Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Black Hat USA
August 1-6, 2020
Las Vegas, NV, USA
Black Hat Asia
September 29 - October 2, 2020
Singapore
Black Hat Europe
November 9-12, 2020
London UK
Event Updates
Virtual Black Hat USA Offers Unparalleled Access to Expert Security Insights
Black Hat Staff,
Attendees can look forward to the same high-quality Briefings and Trainings from the comfort of their own desk.
By Black Hat Staff , 5/27/2020
Comment0 comments  |  Read  |  Post a Comment
Reminder: The Black Hat USA 2020 Call for Papers Ends Monday
Black Hat Staff,
Now is the time to pitch your great idea for a groundbreaking information security Briefing at Black Hat USA in August. But hurry because submissions close April 6!
By Black Hat Staff , 4/3/2020
Comment0 comments  |  Read  |  Post a Comment
Black Hat Europe Brings A Bevy of IoT Security Insights
Black Hat Staff,
Attend this London event next month for the latest on how security researchers are finding (and solving) security vulnerabilities in all of your favorite Internet-connected devices.
By Black Hat Staff , 11/15/2019
Comment0 comments  |  Read  |  Post a Comment
More Event Updates
News & Commentary
Building Security Strategies in Sub-Saharan Africa: Trends and Concerns
Kelly Sheridan, Staff Editor, Dark ReadingNews
Security experts discuss the rise in cybercrime affecting sub-Saharan Africa and the necessary changes to improve security.
By Kelly Sheridan Staff Editor, Dark Reading, 7/2/2020
Comment0 comments  |  Read  |  Post a Comment
Chinese Software Company Aisino Uninstalls GoldenSpy Malware
Steve Zurier, Contributing WriterNews
Follow-up sandbox research confirms Aisino knew about the malware in its tax software, though it's still unclear whether it was culpable.
By Steve Zurier Contributing Writer, 7/1/2020
Comment0 comments  |  Read  |  Post a Comment
Black Hat Survey: Breach Concerns Hit Record Levels Due to COVID-19
Tim Wilson, Editor in Chief, Dark Reading, News
Annual "Black Hat USA Attendee Survey" indicates unprecedented concern over possible compromises of enterprise networks and US critical infrastructure.
By Tim Wilson, Editor in Chief, Dark Reading , 6/24/2020
Comment0 comments  |  Read  |  Post a Comment
Have Your Say: Dark Reading Video News Desk Seeks Reader Contributions
Edge Editors, Dark ReadingNews
We've got questions for you on black infosec, burnout, vulnerabilities, COVID-19, and much more. Send us your video responses and we'll play them in our News Desk broadcast during Black Hat Virtual.
By Edge Editors Dark Reading, 6/18/2020
Comment0 comments  |  Read  |  Post a Comment
Schneier on Hacking Society
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
How the hacker mindset and skill set could play a role in improving and securing societal systems, according to renowned security technologist Bruce Schneier.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/9/2020
Comment2 comments  |  Read  |  Post a Comment
Maersk CISO Says NotPeyta Devastated Several Unnamed US firms
Black Hat Staff,  Commentary
At least two companies may have been dealt even more damage than the shipping giant, which lost nearly its entire global IT infrastructure.
By By Eric Parizo, Senior Analyst, Ovum , 12/9/2019
Comment2 comments  |  Read  |  Post a Comment
What's in a Botnet? Researchers Spy on Geost Operators
Kelly Sheridan, Staff Editor, Dark ReadingNews
The investigation of a major Android banking botnet yields insights about how cybercriminals structure and run an illicit business.
By Kelly Sheridan Staff Editor, Dark Reading, 12/4/2019
Comment1 Comment  |  Read  |  Post a Comment
Black Hat Europe Q&A: Understanding the Ethics of Cybersecurity Journalism
Black Hat Staff,  News
Investigative journalist Geoff White chats about why now is the right time for his Black Hat Europe Briefing on hackers, journalists, and the ethical ramifications of cybersecurity journalism.
