Topics of discussion at this year's Black Hat conference included the Internet of Things (IoT) in smart cities, the latest advancements in vulnerability management and more.
A new family of crypto-mining malware dubbed ZombieBoy has been raking in roughly $1,000 a month worth of Monero by exploiting multiple vulnerabilities to create backdoors and evade defenses.
Whether you're most interested in smart city security, vulnerability management or an epic game of CTF, we'll help you get the most out of your time in Las Vegas this week.
According to a new report, threat actors are targeting enterprise resource planning (ERP) applications like SAP — and, in some cases, are exploiting a vulnerability that was disclosed in 2016.
In the external reconnaissance and launch attack phases of the X-Force IRIS cyberattack preparation framework, threat actors look for vulnerabilities and tailor their attacks to exploit them.
According to new research, exploit kit creators have been targeting some of the oldest and most common software flaws — even as the cyberthreat landscape shifts to more sophisticated attack vectors.
Offensive security activities like cyberattack simulations, penetration testing and vulnerability assessments can help companies identify and remediate flaws before cybercriminals can exploit them.
When it comes to vendor security, all the handshakes and paperwork that go into a business deal tend to get in the way of proper audits and thorough vulnerability assessments.
What's the first step toward prioritizing security vulnerabilities? Know which open source components developers use in their code and monitor them for alerts using SAST tools.
With a well-planned, mature bug bounty program, security leaders can lessen the impact of the security talent shortage by tapping the white-hat hacker community.