Black Hat 2015

Most Businesses Are Potential Targets for Nation-State Cyberattacks

IT security professionals believe their companies are on the hit list

9 years ago

New Techniques Could Prevent Use-After-Free Exploits: Black Hat

The single most pervasive zero-day is use-after-free (UAF), but new research from HP detailed at Black Hat could change that…

9 years ago

Open Network Switches Pose Security Risk, Researcher Says

At the Black Hat show, a security expert demonstrates how vulnerable SDN switches that use the ONIE software are open…

9 years ago