New research presented at the Black Hat security conference showed that cybercriminals are getting faster at exploiting zero-day vulnerabilities.
Reducing the Application Attack Surface: Breaking Payloads With Runtime Code Stripping and Image Freezing
Collaborative research has recently devised a means to reduce a Windows application's attack surface by removing unused functions from libraries that are loaded dynamically.
The high jinks and hacking demonstrations that go on during the Black Hat USA conference are the stuff of legend. Catch up on the most prolific examples.
This year's iteration of the annual Black Hat USA conference is poised to be one of the best yet, with a slate of presentations and tools worth seeing.
What's hot at Black Hat USA? According to the briefings list, attendees should expect to hear plenty about advanced threats and new research.
If you're heading to a security conference in Las Vegas, you should know how to make the most of your time and how to master the infamous "Hallway Track."
Security conferences such as Black Hat, DEF CON and BSides are gaining popularity and credibility, but attendees should cover their own security bases.
The DEF CON, Black Hat and BSides conferences all descend on Las Vegas this August. But which of these gatherings is the best bet for you?
To win the war against black hat developers, white hats must collaborate with each other and their customers to share threat intelligence.
Black and white hat hackers may be the most well-known types, but a third kind of hacking focuses on solving math problems to help develop the cyberdomain.