{"id":8421,"date":"2017-07-24T03:00:21","date_gmt":"2017-07-24T11:00:21","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/07\/24\/news-2195\/"},"modified":"2017-07-24T03:00:21","modified_gmt":"2017-07-24T11:00:21","slug":"news-2195","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/07\/24\/news-2195\/","title":{"rendered":"Join us at Black Hat 2017"},"content":{"rendered":"<p><strong>Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Mon, 24 Jul 2017 12:00:34 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"206\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/Hackers-can-make-a-number-of-easily-identifiable-mistakes-_459_40153079_0_14118660_500-300x206.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"Hackers can make a number of easily identifiable mistakes.\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/Hackers-can-make-a-number-of-easily-identifiable-mistakes-_459_40153079_0_14118660_500-300x206.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/Hackers-can-make-a-number-of-easily-identifiable-mistakes-_459_40153079_0_14118660_500-125x85.jpg 125w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/Hackers-can-make-a-number-of-easily-identifiable-mistakes-_459_40153079_0_14118660_500-440x302.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/Hackers-can-make-a-number-of-easily-identifiable-mistakes-_459_40153079_0_14118660_500-380x261.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/Hackers-can-make-a-number-of-easily-identifiable-mistakes-_459_40153079_0_14118660_500.jpg 500w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Hide your phones, hide your laptops \u2018cause they\u2019re hackin\u2019 everyone out here! For the 20<sup>th<\/sup> year, on July 26 and 27, thousands of cybersecurity executives, researchers and enthusiasts will descend upon Las Vegas for <a href=\"https:\/\/www.blackhat.com\/us-17\/\">Black Hat 2017<\/a>, including some of Trend Micro\u2019s finest. Throughout the week, Trend Micro experts and researchers can be found sharing insight during two briefings and one arsenal session, visiting with industry professionals at our booth and meeting with reporters, analysts and potential customers.<\/p>\n<p>With so much going on in only two days it can be difficult to decipher where to begin, but if you\u2019re hoping to spend time with our team we\u2019ve outlined below where you can scout us out during the conference. Additionally, we\u2019ve provided some helpful <a href=\"https:\/\/twitter.com\/TrendMicro\">#ProTips<\/a> to navigating the conference and keep your personal information secure \u2013 let\u2019s not kid ourselves now, this is a security conference after all.<\/p>\n<p><strong>Go Beyond Next-Gen with <\/strong><strong>XGen\u2122<\/strong><em>\u00a0<\/em><\/p>\n<p><em>#ProTip: Don\u2019t forget to eat a substantial breakfast and pack snacks for energy! Two full back-to-back days will require sustenance to keep you going.<\/em><em>\u00a0<\/em><\/p>\n<p>Without a doubt, you can always find someone at the Trend Micro booth, <strong>No. 532<\/strong>. For this year\u2019s event we will continue showcasing our XGen\u2122 approach by taking visitors on a space shuttle ride through the world of security. Members of our team will also be available to meet with current and prospective partners, share our offerings and provide information on how to ensure personal and enterprise security. Additionally, those visiting the booth will receive a free Trend Micro t-shirt.<\/p>\n<p><strong>Class is in [Briefing] Session<\/strong><strong>\u00a0<\/strong><\/p>\n<p><em>#ProTip: Bring a pencil and paper to your briefing sessions. You\u2019re going to be surrounded by professional hackers, so this probably isn\u2019t the best time to be taking notes on a device. You might as well stick a sign to your back reading, \u201cHack me! Hack me!\u201d<\/em><em>\u00a0<\/em><\/p>\n<p>Several of our senior threat researchers, including Federico Maggi, Marco Balduzzi, Vincenzo Ciancaglini, Ryan Flores and Lion Gu, have the opportunity to present <strong>during two briefing sessions and one arsenal session<\/strong> during the conference. The team will be sharing research on the recently published <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/internet-of-things\/rogue-robots-testing-industrial-robot-security\">Industrial Robots<\/a> report, as well as ShieldSF and DefPloreX. For more information on each session, check out the brief descriptions below.<\/p>\n<p><a href=\"https:\/\/www.blackhat.com\/us-17\/briefings\/schedule\/index.html#breaking-the-laws-of-robotics-attacking-industrial-robots-6100\"><strong>Briefing Session<\/strong><\/a><strong><u> \u2013 Breaking the Laws of Robotics: Attacking Industrial Robots<br \/> <\/u><\/strong><strong>Presenter:<\/strong> Federico Maggi and colleagues from Politecnico di Milano<\/p>\n<p><strong>Date\/Time:<\/strong> Thursday, July 27, 11 \u2013 11:50 a.m.<\/p>\n<p><strong>Location:<\/strong> Mandalay Bay AB<strong>\u00a0<\/strong><\/p>\n<p><strong>Description:<\/strong> Industrial robots are complex cyber-physical systems used for manufacturing, and a critical component of any modern factory.