Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Black Hat USA
August 1-6, 2020
Las Vegas, NV, USA
Black Hat Asia
September 29 - October 2, 2020
Singapore
Black Hat Europe
November 9-12, 2020
London UK
7/17/2019
09:00 AM
Dark Reading
Dark Reading
Event Updates
50%
50%

Master Next-Level Network Defense Techniques at Black Hat USA

Brush up on new DDOS defense tricks, 5G network vulnerabilities, and applications of military strategy to cybersecurity.

Network technology advances at a blistering pace, so it’s critical that cybersecurity professionals stay on top of the latest network vulnerabilities, hacks, and exploits. There’s no better place to do that than Black Hat USA in Las Vegas this August, where an entire Network Defense track of Briefing is dedicated to keep you abreast of the latest happenings in network security.

Defense Against Rapidly Morphing DDOS offers a rare opportunity to learn from the sustained, rapidly-morphing DDOS attacks ProtonMail suffered in 2018. Researchers created an attack toolkit that mimics the ProtonMail attacks and used it to study the efficacy of various defenses against similar threats. What they found: a combination of an unsupervised machine learning algorithm to determine a baseline, perform anomaly detection and mitigation, and another machine learning algorithm to tune the performance of the first, yielded the most effective defense. Attend this Briefing to learn how to apply these lessons to your own cybersecurity work.

In Operational Templates for State-Level Attack and Collective Defense of Countries you will examine templates for attacking and defending nations. Militaries have long used doctrinal templates – models based on known or postulated adversary doctrine – to support traditional kinetic warfare training and warfighting. The same approach works well for defending in cyberspace. You’ll receive templates of ways threat actors could disrupt or defeat a country, considering various time horizons and degrees of attribution. Expect to leave this talk with a playbook for how nations might be attacked and defended, a methodology for creating templates and scenarios useful for your own defensive planning, and an enhanced understanding of our collective vulnerability and the need for teamwork to overcome the problem!

Finally, don’t miss New Vulnerabilities in 5G Networks if you’re at all curious about what to expect from the oncoming wave of 5G devices and networks. Researchers will break down the security features of 5G radio networks and reveal new vulnerabilities affecting both the operator infrastructure and end-devices (including mobiles, NB-IoT, laptop etc). You’ll also learn how these new vulnerabilities in the 5G/4G security standards can be exploited using low-cost hardware and software platforms and discover a cool new automated tool to carry out practical evaluation and share data-sets with the research community.

Black Hat USA returns to the Mandalay Bay in Las Vegas August 3-8, 2019. For more information on what’s happening at the event and how to register, check out the Black Hat website.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8423
PUBLISHED: 2020-04-02
A buffer overflow in the httpd daemon on TP-Link TL-WR841N V10 (firmware version 3.16.9) devices allows an authenticated remote attacker to execute arbitrary code via a GET request to the page for the configuration of the Wi-Fi network.
CVE-2019-14868
PUBLISHED: 2020-04-02
In ksh version 20120801, a flaw was found in the way it evaluates certain environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Services and applications that allow remote unauthenticated attackers to provide one of those env...
CVE-2019-20635
PUBLISHED: 2020-04-02
codeBeamer before 9.5.0-RC3 does not properly restrict the ability to execute custom Java code and access the Java class loader via computed fields.
CVE-2020-11452
PUBLISHED: 2020-04-02
Microstrategy Web 10.4 includes functionality to allow users to import files or data from external resources such as URLs or databases. By providing an external URL under attacker control, it's possible to send requests to external resources (aka SSRF) or leak files from the local system using the f...
CVE-2020-11453
PUBLISHED: 2020-04-02
Microstrategy Web 10.4 is vulnerable to Server-Side Request Forgery in the Test Web Service functionality exposed through the path /MicroStrategyWS/. The functionality requires no authentication and, while it is not possible to pass parameters in the SSRF request, it is still possible to exploit it ...