{"id":38672,"date":"2020-12-10T13:20:00","date_gmt":"2020-12-10T13:20:00","guid":{"rendered":"https:\/\/www.darkreading.com\/threat-intelligence\/black-hat-europe-dark-reading-video-news-desk-coverage\/d\/d-id\/1339650"},"modified":"2020-12-10T13:20:00","modified_gmt":"2020-12-10T13:20:00","slug":"black-hat-europe-dark-reading-video-news-desk-coverage","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/black-hat-europe-dark-reading-video-news-desk-coverage\/","title":{"rendered":"Black Hat Europe: Dark Reading Video News Desk Coverage"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<header><\/header>\n<p><span class=\"strong black\">Coming to you from virtual backgrounds and beautifully curated bookcases around the world, Dark Reading brings you video interviews with the leading researchers speaking at this week&#8217;s Black Hat Europe. <\/span><\/p>\n<p class=\"paragraph\">Never mind the terrors of travel or time zone differences. For those missing the opportunity to gaze upon Black Hat Europe speakers this year, Dark Reading is providing video coverage of the event.&nbsp;<\/p>\n<p class=\"paragraph\">Watch below for video interviews with Black Hat presenters and exhibitors, including the latest vulnerability research.&nbsp;<\/p>\n<p class=\"paragraph\"><strong>Watch Now: <a href=\"https:\/\/vimeo.com\/483129416\/116d93649e\" target=\"_blank\" rel=\"noopener noreferrer\">AMNESIA:33 Brings New Revelations About Embedded TCP\/IP Stacks<\/a><\/strong><\/p>\n<p class=\"paragraph\">URGENT\/11 and RIPPLE20 put embedded TCP\/IP stacks under the microscope. At Black Hat Europe, Forescout researchers unveil a new set of vulnerabilities, AMNESIA:33, into open source stacks, discover patterns that will help security teams unearth more such bugs, and develop mitigations.<\/p>\n<p class=\"paragraph\"><a href=\"https:\/\/www.darkreading.com\/endpoint\/evidence-based-trust-gets-black-hat-europe-spotlight\/d\/d-id\/1339518\" target=\"_blank\" rel=\"noopener noreferrer\">Read more<\/a> about this Forescout research on Dark Reading.&nbsp;<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/player.vimeo.com\/video\/483128489\" frameborder=\"0\" width=\"480\" height=\"270\">[embedded content]<\/iframe><\/p>\n<p class=\"paragraph\">&nbsp;<\/p>\n<p class=\"paragraph\"><strong>Watch Now: <a href=\"https:\/\/vimeo.com\/483131094\/2416328637\" target=\"_blank\" rel=\"noopener noreferrer\">How North Korea Became a Global Cyber Super-Power<\/a><\/strong><\/p>\n<p>In a relatively short period of time, North Korea modernized its offensive cyber capabilities and became a major global nation-state threat. At Black Hat Europe, CrowdStrike researchers will discuss major historical attacks, and the malware involved, to explain North Korea&#8217;s strategic objectives and examine its technical skills.&nbsp;<\/p>\n<p><a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/inside-north-koreas-rapid-evolution-to-cyber-superpower\/d\/d-id\/1339574\" target=\"_blank\" rel=\"noopener noreferrer\">Read more<\/a> about this CrowdStrike research on Dark Reading.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/player.vimeo.com\/video\/483131094\" frameborder=\"0\" width=\"480\" height=\"270\">[embedded content]<\/iframe><\/p>\n<p><strong>Watch Now:&nbsp;<a href=\"https:\/\/vimeo.com\/483129416\/116d93649e\" target=\"_blank\" rel=\"noopener noreferrer\">Building Better Trust in Hardware<\/a><\/strong><\/p>\n<p>Andrew &#8220;bunnie&#8221; Huang provides a preview of his Black Hat Europe keynote session and his vision for evidence-based trust in hardware through the lens of the Precursor platform.<\/p>\n<p><a href=\"https:\/\/www.darkreading.com\/endpoint\/evidence-based-trust-gets-black-hat-europe-spotlight\/d\/d-id\/1339518\" target=\"_blank\" rel=\"noopener noreferrer\">Read more<\/a> about Huang&#8217;s work on Dark Reading.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/player.vimeo.com\/video\/483129416\" frameborder=\"0\" width=\"480\" height=\"270\">[embedded content]<\/iframe><\/p>\n<p><strong>Watch Now:<\/strong>&nbsp;<a href=\"https:\/\/vimeo.com\/483209056\/bf8d468cc7\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Researchers&nbsp;Easily Bypass&nbsp;Next-Generation Antivirus<\/strong>&nbsp;<\/a>&nbsp;<\/p>\n<p class=\"paragraph\">Deep Instinct researchers&nbsp;will demonstrate at Black Hat Europe&nbsp;ways for&nbsp;malware&nbsp;to&nbsp;sneak past machine-learning-based anti-malware products.&nbsp;<\/p>\n<p class=\"paragraph\"><a href=\"https:\/\/www.darkreading.com\/endpoint\/researchers-bypass-next-generation-endpoint-protection\/d\/d-id\/1339593\" target=\"_blank\" rel=\"noopener noreferrer\">Read more<\/a> about this work on Dark Reading.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/player.vimeo.com\/video\/483209056\" frameborder=\"0\" width=\"480\" height=\"270\">[embedded content]<\/iframe><\/p>\n<p class=\"paragraph\"><strong><em>&nbsp;<\/em><\/strong><\/p>\n<p><strong>Watch Now:<\/strong>&nbsp;<a href=\"https:\/\/vimeo.com\/483131873\/ba3c699171\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>The Hard Work of Hardware Hacking (Made Easy!)