<\/p>\n<p><a href=\"https:\/\/www.blackhat.com\/us-17\/briefings\/schedule\/index.html#shieldfs-the-last-word-in-ransomware-resilient-file-systems-6431\"><strong>Briefing Session<\/strong><\/a><strong><u> \u2013 ShieldFS: The Last Word in Ransomware Resilient File Systems<\/u><\/strong><br \/> <strong>Presenter<\/strong>: Federico Maggi and colleagues from Politecnico di Milano<\/p>\n<p><strong>Date\/Time<\/strong>: Wednesday, July 26, 2:40 -3:30 pm<\/p>\n<p><strong>Location<\/strong>: Mandalay Bay AB<\/p>\n<p><strong>Description: <\/strong>In this talk, we will present ShieldFS, a drop-in driver that makes the Windows native filesystem immune to ransomware attacks.<\/p>\n<p><a href=\"https:\/\/www.blackhat.com\/us-17\/arsenal.html#defplorex-a-machine-learning-toolkit-for-large-scale-ecrime-forensics'\"><strong>Arsenal Session\u00a0<\/strong><\/a><strong><u>\u2013 DefPloreX: A Machine-Learning Toolkit for Large-scale eCrime Forensics<br \/> <\/u><\/strong><strong>Presenters:<\/strong> Marco Balduzzi, Federico Maggi, Vincenzo Ciancaglini, Ryan Flores &amp; Lion Gu<\/p>\n<p><strong>Date:<\/strong> Thursday, July 27,\u00a01:00pm-2:20pm<\/p>\n<p><strong>Location:<\/strong> \u00a0Business Hall, Level 2, Station 3<\/p>\n<p><strong>Description: <\/strong>DefPloreX ingests plain CSV inputs about web incidents to analyze, explores their resources with headless browsers, extracts features from deface pages, and uploads the resulting data to an Elastic index.<strong>\u00a0<\/strong><\/p>\n<p><strong>You\u2019re Invited!<\/strong><strong>\u00a0<\/strong><\/p>\n<p><em>#ProTip: Be sure to bring a bottle of water. You\u2019ll be mingling in the Vegas heat all day and night, so you\u2019ll need to remain hydrated!<\/em><em>\u00a0<\/em><\/p>\n<p>As always, Trend Micro will be hosting its VIP guests on Tuesday, <strong>July 25, from 6-9 p.m.<\/strong> in true Las Vegas fashion with treats, cocktails and billiards. Those in attendance will be entered for a chance to win one of three Phantom 3 Drones being awarded every hour during the reception. This event is a chance for us to meet with press, colleagues and partners in a casual, yet luxurious setting. If you\u2019re interested in attending, please register <a href=\"https:\/\/resources.trendmicro.com\/2017-Black-Hat-Reception.html\">here<\/a>.<\/p>\n<p><strong>Follow Along<\/strong><\/p>\n<p><em>#ProTip: Dress for comfort from head to toe! You\u2019re sure to get your 10,000 steps in before noon \u2013 pack a reliable pair of shoes so you can stay focused on the information you\u2019re hearing and not that blister on your heel.<\/em><\/p>\n<p>Whether you\u2019ll be at Black Hat or not, be sure to follow along with everything we\u2019re doing by following us <a href=\"https:\/\/twitter.com\/TrendMicro\">@TrendMicro<\/a> or keeping up with this blog throughout the week. We will share what we\u2019re learning, our favorite sessions and general event info.<\/p>\n<p><a href=\"http:\/\/blog.trendmicro.com\/join-us-black-hat-2017\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Mon, 24 Jul 2017 12:00:34 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"206\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/Hackers-can-make-a-number-of-easily-identifiable-mistakes-_459_40153079_0_14118660_500-300x206.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"Hackers can make a number of easily identifiable mistakes.\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/Hackers-can-make-a-number-of-easily-identifiable-mistakes-_459_40153079_0_14118660_500-300x206.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/Hackers-can-make-a-number-of-easily-identifiable-mistakes-_459_40153079_0_14118660_500-125x85.jpg 125w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/Hackers-can-make-a-number-of-easily-identifiable-mistakes-_459_40153079_0_14118660_500-440x302.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/Hackers-can-make-a-number-of-easily-identifiable-mistakes-_459_40153079_0_14118660_500-380x261.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/Hackers-can-make-a-number-of-easily-identifiable-mistakes-_459_40153079_0_14118660_500.jpg 500w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>Hide your phones, hide your laptops \u2018cause they\u2019re hackin\u2019 everyone out here! For the 20th year, on July 26 and 27, thousands of cybersecurity executives, researchers and enthusiasts will descend upon Las Vegas for Black Hat 2017, including some of Trend Micro\u2019s finest. Throughout the week, Trend Micro experts and researchers can be found sharing&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10419,714],"class_list":["post-8421","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-industry-news","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8421","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=8421"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8421\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=8421"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=8421"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=8421"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}