{"id":2846,"date":"2023-08-16T12:08:49","date_gmt":"2023-08-16T12:08:49","guid":{"rendered":"https:\/\/antidos.com\/blog\/?p=2846"},"modified":"2023-10-24T11:44:10","modified_gmt":"2023-10-24T11:44:10","slug":"black-hat-conferences-2023","status":"publish","type":"post","link":"https:\/\/antidos.com\/blog\/black-hat-conferences-2023\/","title":{"rendered":"Black Hat conferences 2023: Top 10 Cybersecurity Products and Takeaways"},"content":{"rendered":"<p>In 2023, the cybersecurity landscape has showcased its dynamic nature with shifting trends in cyber threats. While traditional ransomware attacks have waned in popularity, identity-based cyberattacks and data extortion have seen a significant increase, reflecting the evolving tactics of malicious actors. Businesses are investing in <a href=\"https:\/\/antidos.com\/\">DDoS protection<\/a> to prevent business disruption.\u00a0Like previous Black Hat conferences, this year&#8217;s Black Hat USA conference took place in Las Vegas from <strong>August 5 to August 10 2023<\/strong>. It has brought together leading cybersecurity vendors to address these emerging challenges.<\/p>\n<p>Renowned cybersecurity companies showed off new cybersecurity products and services designed to anticipate and counter evolving threats. The conference has highlighted the role of generative AI technologies, including large language models like ChatGPT, in various security offerings, emphasizing their significance in tackling modern cyber risks. The showcased security tools encompass a range of areas such as vulnerability management, application security, threat hunting, and Security Operations Center (SOC) automation, reflecting the industry&#8217;s commitment to innovation and adaptation in the face of ever-changing threats.<\/p>\n<div class=\"cw_blog_toc-wrap\">\n<div class=\"cw_blog_toc-wrap\">\n<h2 id='black-hat-2023-top-10-cybersecurity-products-and-takeaways'  id=\"boomdevs_1\" id=\"Black Hat 2023: Top 10 Cybersecurity Products and Takeaways\" >Black Hat 2023: Top 10 Cybersecurity Products and Takeaways<\/h2>\n<h2 id='10-key-takeaways-from-black-hat-2023'  id=\"boomdevs_2\" id=\"10 Key Takeaways From Black Hat 2023\" >10 Key Takeaways From Black Hat 2023<\/h2>\n<p>Here are ten key takeaways from Black Hat 2023.<\/p>\n<h2 id='1-artificial-intelligence-takes-center-stage'  id=\"boomdevs_3\" id=\"1. Artificial Intelligence Takes Center Stage\" >1. Artificial Intelligence Takes Center Stage<\/h2>\n<p>Artificial intelligence and machine learning are becoming increasingly integrated into cybersecurity practices. Experts at Black Hat 2023 discussed the potential benefits and risks associated with AI-driven security tools. From threat detection to vulnerability analysis, these technologies are being leveraged to enhance the efficiency of defensive strategies.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2847\" src=\"https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Black-Hat-USA-2023.jpg\" alt=\"Black Hat USA 2023\" width=\"650\" height=\"366\" srcset=\"https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Black-Hat-USA-2023.jpg 800w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Black-Hat-USA-2023-300x169.jpg 300w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Black-Hat-USA-2023-768x432.jpg 768w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Black-Hat-USA-2023-370x208.jpg 370w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Black-Hat-USA-2023-270x152.jpg 270w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Black-Hat-USA-2023-570x321.jpg 570w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Black-Hat-USA-2023-740x416.jpg 740w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/p>\n<h2 id='2-supply-chain-attacks-are-evolving'  id=\"boomdevs_4\" id=\"2. Supply Chain Attacks Are Evolving:\" >2. Supply Chain Attacks Are Evolving:<\/h2>\n<p>Supply chain attacks have emerged as a major concern for organizations. The SolarWinds and Kaseya incidents underscored the importance of securing every link in the supply chain. Presenters discussed innovative approaches to minimize these risks and prevent third-party vulnerabilities from compromising overall security.<\/p>\n<h2 id='3-ransomware-gets-smarter'  id=\"boomdevs_5\" id=\"3. Ransomware Gets Smarter:\" >3. Ransomware Gets Smarter:<\/h2>\n<p>Ransomware attacks have taken a more sophisticated turn, with threat actors employing artificial intelligence to identify valuable targets and evade detection. Black Hat 2023 featured discussions on the evolving tactics of ransomware operators and highlighted the need for organizations to adopt multi-layered defense mechanisms.<\/p>\n<h2 id='4-zero-trust-architecture'  id=\"boomdevs_6\" id=\"4. Zero Trust Architecture:\" >4. Zero Trust Architecture:<\/h2>\n<p>The concept of Zero Trust Architecture gained significant attention at the conference. As traditional perimeter defenses become less effective, the approach of &#8220;never trust, always verify&#8221; is being widely advocated to prevent lateral movement of attackers within networks.