<\/strong>&nbsp;<\/a><br \/>Want to share your hacking devices with the masses but don&#8217;t know how to conquer the boring obstacles of quality assurance and mass production? Luca Bongiorni shares his hot tips on overcoming these blocks learned from his experience releasing WHID Injector and WHID Elite.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/player.vimeo.com\/video\/483131873\" frameborder=\"0\" width=\"480\" height=\"270\">[embedded content]<\/iframe><\/p>\n<p><strong>&nbsp;<\/strong><\/p>\n<p><strong>Watch Now:&nbsp;<a href=\"https:\/\/vimeo.com\/483297151\/a5ef379585\" target=\"_blank\" rel=\"noopener noreferrer\">(SPONSORED) Google Shares Cloud Security Tips<\/a><br \/><\/strong>Anton Chuvakin, head of solution strategy at Google Cloud Security, discusses common cloud security hurdles and how to get over them.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/player.vimeo.com\/video\/483297151\" frameborder=\"0\" width=\"480\" height=\"270\">[embedded content]<\/iframe><\/p>\n<p><strong>Watch Now:&nbsp;<a href=\"https:\/\/vimeo.com\/483217443\/2347142f4d\" target=\"_blank\" rel=\"noopener noreferrer\">Using Lasers to Hijack Alexa, Google, Portal, and Siri<\/a><br \/><\/strong>Researchers from the University of Florida and the University of Michigan found they can inject commands into digital voice assistants via lasers, exploiting a built-in microphone vulnerability.&nbsp;At Black Hat Europe, they will discuss the latest iteration of their research.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/player.vimeo.com\/video\/483217443\" frameborder=\"0\" width=\"480\" height=\"270\">[embedded content]<\/iframe><\/p>\n<p><a href=\"https:\/\/vimeo.com\/483234702\/ed4aa94f71\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>&nbsp;<\/strong><\/a><\/p>\n<p><strong>Watch Now: <a href=\"https:\/\/player.vimeo.com\/video\/483234702\" target=\"new\" rel=\"noopener noreferrer\">Do You Know What&#8217;s Happening On Your Google Cloud Platform?<\/a><\/strong><br \/>Most organizations don&#8217;t know what users can do in their Google Cloud Platform (GCP) environments &#8212; whether they can assume other identities or what permissions they could achieve. At Black Hat Europe, Colin Estep, senior security researcher at Netskope, will discuss how to assess identity and access management (IAM) exposure in GCP and share his own approach to solving the problem.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/player.vimeo.com\/video\/483234702\" frameborder=\"0\" width=\"480\" height=\"270\">[embedded content]<\/iframe><\/p>\n<p><strong>Watch Now: Ransomware Gets Smarter &#8212; And More Effective&nbsp;<\/strong><\/p>\n<p>Cybercriminals are hitting Europe with more complete and effective ransomware campaigns &#8212; and with devastating impacts on target organizations. At Black Hat Europe, Mandiant incident response experts share the tradecraft they&#8217;ve seen this year and the growth of ransomware-as-a-service operations.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/player.vimeo.com\/video\/483358736\" frameborder=\"0\" width=\"480\" height=\"270\">[embedded content]<\/iframe><\/p>\n<p><span class=\"italic\">Dark Reading&#8217;s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. <a href=\"https:\/\/www.darkreading.com\/author-bio.asp?author_id=2179\">View Full Bio<\/a><\/span><\/p>\n<p><strong>Recommended Reading:<\/strong><\/p>\n<p><span class=\"smaller strong red allcaps\">More Insights<\/span><\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/black-hat-europe-dark-reading-video-news-desk-coverage\/d\/d-id\/1339650?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Coming to you from virtual backgrounds and beautifully curated bookcases around the world, Dark Reading brings you video interviews with the leading researchers speaking at this week&#8217;s Black Hat Europe. Read More <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/black-hat-europe-dark-reading-video-news-desk-coverage\/d\/d-id\/1339650?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-38672","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Black Hat Europe: Dark Reading Video News Desk Coverage 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/black-hat-europe-dark-reading-video-news-desk-coverage\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Black Hat Europe: Dark Reading Video News Desk Coverage 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/black-hat-europe-dark-reading-video-news-desk-coverage\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-10T13:20:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/black-hat-europe-dark-reading-video-news-desk-coverage\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/black-hat-europe-dark-reading-video-news-desk-coverage\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Black Hat Europe: Dark Reading Video News Desk Coverage\",\"datePublished\":\"2020-12-10T13:20:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/black-hat-europe-dark-reading-video-news-desk-coverage\\\/\"},\"wordCount\":646,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/black-hat-europe-dark-reading-video-news-desk-coverage\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/twimgs.com\\\/nojitter\\\/darkreading\\\/dr-logo.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/black-hat-europe-dark-reading-video-news-desk-coverage\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/black-hat-europe-dark-reading-video-news-desk-coverage\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/black-hat-europe-dark-reading-video-news-desk-coverage\\\/\",\"name\":\"Black Hat Europe: Dark Reading Video News Desk Coverage 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/black-hat-europe-dark-reading-video-news-desk-coverage\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/black-hat-europe-dark-reading-video-news-desk-coverage\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/twimgs.com\\\/nojitter\\\/darkreading\\\/dr-logo.jpg\",\"datePublished\":\"2020-12-10T13:20:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/black-hat-europe-dark-reading-video-news-desk-coverage\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/black-hat-europe-dark-reading-video-news-desk-coverage\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/black-hat-europe-dark-reading-video-news-desk-coverage\\\/#primaryimage\",\"url\":\"https:\\\/\\\/twimgs.com\\\/nojitter\\\/darkreading\\\/dr-logo.jpg\",\"contentUrl\":\"https:\\\/\\\/twimgs.com\\\/nojitter\\\/darkreading\\\/dr-logo.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/black-hat-europe-dark-reading-video-news-desk-coverage\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Black Hat Europe: Dark Reading Video News Desk Coverage\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Black Hat Europe: Dark Reading Video News Desk Coverage 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/black-hat-europe-dark-reading-video-news-desk-coverage\/","og_locale":"en_US","og_type":"article","og_title":"Black Hat Europe: Dark Reading Video News Desk Coverage 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/black-hat-europe-dark-reading-video-news-desk-coverage\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-12-10T13:20:00+00:00","og_image":[{"url":"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/black-hat-europe-dark-reading-video-news-desk-coverage\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/black-hat-europe-dark-reading-video-news-desk-coverage\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Black Hat Europe: Dark Reading Video News Desk Coverage","datePublished":"2020-12-10T13:20:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/black-hat-europe-dark-reading-video-news-desk-coverage\/"},"wordCount":646,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/black-hat-europe-dark-reading-video-news-desk-coverage\/#primaryimage"},"thumbnailUrl":"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/black-hat-europe-dark-reading-video-news-desk-coverage\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/black-hat-europe-dark-reading-video-news-desk-coverage\/","url":"https:\/\/www.threatshub.org\/blog\/black-hat-europe-dark-reading-video-news-desk-coverage\/","name":"Black Hat Europe: Dark Reading Video News Desk Coverage 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/black-hat-europe-dark-reading-video-news-desk-coverage\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/black-hat-europe-dark-reading-video-news-desk-coverage\/#primaryimage"},"thumbnailUrl":"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg","datePublished":"2020-12-10T13:20:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/black-hat-europe-dark-reading-video-news-desk-coverage\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/black-hat-europe-dark-reading-video-news-desk-coverage\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/black-hat-europe-dark-reading-video-news-desk-coverage\/#primaryimage","url":"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg","contentUrl":"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/black-hat-europe-dark-reading-video-news-desk-coverage\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Black Hat Europe: Dark Reading Video News Desk Coverage"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38672","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=38672"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38672\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=38672"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=38672"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=38672"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}