• Continuous monitoring for your perimeter

    Qualys Continuous Monitoring is a next-generation cloud service that gives you the ability to identify threats and unexpected changes in your Internet perimeter before they turn into breaches. With it, you can track what happens within Internet-facing devices throughout your DMZs and cloud environments – anywhere in the world.

    In this podcast recorded at Black Hat USA 2014, Sumedh Thakar, Chief Product Officer at Qualys, talks about a new approach to vulnerability management and network security, enabling you to immediately identify and proactively address potential problems.

  • The dangers of backdoor passwords

    In an increasingly connected world, backdoor passwords have large implications on the Internet of Things, the medical world and industrial control systems.

    While you might immediately think these passwords are inserted by a malicious user, this is not always the case.

  • A new defense against kernel-mode exploits

    Over the past many years, there’ve been a plethora of security solutions available for Windows-based endpoints, but most of them are helpless against malicious code targeting the kernel - even when we employ layered security and stack them one upon the other.

  • The state of GRX security

    Late last year, documents from Edward Snowden's NSA trove have revealed that Britain's GCHQ has mounted a successful attack against Belgacom (the largest telecom in Belgium) and its subsidiary BICS (Belgacom International Carrier Services), a Global Roaming Exchange (GRX) provider. Other GRXs have been targeted as well.

    But how easy is it to breach the systems of existing GRX providers? Stephen Kho and Rob Kuiters, penetration tester and incident response handler (respectively) in the CISO team of the Netherland’s largest telecoms provider KPN, have decided to check.

  • Replicating NSA's gadgets using open source

    In this podcast, wireless security researcher Michael Ossmann shares his insights on what to use - and how - to duplicate hardware devices found in the ANT catalog.


The synergy of hackers and tools at the Black Hat Arsenal

Posted on 27 August 2014.  |  Tucked away from the glamour of the vendor booths and the large presentation rooms filled with rockstar sessions, was the Arsenal - a place where developers were able to present their security tools and grow their community.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.


Mon, Sep 1st