15 Must-Attend Sessions Covering Cloud and AI Security

Published:

spot_img

Black Hat USA 2024: Vulnerabilities and Defenses Discussed

Cybersecurity researchers and IT security professionals are gearing up for the annual Black Hat USA security conference, set to kick off this week. The conference will feature briefings and keynotes on vulnerabilities across various IT and technology sectors, including cloud services, hardware, security tools, quantum computing, AI, software, and more.

One of the key focuses at this year’s Black Hat conference will be on vulnerabilities in cloud service providers. While these providers are known for their robust security measures, researchers will shed light on critical vulnerabilities that have been identified and promptly fixed by major players like AWS, Google Cloud Platform, and Azure. These vulnerabilities could have potentially led to account takeovers, data exposure, denial of service, and privilege escalation.

Researchers will also discuss the complexities of cloud security, highlighting instances where even cloud providers like Google have made mistakes leading to critical vulnerabilities. Sessions will delve into access control and authentication vulnerabilities in AWS, privilege escalation in GCP, and a novel discovery in Azure AD resulting in privilege escalation to Global Administrator.

In addition to vulnerabilities, the conference will also feature sessions on promising cybersecurity defenses. Researchers will share their successes in applying reinforcement learning to automate cyber defenses, detecting and stopping zero-day exploits in the Linux kernel, and AI security lessons learned from NVIDIA’s AI Red Team.

With a lineup of engaging sessions covering a wide range of cybersecurity topics, Black Hat USA 2024 promises to be an insightful and informative event for cybersecurity professionals looking to stay ahead of the latest threats and defenses in the industry.

spot_img

Related articles

Recent articles

Serious Versa Concerto Vulnerabilities Allow Attackers to Escape Docker and Compromise Hosts

May 22, 2025Ravie LakshmananVulnerability / Software Security Critical Security Flaws in Versa Concerto Platform Recent investigations by cybersecurity experts have revealed significant security vulnerabilities in the...

Empowering Women: ECOWAS Retreat Celebrates Purpose and Power for International Women’s Day 2025

Celebrating 50 Years of ECOWAS: Committing to Gender Empowerment As the Economic Community of West African States (ECOWAS) marks its 50th anniversary, a significant retreat...

PumaBot: New Botnet Aims at Linux IoT Devices to Hijack SSH Credentials and Mine Cryptocurrency

New PumaBot Botnet Targets Embedded Linux IoT Devices Overview of PumaBot A new botnet named PumaBot is specifically targeting embedded Linux-based Internet of Things (IoT) devices,...

Is Your IRS Refund Check on the Dark Web? Discover What 7 On Your Side Investigates

Surge in Check Theft: How California Residents Are Being Targeted The sun might shine brightly in California, but it casts dark shadows when it comes...