Report Identifies 6 DevSecOps Pillars

At the Black Hat USA conference, the DevSecOps Working Group of the Cloud Security Alliance (CSA) announced it has published a report identifying the six pillars on which any set of best DevSecOps processes should be based. John Yeoh, global vice pres… Continue reading Report Identifies 6 DevSecOps Pillars

Black Hat 2019: Security’s Powerful Cultural Transformation

Dino Dai Zovi, mobile security lead at Square, discusses ongoing transformation in security’s role in the workplace during the keynote. Continue reading Black Hat 2019: Security’s Powerful Cultural Transformation

Black Hat: LeapFrog Tablet Flaws Let Attackers Track, Message Kids

Several serious privacy flaws in a kid’s tablet were disclosed this year at Black Hat, which could allow a bad actor to track or send messages to children. Continue reading Black Hat: LeapFrog Tablet Flaws Let Attackers Track, Message Kids

How offense and defense came together to plug a hole in a popular Microsoft program

It’s no secret that Microsoft’s Remote Desktop Services (RDS) software is a natural target for hackers. The same remote access that the popular program gives to clients also piques the interest of would-be attackers. That also makes fixing a bug in the software a good opportunity for both ends of the cybersecurity profession — offensive and defensive — to collaborate. One RDS discovery in particular prompted close, behind-the-scenes cooperation between Microsoft and an outside researcher. They will share what they learned about detection and remediation next week at the Black Hat conference in Las Vegas. “This attack was very hard to detect,” recalled Dana Baril, a security software engineer at Microsoft. “The behavior didn’t stand out as unusual for the user.” A hacker exploiting the bug would be making network connections that looked a lot like whatever a normal person might do with RDS. Baril had received a report through Microsoft’s bug bounty program. She reached out to Eyal […]

The post How offense and defense came together to plug a hole in a popular Microsoft program appeared first on CyberScoop.

Continue reading How offense and defense came together to plug a hole in a popular Microsoft program

With Will Hurd’s retirement, Congress loses a key cybersecurity advocate

When Rep. Will Hurd made news Thursday night, just as the cybersecurity community was preparing to descend on Las Vegas for a week of events, it wasn’t about Hurd’s rescinded offer to speak at the Black Hat conference. The Texas Republican announced he will not seek re-election in 2020, becoming the sixth GOP representative and the third Texan in the past 10 days to announce retirement. Hurd, a former CIA officer, had distinguished himself among lawmakers for his attention to cybersecurity issues, including a support for encryption. He was slated to deliver a keynote address at the Black Hat cybersecurity conference next week until organizers canceled his invitation following a TechCrunch article that questioned the congressman’s voting records on women’s rights issues. In a statement on his website, Hurd said that he “made the decision to not seek reelection for the 23rd Congressional District of Texas in order to pursue opportunities outside the halls […]

The post With Will Hurd’s retirement, Congress loses a key cybersecurity advocate appeared first on CyberScoop.

Continue reading With Will Hurd’s retirement, Congress loses a key cybersecurity advocate