By Alex Wawro, Special to Dark Reading , 12/4/2019
Comment0 comments  |  Read  |  Post a Comment
When Rogue Insiders Go to the Dark Web
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Employees gone bad sell stolen company information, sometimes openly touting their companies, researchers say.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 12/3/2019
Comment0 comments  |  Read  |  Post a Comment
Siemens Offers Workarounds for Newly Found PLC Vulnerability
Kelly Jackson Higgins, Executive Editor at Dark ReadingQuick Hits
An undocumented hardware-based special access feature recently found by researchers in Siemens' S7-1200 can be used by attackers to gain control of the industrial devices.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 12/3/2019
Comment0 comments  |  Read  |  Post a Comment
New Free Emulator Challenges Apple's Control of iOS
Robert Lemos, Contributing WriterNews
An open-source tool gives researchers and jailbreakers a free option for researching vulnerabilities in the operating system and gives Apple a new headache.
By Robert Lemos Contributing Writer, 11/27/2019
Comment0 comments  |  Read  |  Post a Comment
Researchers Explore How Mental Health Is Tracked Online
Kelly Sheridan, Staff Editor, Dark ReadingNews
An analysis of popular mental health-related websites revealed a vast number of trackers, many of which are used for targeted advertising.
By Kelly Sheridan Staff Editor, Dark Reading, 11/22/2019
Comment0 comments  |  Read  |  Post a Comment
Black Hat Europe Q&A: Unveiling the Underground World of Anti-Cheats
Black Hat Staff,  News
Security consultant Joel Noguera describes how he got involved in testing anti-cheat software security, and what to expect from his upcoming Black Hat Europe talk.
By Alex Wawro, Special to Dark Reading , 11/22/2019
Comment0 comments  |  Read  |  Post a Comment
Black Hat Europe Q&A: Exposing the Weaknesses in Contactless Payments
Black Hat Staff,  News
Researchers Leigh-Anne Galloway and Tim Yunusov chat about their work testing Visas contactless payments security system vulnerabilities.
By Alex Wawro, Special to Dark Reading , 11/20/2019
Comment0 comments  |  Read  |  Post a Comment
Windows Hello for Business Opens Door to New Attack Vectors
Kelly Sheridan, Staff Editor, Dark ReadingNews
Researchers exploring Windows Hello for Business found an Active Directory backdoor and other attack vectors that could lead to privilege escalation.
By Kelly Sheridan Staff Editor, Dark Reading, 11/18/2019
Comment0 comments  |  Read  |  Post a Comment
Researchers Find New Approach to Attacking Cloud Infrastructure
Kelly Sheridan, Staff Editor, Dark ReadingNews
Cloud APIs' accessibility over the Internet opens a new window for adversaries to gain highly privileged access to cloud assets.
By Kelly Sheridan Staff Editor, Dark Reading, 11/11/2019
Comment1 Comment  |  Read  |  Post a Comment
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff,  News
Security researcher Stanislas Lejay offers a preview of his upcoming Black Hat Europe talk on automotive engine computer management and hardware reverse engineering.
By By Alex Wawro, Special to Dark Reading , 11/7/2019
Comment3 comments  |  Read  |  Post a Comment
Siemens PLC Feature Can Be Exploited for Evil - and for Good
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
A hidden feature in some newer models of the vendor's programmable logic controllers leaves the devices open to attack. Siemens says it plans to fix it.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 11/5/2019
Comment0 comments  |  Read  |  Post a Comment
Security Pros and 'Black Hats' Agree on Most Tempting Targets
Dark Reading Staff, Quick Hits
Malicious actors look for accounts that are springboards to other systems, according to nearly 300 attendees of Black Hat USA.
By Dark Reading Staff , 9/5/2019
Comment0 comments  |  Read  |  Post a Comment
Splunk Buys SignalFx for $1.05 Billion
Dark Reading Staff, Quick Hits
Deal will yield 'one platform that can monitor the entire enterprise application lifecycle,' Splunk CEO says.
By Dark Reading Staff , 8/21/2019
Comment0 comments  |  Read  |  Post a Comment
More Stories
Twitter Feed
Current Conversations
Posted by TerryWilliams
Current Conversations very useful information
In reply to: thanks
Post Your Own Reply
Posted by charlesemorris
Current Conversations wow
In reply to: Re: thank for somuch
Post Your Own Reply
Posted by anthonydrobbins
Current Conversations hihihi
In reply to: thank for somuch
Post Your Own Reply
More Conversations
Black Hat
Black Hat is the most technical and relevant global information security event series in the world. For more than 20 years, Black Hat has provided attendees with the very latest in information security research, development, and trends. These high-profile global Briefings and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors.
www.blackhat.com
White Papers
Video
Register for Dark Reading Newsletters
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Cartoon