Black HatVerified account

@BlackHatEvents

The World's Premier Technical Security Conference Series

San Francisco, USA
Joined May 2008

Tweets

You blocked @BlackHatEvents

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @BlackHatEvents

  1. Retweeted
    Sep 12
    Undo
  2. Sep 13

    Learn the background information on certificates in Active Directory, detail the abuse of AD CS through certificate theft and active malicious enrollments for user and machine persistence, and more in September 30 Webinar. Register for free here:

    Undo
  3. Sep 13

    is Community Pentest Management Platform that supports workflows for pentesting & collaboration between engineering & security teams. See a demo of how it works from at Arsenal

    Undo
  4. Sep 13

    In Briefing, “How Your E-book Might Be Reading You: Exploiting EPUB Reading Systems,” presenters demonstrate how distributing malicious e-books through official e-book vendors is very much feasible through self-publishing. Learn more:

    Undo
  5. Sep 12

    In this real-world scenario-based Training, attendees learn the Tactics, Techniques, and Procedures (TTPs) to attack and assess Kubernetes clusters environments at different layers like Supply chain, Infrastructure and more from at

    Undo
  6. Sep 12

    Registration for Black Hat Europe 2021 is open now! Join us November 8-11 for a hybrid event offering both a live virtual (online) and an in-person event in London. Register now for the regular rate here:

    Undo
  7. Sep 11

    Hacking and Securing Cloud Infrastructure (Virtual) | This Black Hat Training presented by course covers both the theory a well as a number of modern techniques that may be used to compromise various Cloud services & infrastructure.

    Undo
  8. Sep 11

    An Open Stack for Threat Hunting in Hybrid Cloud With Connected Observability | At presenters will demonstrate through threat hunting scenarios how the 2 open-source projects can help create a powerful open platform for gaining operational awareness.

    Undo
  9. Sep 11

    Windows Defender - Demystifying and Bypassing ASR by Understanding the AV's Signatures | Windows Defender is the Windows' built-in antivirus software but still, its signature format is undocumented. This talk by tries to rectify this situation.

    Undo
  10. Sep 11

    Resting on Feet of Clay: Securely Bootstrapping OPC UA Deployments | In this talk, will discuss the practical challenges to configure OPC UA securely. Learn more>>

    Undo
  11. Sep 11

    Kubernetes MasterClass | This MasterClass presented by & & will prepare practitioners and operators alike, on the depths of Kubernetes Security. Learn more>>

    Undo
  12. Sep 10

    Applications to join the Executive Summit are open now! This approval-only Summit offers cybersecurity executives an opportunity to hear from a variety of industry experts who are helping to shape this next generation of information security strategy

    Undo
  13. Sep 10

    Adventure of Dynamic Link Library (aDLL) is a console tool for the analysis of binaries and focused on the automatic detection of possible DLL Hijacking cases in Windows systems. See a demo from at Arsenal

    Undo
  14. Sep 10

    This Training covers the theory and several modern techniques that may be used to compromise various Cloud services and infrastructure, from . Last chance to save on early registration through Monday 9/13

    Undo
  15. Retweeted
    Sep 9

    Some really good talks were announced for EU yesterday Pocket fumbling with a Russian (), someone did something rude to an HSM, some really good research by and CSP, wont someone think of the appsec??

    Undo
  16. Sep 9

    Briefing "One Glitch to Rule Them All: Fault Injection Attacks Against the AMD Secure Processor" presents a new hardware attack against the AMD SP, allowing us to gain code execution on the AMD SPs of Ryzen & Epyc CPUs of all Zen microarchitectures:

    Undo
  17. Sep 9

    Trainings "Reverse Engineering Firmware with Ghidra" is a hands-on course that teaches the concepts, tools, & techniques required to reverse engineer firmware and assess embedded devices. Dive into Ghidra, learn more:

    Undo
  18. Sep 7

    Stay frosty within AWS, Azure, & GCP environments with this fast-paced & hands-on course which teaches each participant the Tactics, Techniques, & Procedures needed to infiltrate and expand access within cloud platforms. Register for Trainings here:

    Undo
  19. Sep 7

    Trainings: System Forensics & Incident Handling is a deep dive course that will help you to walk in hackers' shoes and evaluate your infrastructure from their point of view. Learn constantly evolving and crucial topics in the area of cybersecurity -

    Undo
  20. Sep 6

    Event Tracing for Windows (ETW) is a built-in feature, originally designed to perform software diagnostics, and nowadays ETW is essential for Endpoint Detection & Response (EDR) solutions. See a demo from at Arsenal

    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·