At Black Hat USA 2022, Traceable AI announced enhanced capabilities to address more specific types of API attacks, including API abuse and misuse, fraud and malicious API bots, all of which contribute to serious data security and compliance challenges within organizations today. These additional capabilities enable organizations to detect, stop and eliminate these types of…

Man-in-the-Disk: A new and dangerous way to hack Android

Android is a good operating system whose developers truly care about security, but with so many OS versions and applications, keeping an eye on all of them is a tall order. Therefore, new ways to circumvent the built-in security mechanisms surface fairly often. The latest way to hack Android is called “Man-in-the-Disk,” and that is…

7 Hardware & Firmware Hacks Highlighted at Black Hat 2017

When enterprises build their security models based on implied trust at the hardware and firmware level, they’re building them on a foundation of sand. Security researchers are going to repeatedly hammer that lesson home at Black Hat this week as they demonstrate a range of vulnerabilities, attack techniques and tools designed to get as close…

The Pick of 2017 Cybersecurity Conferences

Cybersecurity conferences provide excellent opportunities to network with peers, learn about the latest trends in security, engage with vendors and see firsthand the latest developments in technology. Here is a roundup of some of the most interesting 2017 cybersecurity conferences.