It was great to help organize R00tz (Def Con Kids Village) again this year, and to have a chance to give ITSP Magazine an inside look at our program and kid hackers!
The US Army put on a bug bounty program, highlighting pen testing techniques at Black Hat and R00tz Asylum in Las Vegas this past week at the Defcon hacking conference. They will bring this same program for both kids and adults to CornCon in Davenport, Iowa on September 8, 2018. Join us there!
Black Hat Review Board Members give their picks for must see presentations this week at Black Hat USA 2018. They have broken down the 2018 cybersecurity exploit trends into 6 categories:
Software Development
Breaking Parser Logic, Lagoon JKL, WED 4PM
AI & ML in Cybersecurity: Why Algorithms Are Dangerous, South Seas ABE, THU 11AM
Policy
Legal Liability for IoT Hacking, Lagoon JKL, THU 2:30PM
Network Defenses
ZEROing Trust: Do Zero Trust Models Provide Real Security, South Seas CDF, WED 4PM
Hardware Platform Security
Meltdown: Basics, Details, Consequences, South Pacific F, WED 2:40PM
GOD Mode Unlocked: Hardware Backdoors in x86 CPUs, South Pacific F, THU 11AM
Web Application Security
Practical Web Cache Poisoning: Redefining ‘Unexploitable’, South Seas CDF, THU 3PM
Human Factor
Infosec Philosophies for a Corrupt Economy, Islander EI, WED 5:05PM
Demystifying PTSD in the Cybersecurity Environment, South Seas ABE, THU 9AM
For more details, visit the Black Hat Briefings 2018 agenda here: https://www.blackhat.com/us-18/briefings.html
Understand real threats. Why you should only take a burner laptop to high risk countries. You can’t trust the firmware and chipsets, let alone the OS. Wiping and rebuilding is sometimes not enough.
FBI Warns of HiatusRAT Malware Targeting Webcams and DVRs
Hackers are exploiting security weaknesses in devices like Hikvision cameras and D-Link devices as many vendors haven’t addressed critical vulnerabilities like CVE-2017-7921 (Hikvision cameras), CVE-2020-25078 (D-Link…
Cyber Storm IX, the ninth iteration of the drills, was the first that the agency had invited the ministry to participate in. The exercises involved 2,200 participants from 11 countries simulating major cyberattacks, testing…
Phishers Spoof Google Calendar Invites in Fast-Spreading, Global Campaign
The campaign, discovered by researchers at Check Point Software, relies on modified "sender" headings to make emails appear as if they were sent via Google Calendar on behalf of a legitimate entity, such…