Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Data Breach
  • Black Hat USA 2022: Key Highlights
  • Critical Vulnerability
  • Data Breach
  • Vulnerabilities

Black Hat USA 2022: Key Highlights

3 years ago Steve Cumings
Black Hat USA 2022: Key Highlights

Arriving at the keynote hall for Black Hat 2022, I was immediately struck by the size of the crowd – after the seemingly endless pandemic hiatus, the cyber industry had come out in force.  The mood was one of enthusiasm, and the entire place reverberated with the vibrancy of reunion. It was a great event for the industry – and for HelpSystems – and a few things stuck out.

25 Years of Black Hat

This being the 25th year for Black Hat, founder Jeff Moss spoke about its beginnings, and as with many successful ventures, it began with a strong personal network. He contacted his friends in the industry to join as speakers, building the conference session by session. And part of the Black Hat success story proves that you have to stay alert for good ideas, even if they come up casually. The original name for the event was going to be something like “Network Security Conference,” but one day his marketing director walked up and said “That’s boring. You should call it Black Hat. That sounds scary,” and walked away. And, voila! – Black Hat was born!

The Business Hall and Keynotes

Keynote speaker Chris Krebs recounted details about his time as the Director of CISA, and what he and others see happening in cyber today. Encouragingly, given the cyber workforce shortage, he sees new workers making the workforce younger and more tech-savvy, which is leading to enhanced productivity. But, on a darker note, he said his contacts in national security believe that escalating tensions between China and Taiwan mean it isn’t a question of if a full clash will occur, but when. This clearly has implications for cybersecurity, as cyberwarfare is likely to be a key part of the conflict.

The business hall was crowded with companies from industry leaders to new entrants, and it was hopping! Digital Guardian, Terranova, and Tripwire all attended, and the air was alive with discussions from data protection, to infrastructure protection, to who has the next “best thing”. A significant part of the focus was on integration and offering more complete solutions, although there were plenty of new and niche products in other parts of the hall. And it’s always interesting to see vendors’ tactics for attracting people to enter to their booth. One company had a boxing ring, and there were multiple “robots” in attendance.  However, a clear favorite “gimmick” was the booth set up as a local candy store.

In Thursday’s keynote, Kim Zetter spoke about vulnerabilities pre and post-Stuxnet, commenting that the industry changed after that event: Offensive tools became available and more widely used, threats have become larger, and attacks more frequent. Vulnerabilities and questionable practices within critical infrastructure still remain, and it’s not hard to expect more events like the one that shut down Colonial Pipeline.

The second day in the business hall was even busier, with a great crowd and interesting discussions. Tripwire customers came through the booth to hear what’s new, and prospective customers described plans to increase their cyber ecosystem and add capability.  Overall, everyone seemed delighted to be back in the bustle of a major event.  If the messages of both keynotes are true, the tech-savvy workforce using the newest defensive tools will be exactly what the cybersecurity profession needs to stay ahead of emerging threats.  As the conference was winding down, it was clear that all the attendees were looking forward to Black Hat 2023.  We hope to see you there.

The post ” Black Hat USA 2022: Key Highlights” appeared first on TripWire

Source:TripWire – Steve Cumings

Tags: Critical Severity, TripWire

Continue Reading

Previous Researchers Find Counterfeit Phones with Backdoor to Hack WhatsApp Accounts
Next CISA Warns of Active Exploitation of Palo Alto Networks’ PAN-OS Vulnerability

More Stories

  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware

30 mins ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm

1 hour ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists

2 days ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms

2 days ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

2 days ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

3 days ago [email protected] (The Hacker News)

Recent Posts

  • eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware
  • Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm
  • Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists
  • Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms
  • CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT