Check Point Software Technologies, a leading provider of cybersecurity solutions globally, will feature speakers from Check Point Research at Black Hat USA 2019 and DEF CON this month.
Black Hat USA, one of the biggest annual information security conferences, takes place at the Mandalay Bay Resort and Casino on Aug. 3-8. It features four days of hands-on workshops followed by a main conference on Aug. 7-8, with over 19,000 security professionals in attendance.
Check Point Vulnerability Researcher Eyal Itkin will co-present at Black Hat with Dana Baril, a security software engineer at Microsoft, on Aug. 7. They will reveal the latest RDP vulnerability that puts host devices at risk of compromise, the result of a design flaw in the Microsoft Terminal Services Client. Eyal and Dana will examine the issue from the perspective of both the attacker and the defender, offering a solution to combat this threat.
Check Point’s Head of Products Vulnerability Research, Oded Vanunu and Security Expert Roman Saikin will also take the stage at Black Hat on Aug. 7. They will reveal recent vulnerabilities in WhatsApp, discovered by reverse engineering its web source code and decrypting its traffic. Oded and Roman will discuss how attackers can exploit these vulnerabilities to intercept and alter messages sent in group and individual conversations with the purpose of spreading misinformation.
DEF CON follows Black Hat USA on Aug. 8-11 at Bally’s Las Vegas Hotel and Casino. As one of the top hacking conventions in the world, DEF CON hosts a variety of competitions and speakers throughout the weekend.
Check Point Security Researcher Omer Gull will present at DEF CON on Aug. 10, revealing vulnerabilities discovered in the SQLite database that could lead to Remote Code Execution. Gull and his research team illustrated these vulnerabilities by creating a rogue SQLite database that exploits the software used to open it.
Eyal Itkin will take the stage again on Aug. 11 at DEF CON. He will reveal new vulnerabilities discovered in DSLR cameras, and how attackers could hack into the Picture Transfer Protocol to hijack cameras remotely.
Follow Check Point via: