, Ivan Krstić, Apple’s head of security engineering and architecture, announced changes […]


Network security

7 Hot Cybersecurity Trends to Be Highlighted at Black Hat

July 8, 2019

Via: Dark Reading

Black Hat USA is fast approaching. With the full conference schedule online, now is the time for security pros to dive in and plan out their paths to exploring a wide range of learning opportunities. As with years past, the […]


Network security

Black Hat USA Offers Fresh Perspectives on Enterprise Cybersecurity

June 10, 2019

Via: Dark Reading

Cybersecurity at the enterprise level is a unique beast, and there’s no better place to meet fellow enterprise security professionals and learn new tricks than Black Hat USA in Las Vegas this August. There’s a whole Enterprise track of Briefings […]


Application security, Security

Learn New Malware-Fighting Tools & Techniques at Black Hat Asia

February 14, 2019

Via: Dark Reading

There’s no better place to sharpen your cybersecurity skills than Black Hat Asia in Singapore next month, where you’ll have access to a cornucopia of practical, hands-on Trainings, Briefings, and Arsenal tools intended to help you master even the trickiest […]


Application security, Security

Qualys Community Edition: Discover IT assets, manage vulnerabilities, scan web apps

September 6, 2018

Via: Help Net Security

In this podcast recorded at Black Hat USA 2018, Anthony Mogannam, Product Manager, SME/SMB Solutions at Qualys, talks about issues related to open source software and Qualys Community Edition. Here’s a transcript of the podcast for your convenience. Hello everybody, […]


Vulnerabilities

Black Hat 2018: IoT Security Issues Will Lead to Legal ‘Feeding Frenzy’

August 14, 2018

Via: Threat Post

LAS VEGAS – The troves of insecure internet of things (IoT) devices have not yet led to widespread legal implications. But that’s set to change, a well-known attorney warned at Black Hat USA last week. Ijay Palansky, partner at the […]


Malware, Threats & Malware, Virus & Malware

IoT Malware Discovered Trying to Attack Satellite Systems of Airplanes, Ships

August 10, 2018

Via: Dark Reading

BLACK HAT USA – Las Vegas – Ruben Santamarta was flying from Madrid to Copenhagen in November 2017 on a Norwegian Airlines flight when he decided to inspect the plane’s Wi-Fi network security. So he launched Wireshark from his laptop […]


Vulnerabilities

Key elements for successfully prioritizing vulnerability remediation

August 23, 2016

Via: Help Net Security

New vulnerabilities are disclosed every day, amounting to thousands per year. Naturally, not all vulnerabilities are created equal. In this podcast recorded at Black Hat USA 2016, Tim White, Director of Product Management at Qualys, talks about Qualys ThreatPROTECT, a […]


Vulnerabilities

New Windows Attack Turns Evil Maid into Malicious Butler

August 5, 2016

Via: Security Week

Researchers at Microsoft have demonstrated that a Windows vulnerability previously believed to be exploitable only in physical access scenarios can also be launched remotely, which could make it a tempting target for advanced persistent threat actors. Last year at the […]


Application security, Mobile security

Black Hat security conference trims insecure features from its mobile app

August 1, 2016

Via: CIO

Black Hat has disabled features of its mobile application because attackers could have logged in as legitimate attendees, posted messages in their names and spied on the messages they sent. The problem was discovered by mobile security vendor Lookout who […]


Vulnerabilities

Black Hat 2015 attendees concerned about endpoint risks

August 16, 2015

Via: vulnerabilities

Security professionals are most concerned about the endpoint, citing it as the greatest source of risk in a Bromium survey of more than 100 pros who attended Black Hat USA 2015 in Las Vegas last week. That’s not surprising to […]


Threats & Malware

Design flaw in Intel processors opens door to rootkits, researcher says

August 7, 2015

Via: threats-and-malware

A design #flaw in the x86-#processor #architecture dating back almost two decades could allow attackers to install a #rootkit in the low-level firmware of computers, a security researcher said Thursday. Such malware could be undetectable by security products. The vulnerability […]


Cyber-crime

Black Hat 2015: What to watch out for, besides cars and guns

August 4, 2015

Via: cyber-crime

The Black Hat conference in Las Vegas this week is a major event in the cybersecurity calendar, happening every summer, and delivering a large amount of fresh security knowledge as well as a wide range of security training. So what […]


Network security

Norse to Showcase Live Attack Intelligence Solutions at BlackHat

June 25, 2015

Via: network-security

Norse has announced it will showcase its latest live attack cybersecurity solutions at Booth 359 at the BlackHat Conference, August 5-6 in the Mandalay Bay Hotel in Las Vegas. Norse provides enterprise security professionals with immediate and actionable information to […]