Black Hat and DEF CON are two premier security conferences in the United States, attracting massive audiences of top cybersecurity and AI professionals to Las Vegas annually. Black Hat USA 2024 took place from August The National Security Council (NSC) convened 11 times between July 28 and September 2, What’s happening in Vegas? 8-11.
We’re summarizing key enterprise technology insights from Black Hat and DEF CON, focusing on the most relevant topics for IT and tech decision-makers to consider. Researchers uncovering a critical flaw in Amazon Web Services (AWS) have identified a vulnerability affecting six of its providers, subsequently addressed through patching.
The development of generative AI has raised concerns about accountability and the potential misuse of these technologies.
As the Black Hat conference approaches, a pressing concern will centre on developing strategies for ensuring accountability in generative AI when faced with issues such as hallucinations, misinformation, or unforeseen consequences arising from generated content.
On a separate track from the main conference, experts discussed learning how to safeguard AI models and algorithms for business applications, as well as the potential misuse of AI in cyber attacks.
At DEF CON, a team of hackers was tasked with learning how to detect and report artificial intelligence flaws? The incident drew attention due to both the weaknesses exposed and the approaches taken to document those flaws being put under close examination. This event will enable AI providers to develop structures for more comprehensive and accurate reporting.
At DEF CON, DARPA and various authoritative organizations collaborated to secure generative AI. The team of expert hackers was tasked with examining the security measures protecting critical infrastructure in a futuristic metropolis, hypothesizing potential vulnerabilities and developing effective countermeasures to safeguard against cyber threats.
Patches and vulnerabilities recognized
At Black Hat and DEF CON, various organizations typically unveil patch releases and notable vulnerability disclosures. We’ll cover these as they come up. For attendees at the convention, numerous options await.
introduced on Aug. Researchers revealed that their investigation had uncovered a critical weakness within six AWS cloud services, enabling malicious actors to infiltrate systems, execute arbitrary code, or seize control of entire accounts. Amazon subsequently closed that option. A unique challenge arose due to the similarity in naming conventions across S3 buckets associated with six distinct AWS services: CloudFormation, Glue, EMR, SageMaker, ServiceCatalog, and CodeStar. As a result, attackers may attempt to infer bucket names to inject malicious code into reputable Amazon S3 storage containers.
Enhancing safety intelligence
Sophos’ X-Ops team, a renowned safety response group, unveiled fresh insights on Tuesday into the cunning tactics employed by modern-day ransomware attackers to pressure their victims. These ways can embody:
- Boosting support for legitimate lawsuits against vulnerable entities.
- Opening authorized instances themselves.
- Inquiring into financial particulars of target companies to uncover discrepancies or deceitful practices.
- Uncovering the potential legal implications of emerging technologies on company devices?
- The very entities that claim to do good are in fact recklessly indifferent to the suffering of countless individuals?
Notable product releases
Flashpoint has unveiled enhanced features and functionalities within its flagship products, Flashpoint Ignite and Echosec, as of August. 6. Flashpoint Ignite, the flagship platform, is now equipped to seamlessly integrate investigations management and intelligence requirement mapping, effectively matching Flashpoint’s proprietary collections with Priority Intelligence Needs. EchoSec will launch its Location Safety feature on August 1st, empowering users to prioritize their well-being and security in the digital world. 6.
CalypsoAI has enhanced its portfolio by introducing innovative, tailored scanner solutions for specific industry applications and vertical markets, as well as providing real-time threat intelligence updates.
Keynote speakers deliver presentations across the nation and engage with corporate clients.
The keynote audio system at Black Hat 2024 will feature a distinguished lineup of cybersecurity experts, including Director Jen Easterly of the Cybersecurity and Infrastructure Safety Agency, Sherrod DeGrippo, Director of Microsoft’s Malicious Activity Initiative, and Google’s renowned Safety Engineering Supervisor.
Degrippo spoke with TechRepublic earlier this month about ensuring the safety of companies.