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2848 aligncenter\" src=\"https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Lets-Talk-Zero-Trust-Black-Hat-USA-2023.jpg\" alt=\"Let's Talk Zero Trust - Black Hat USA 2023\" width=\"650\" height=\"340\" srcset=\"https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Lets-Talk-Zero-Trust-Black-Hat-USA-2023.jpg 1200w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Lets-Talk-Zero-Trust-Black-Hat-USA-2023-300x157.jpg 300w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Lets-Talk-Zero-Trust-Black-Hat-USA-2023-1024x535.jpg 1024w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Lets-Talk-Zero-Trust-Black-Hat-USA-2023-768x401.jpg 768w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Lets-Talk-Zero-Trust-Black-Hat-USA-2023-370x193.jpg 370w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Lets-Talk-Zero-Trust-Black-Hat-USA-2023-270x141.jpg 270w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Lets-Talk-Zero-Trust-Black-Hat-USA-2023-570x298.jpg 570w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Lets-Talk-Zero-Trust-Black-Hat-USA-2023-740x387.jpg 740w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/p>\n<h2 id='5-quantum-computing-s-implications-for-cybersecurity'  id=\"boomdevs_7\" id=\"5. Quantum Computing's Implications for Cybersecurity:\" >5. Quantum Computing&#8217;s Implications for Cybersecurity:<\/h2>\n<p>With the growing potential of quantum computing, concerns about its impact on cryptography and security were thoroughly examined. Experts shared insights on post-quantum cryptography and the urgency of transitioning to quantum-resistant encryption methods.<\/p>\n<h2 id='6-iot-security-challenges-persist'  id=\"boomdevs_8\" id=\"6. IoT Security Challenges Persist:\" >6. IoT Security Challenges Persist:<\/h2>\n<p>The security of Internet of Things (IoT) devices remains a pressing issue. Discussions at Black Hat 2023 emphasized the need for manufacturers to prioritize security in IoT devices, as their vulnerabilities can lead to significant breaches and disruptions.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2849 aligncenter\" src=\"https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/BlackHat-USA-and-Defcon-31.jpg\" alt=\"BlackHat USA and Defcon 31\" width=\"650\" height=\"302\" srcset=\"https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/BlackHat-USA-and-Defcon-31.jpg 965w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/BlackHat-USA-and-Defcon-31-300x139.jpg 300w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/BlackHat-USA-and-Defcon-31-768x357.jpg 768w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/BlackHat-USA-and-Defcon-31-370x172.jpg 370w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/BlackHat-USA-and-Defcon-31-270x125.jpg 270w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/BlackHat-USA-and-Defcon-31-570x265.jpg 570w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/BlackHat-USA-and-Defcon-31-740x344.jpg 740w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/p>\n<h2 id='7-biometric-authentication-under-scrutiny'  id=\"boomdevs_9\" id=\"7. Biometric Authentication Under Scrutiny:\" >7. Biometric Authentication Under Scrutiny:<\/h2>\n<p>Biometric authentication methods, once hailed as highly secure, faced scrutiny at the conference. Researchers presented findings on vulnerabilities in biometric systems, stressing the importance of combining biometrics with other authentication factors for enhanced security.<\/p>\n<h2 id='8-regulations-and-compliance'  id=\"boomdevs_10\" id=\"8. Regulations and Compliance:\" >8. Regulations and Compliance:<\/h2>\n<p>The evolving landscape of cybersecurity regulations and compliance requirements was a key focus. With stricter data protection laws coming into effect globally, organizations are compelled to enhance their security measures to avoid hefty fines and reputational damage.<\/p>\n<h2 id='9-human-centric-cybersecurity'  id=\"boomdevs_11\" id=\"9. Human-Centric Cybersecurity:\" >9. Human-Centric Cybersecurity:<\/h2>\n<p>Black Hat 2023 highlighted the significance of human factors in cybersecurity. Social engineering and psychological tactics used by attackers were explored, and experts discussed the importance of cybersecurity awareness training for all employees.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2850 aligncenter\" src=\"https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Proofpoint-at-black-hat-usa-2023.jpg\" alt=\"Proofpoint at black hat usa 2023\" width=\"650\" height=\"296\" srcset=\"https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Proofpoint-at-black-hat-usa-2023.jpg 1111w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Proofpoint-at-black-hat-usa-2023-300x137.jpg 300w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Proofpoint-at-black-hat-usa-2023-1024x466.jpg 1024w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Proofpoint-at-black-hat-usa-2023-768x350.jpg 768w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Proofpoint-at-black-hat-usa-2023-370x169.jpg 370w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Proofpoint-at-black-hat-usa-2023-270x123.jpg 270w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Proofpoint-at-black-hat-usa-2023-570x260.jpg 570w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Proofpoint-at-black-hat-usa-2023-740x337.jpg 740w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/p>\n<h2 id='10-ethical-considerations-in-offensive-security'  id=\"boomdevs_12\" id=\"10. Ethical Considerations in Offensive Security:\" >10. Ethical Considerations in Offensive Security:<\/h2>\n<p>The ethical boundaries of offensive security practices were debated extensively. Presenters discussed responsible disclosure, the potential impact of offensive tools falling into the wrong hands, and the need for a collective commitment to ethical hacking practices.