Remote Access Trojans (RATs) have traditionally been known as tools that perform tasks such as installing additional malware or stealing files from an infected computer. They are often bundled with enticing software like free games or system utilities. RATs are nothing new, but their usage and related attack methods have changed recently in interesting ways.
As has often been the case with old technology that stays in use in the modern era, several concrete hacks have been demonstrated against satellite communication technology.
Kyle Lady of Duo Labs covers talks about the human factor — from social engineering to human vulnerability scanning — at DEF CON and Black Hat 2015.
The phrase "deep learning" came up many times during Black Hat 2015. It seems to have quickly risen to prominence, and it certainly merits discussion: the broad field of machine learning and developments in the field have definite potential to help the security field make better sense of the data.
This is a general guideline aimed at first-time attendees to Black Hat and DEF CON.