Editor's note
Join us at Black Hat USA 2018 as SearchSecurity editors cover the newest bugs, threats and security research poised to drop in Las Vegas. This year's show, taking place August 4-9 at the Mandalay Bay Convention Center, will cover some of the most important vulnerabilities in recent memory, such as Meltdown and Spectre, along with potential threats for critical infrastructure and industrial control systems and new techniques in social engineering.
1Vulnerabilities and attack methods
Whether it's leveraging machine learning and artificial intelligence for cyberattacks or finding new ways to infiltrate air-gapped networks, hackers are constantly working to expand the threat landscape. Find out what security researchers and experts have to say about these latest threat actors are using now, and what experts at Black Hat 2017 say should be done to stop them.
-
Article
Irregularities discovered in WinVote voting machines
At Black Hat 2018, security researcher Carsten Schuermann unveiled the results of a forensic analysis of eight WinVote voting machines that had been used in Virginia elections. Read Now
-
Article
Meltdown and Spectre disclosure suffered "extraordinary miscommunication"
During a panel discussion at Black Hat 2018 on Meltdown and Spectre, Google explained how miscommunication left the company's incident response out of the early disclosure process. Read Now
-
Article
Web cache poisoning attacks demonstrated on major websites, platforms
PortSwigger's James Kettle doesn't believe web cache poisoning is theoretical and to prove it, he demonstrated several attacks on major websites and platforms at Black Hat 2018. Read Now
-
Article
2018 Pwnie Awards cast light and shade on infosec winners
The Meltdown and Spectre research teams won big at the Pwnie Awards this year at Black Hat, while the late-entry Bitfi Wallet team overwhelmingly won for Lamest Vendor Response. Read Now
-
Article
Amanda Rousseau on becoming a cybersecurity researcher
Cybersecurity researcher Amanda Rousseau discusses the relationship between the infosec community and law enforcement and how to create the next generation of white hat hackers. Read Now
-
Article
Amanda Rousseau talks about computer forensics investigations
Amanda Rousseau, aka Malware Unicorn, discusses her time in computer forensics investigations with the DoD, as well as the joys of reverse engineering malware encryption by hand. Read Now
-
Article
Robot social engineering works because people personify robots
Brittany 'Straithe' Postnikoff studied robot social engineering and found personification of robots can lead to effective attacks, regardless of whether or not AI is involved. Read Now