Researchers have created a tool that uses Git repositories to demonstrate how Agile and other software development approaches could have security issues.
Researchers discovered unpatched vulnerabilities in radiation monitoring devices (RMDs) that attackers could leverage to breach nuclear power plants.
Today IBM X-Force Red launches a collaboration with the Watson IoT Platform to help ensure that all IoT solutions get our special brand of hacker love.
The Black Hat conference offers a chance to network and glean insights from experts that can change the way you think about security.
Now in its 20th year, Black Hat is the world’s leading information security event, providing attendees with the very latest in research, development and trends. Black Hat USA 2017 kicks off with four days of technical Trainings (July 22-25)...
Security leaders, professionals and operational business leaders all stand to benefit from the myriad security conferences being held in 2017.
Cybercriminals developed HEIST, or "HTTP Encrypted Information can be Stolen Through TCP-Windows," to steal data using a cryptographic scheme.
The official 2016 Black Hat app contained a number of serious social flaws, which organizers disabled before the app went live.
A unique, interactive game at this year's Black Hat USA event will test players' ability to stay calm in a crisis, a key skill to have during a cyberattack
CVE-2016-0117 can be exploited to perform an arbitrary write to Edge's content process memory, a critical element for remote code execution.