• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Industry News   »   Trend Micro Experts at Black Hat 2016 to Discuss Ransomware and Critical Vulnerabilities

Trend Micro Experts at Black Hat 2016 to Discuss Ransomware and Critical Vulnerabilities

  • Posted on:August 1, 2016
  • Posted in:Industry News, Security
  • Posted by:
    Cara West-Wainwright
0
Welcome, hackers! Here's a recap of Pwn2Own 2016.

We are excited to announce our participation at this year’s Black Hat USA 2016, taking place July 30 – August 4. Raimund Genes, chief technology officer, and Ed Cabrera, chief cybersecurity officer, will be on-hand to discuss various booth presentations throughout the event demonstrating ransomware attacks, along with threat researchers detailing their experience with WPAD and kernel exploits.

The following are additional details regarding speaker sessions:

  • $hell on Earth: From Browser to System Compromise

Wednesday, August 3, 11:30 a.m.-12:20 p.m. – Mandalay Bay EF

Matt Molinyawe and Jasiel Spelman, vulnerability analysts and exploit developers, ZDI

Abdul-Aziz Hariri, security researcher, ZDI

Joshua Smith, senior vulnerability researcher, ZDIThis presentation will detail insights into state of the art software exploitation discovered during Pwn2Own 2016. Topics covered include modern browser exploitation, the complexity of kernel Use-After-Free exploitation, and the simplicity of exploiting logic errors and directory traversals in the kernel.

  • BadWPAD

Thursday, August 4, 12:10pm-12:35pm – Mandalay Bay BCD

Maxim Goncharov, senior threat researcher, Trend Micro

This presentation will discuss well-known risks in WPAD protocol that have been largely overlooked by the security community to date. Several experiments have been conducted to explore these risks and potential exploit vectors.

For more information and coverage from the conference, follow @TrendMicro. Stop by booth No. 124 to meet additional Trend Micro experts.

Related posts:

  1. Join us at Black Hat 2017
  2. Three Ways Trend Micro is Here To Help You With Ransomware
  3. Did you see what the Black Hat newsletter said about Trend Micro?
  4. Fighting Ransomware with Trend Micro Security 10 and the Trend Micro Anti-Ransomware Tool

Security Intelligence Blog

  • Obfuscation Tools Found in the Capesand Exploit Kit Possibly Used in “KurdishCoder” Campaign
  • Mobile Cyberespionage Campaign Distributed Through CallerSpy Mounts Initial Phase of a Targeted Attack
  • Operation ENDTRADE: Finding Multi-Stage Backdoors that TICK

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Answering IoT Security Questions for CISOs
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • How To Be An Informed Skeptic About Security Predictions
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Trend Micro Selected as Launch Partner for AWS Ingress Routing Service and Stalkerware on the Rise
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • The Shared Responsibility Model
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • What Worries CISOs Most In 2019

Follow Us

Trend Micro In The News

  • Trend Micro Takes On Palo Alto Networks With Cloud Conformity Buy
  • Trend Micro Partners with Snyk to Fix Vulnerabilities for DevOps
  • Trend Micro Partners With Snyk To Advance DevSecOps
  • Hackers to stress-test Facebook Portal at hacking contest
  • NEW TECH: Trend Micro inserts 'X' factor into 'EDR' - endpoint detection response
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.