Join The Register as we tackle the most important stories around Black Hat and DEF CON 2023. From in-depth interviews to detailed analysis, El Reg has you covered.
State |
Forum | Posts |
Latest Post |
|
DEF CON badge disagreement gets physical as firmware dev removed from event stage
| 38 |
|
|
DEF CON Franklin project enlists hackers to harden critical infrastructure
| 2 |
|
|
What a glimpse inside the Black Hat NOC reveals about infosec pros' security habits
| 3 |
|
|
How to ingeniously and wirelessly inject malware onto someone's nearby Windows PC via Google's Quick Share
| 16 |
|
|
Secure Web Gateways are anything but as infosec hounds spot dozens of bypasses
| 20 |
|
|
Software innovation just isn't what it used to be, and Moxie Marlinspike blames Agile
| 66 |
|
|
Ransomware groups are better at web app security than you, says researcher
| 10 |
|
|
Lawyers say US cybersecurity law too ambiguous to protect AI security researchers
| 1 |
|
|
If you give Copilot the reins, don't be surprised when it spills your secrets
| 18 |
|
|
Your victim's Windows PC fully patched? Just force undo its updates and exploit away
| 8 |
|
|
Cloud storage lockers from Microsoft and Google used to store and spread state-sponsored malware
| 2 |
|
|
Devices with insecure SSH services are everywhere, say infosec duo
| 10 |
|
|
AWS 'Bucket Monopoly' attacks could allow complete account takeover
| 2 |
|
|
Faulty instructions in Alibaba's T-Head C910 RISC-V CPUs blow away all security
| 48 |
|
|
Lights, camera, AI! Real-time deepfakes coming to DEF CON
| 15 |
|
|
Bomb scare causes mass evacuation at DEF CON
| 6 |
|
|
Let's play... Force off the power to someone else's datacenter systems
| 14 |
|
|
Inside the Black Hat network operations center, volunteers work in geek heaven
| 10 |
|
|
Veilid: A secure peer-to-peer network for apps that flips off the surveillance economy
| 35 |
|
|
Want to pwn a satellite? Turns out it's surprisingly easy
| 64 |
|
|
Infosec imposter syndrome is real. Here's something that can help
| 9 |
|
|
CISA boss says US alliance with Ukraine over past year is closer than Five Eyes
| 14 |
|
|
Microsoft OneDrive a willing and eager 'ransomware double agent'
| 13 |
|
|
Microsoft 365 guest accounts + Power Apps = security nightmare
| 5 |
|
|
Shifting to two-factor auth is hard to do. GitHub recommends the long game
| 24 |
|
|
Google AI red team lead says this is how criminals will likely use ML for evil
| 3 |
|
|
Ukraine's Victor Zhora: Russia's cyber 'war crimes' will continue after ground invasion ends
| 21 |
|
|
CLI-beautifying ANSI escape sequences can also make your log files a security threat
| 32 |
|
|
DARPA tells AI world: Make a model that secures software, there's $25M in it for you
| 8 |
|
|
Say hello to Downfall, another data-leaking security hole in several years of Intel chips
| 10 |
|
|
Can 'Mad Libs for incident response' prevent the next MOVEit fiasco?
| 5 |
|
|
It's that time of the year again: The trinity of infosec conferences
| 9 |
|
|
Tesla hackers turn to voltage glitching to unlock paywalled features
| 55 |
|
|
Barts NHS hack leaves folks on tenterhooks over extortion
| 23 |
|
|
LockBit louts unload ransomware at Japan’s most prolific cargo port
| 1 |
|
|
RAM-ramming Rowhammer is back – to uniquely fingerprint devices
| 30 |
|
|
Singapore tells crypto operators: act like grown up financial institutions
| 10 |
|
|
You've patched right? '340K+ Fortinet firewalls' wide open to critical security bug
| 13 |
|
|
Us, hacked by LockBit? No, says TSMC, that would be our IT supplier
| 3 |
|