Profile cover photo
Profile photo
Black Hat
1,779 followers -
About Us
About Us

1,779 followers
About
Posts

Post has attachment
Executive Summit at #BlackHat Europe 2018: There’s still time for senior security professionals to apply to attend the Summit, December 4 in London. Details here: http://ow.ly/vTZA30mG8Ag
Add a comment...

Post has attachment
A new attack to bypass the Apple File System’s (APFS) security measures in iOS, which allows an attacker to tamper with any file or directory on the system #BHEU Briefing http://ow.ly/LUH730mG8uf
Add a comment...

Post has attachment
Open source tool TROMMEL sifts through embedded device files to identify potential vulnerable indicators, and integrates vFeed, to provide a custom intersection with Exploit-DB, Metasploit, Snort, and Nmap. Catch a demo at #BHEU Arsenal in London http://ow.ly/4QKQ30mG8ya
Add a comment...

Post has attachment
.JP Aumasson will discuss Iota's custom crypto, describe how millions worth of tokens could have been stolen, and present examples of bugs found in popular #Bitcoin software utilities + security failures in #blockchain systems #BHEU Briefing http://ow.ly/KSHf30mG8ww
Add a comment...

Post has attachment
“Windows Enterprise Incident Response” examines how memory is structured on a Windows system, the artifacts & evidence available in physical memory & the page file, and how memory analysis can identify advanced techniques used by malware #BHEU Training http://ow.ly/kbcb30mG8sd
Add a comment...

Post has attachment
Register for free #BlackHat Webcast to learn results of a case study on 2FA usage, including implications for increasing accessibility & user-acquisition — Thursday, November 29 at 12:00 PT http://ow.ly/yI5530mFeRx
Add a comment...

Post has attachment
The full infection chain showing how Sednit was able to install their custom UEFI module on key targets computers and an in-depth analysis of their module and the associated trojanized LoJack agent #BHEU Briefing by @jiboutin & Freddrickkhttp://ow.ly/rDPN30mFeIP
Add a comment...

Post has attachment
Master #threatmodeling best practices to enhance security in the design phase during hands-on #BHEU Training by Seba Deleersnyder http://ow.ly/6DkV30mFeNA
Add a comment...

Post has attachment
Researchers deep dive into the Microsoft Edge security architecture and describe two logical sandbox escape bug chains, that were discovered by abusing normal features implemented in the browser and operating system #BHEU Briefing http://ow.ly/qih650jJkDb
Add a comment...

Post has attachment
.@MarinaKaljurand to discuss changes in #cybersecurity since politically-motivated cyber-attacks on Estonia in 2007 and challenges the industry continues to face in 2018/2019 during #BHEU 2018 Keynote on Wednesday, December 5 http://ow.ly/Eoju50jJkC1
Add a comment...
Wait while more posts are being loaded