<\/p>\n<\/div>\n<h2 id='top-10-cybersecurity-products-at-black-hat-2023'  id=\"boomdevs_13\" id=\"Top 10 Cybersecurity Products At Black Hat 2023\" >Top 10 Cybersecurity Products At Black Hat 2023<\/h2>\n<p>Here are the top ten cybersecurity products released at Black Hat 2023.<\/p>\n<h2 id='1-sentinelone-s-singularity-ranger'  id=\"boomdevs_14\" id=\"1. SentinelOne\u2019s Singularity Ranger\" >1. SentinelOne\u2019s Singularity Ranger<\/h2>\n<p>SentinelOne has introduced a new addition to its Singularity Ranger network discovery suite called Ranger Insights, aimed at simplifying the prioritization of critical software vulnerabilities for security analysts. By providing contextual information within the same console and software agent as other security tools like endpoint detection and response, the tool presents a consolidated view of vulnerabilities alongside endpoint-based threats.<\/p>\n<p>This eliminates the need for scheduled network scans due to SentinelOne&#8217;s agent-based approach. While initially lacking direct patching capabilities, future plans include incorporating patching functionality. The expansion into vulnerability management aligns with customer demands for vendor consolidation and streamlining security processes.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2851 aligncenter\" src=\"https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/SentinelOne.jpg\" alt=\"SentinelOne\" width=\"650\" height=\"325\" srcset=\"https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/SentinelOne.jpg 1165w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/SentinelOne-300x150.jpg 300w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/SentinelOne-1024x512.jpg 1024w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/SentinelOne-768x384.jpg 768w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/SentinelOne-370x185.jpg 370w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/SentinelOne-270x135.jpg 270w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/SentinelOne-570x285.jpg 570w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/SentinelOne-740x370.jpg 740w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/p>\n<h2 id='2-crowdstrike-s-identity-threat-hunting'  id=\"boomdevs_15\" id=\"2. CrowdStrike\u2019s Identity Threat Hunting\" >2. CrowdStrike\u2019s Identity Threat Hunting<\/h2>\n<p>CrowdStrike has introduced a pioneering threat hunting service called Identity Threat Hunting, addressing the prevalent issue of identity-based attacks in the cybersecurity landscape. The move comes as a response to the increasing effectiveness of endpoint security measures. This service, the inaugural offering from CrowdStrike&#8217;s Counter Adversary Operations unit, extends the proactive threat hunting practices of the Falcon OverWatch team from endpoint layers to identity threats.<\/p>\n<p>Accessible at no charge for users of CrowdStrike Falcon OverWatch Elite, the service focuses on leveraging established intelligence and expertise to detect and prevent identity-based threats, emphasizing the prevention of lateral movement and early identification of compromised credentials.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2852 aligncenter\" src=\"https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Crowdstrike.jpg\" alt=\"Crowdstrike BlackHat 2023 \" width=\"650\" height=\"316\" srcset=\"https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Crowdstrike.jpg 1146w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Crowdstrike-300x146.jpg 300w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Crowdstrike-1024x499.jpg 1024w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Crowdstrike-768x374.jpg 768w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Crowdstrike-370x180.jpg 370w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Crowdstrike-270x131.jpg 270w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Crowdstrike-570x278.jpg 570w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Crowdstrike-740x360.jpg 740w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/p>\n<h2 id='3-cycode-s-expanded-aspm-and-ide-plugin'  id=\"boomdevs_16\" id=\"3. Cycode's Expanded ASPM and IDE Plugin:\" >3. Cycode&#8217;s Expanded ASPM and IDE Plugin:<\/h2>\n<p>Cycode, a leader in application security posture management (ASPM), has extended its capabilities by adding support for detecting hard-coded secrets in Confluence, AWS S3 buckets, and Azure environments. Additionally, they&#8217;ve introduced an IDE plugin for integration with VS Code, aiding developers in identifying and addressing hard-coded secrets within a single system. A new collaboration with Azure allows Cycode&#8217;s CI monitoring solution to work with Azure DevOps pipelines for Supply Chain Levels for Software Artifacts (SLSA) attestation generation.<\/p>\n<h2 id='4-netrise-s-sbom-features-and-kev-support'  id=\"boomdevs_17\" id=\"4. NetRise's SBOM Features and KEV Support:\" >4. NetRise&#8217;s SBOM Features and KEV Support:<\/h2>\n<p>NetRise has enhanced its extended internet of things (XIoT) security platform by including support for two major software bill of materials (SBOM) formats, SPDX and CycloneDX. This addition enables users to export vulnerability-enriched SBOMs and overlay CISA&#8217;s key exploited vulnerabilities (KEV) catalog data to simplify identifying and addressing known exploits, with no extra charges in the pricing model, starting from August 9.<\/p>\n<h2 id='5-threatconnect-s-intelligence-requirement-capabilities'  id=\"boomdevs_18\" id=\"5. ThreatConnect's Intelligence Requirement Capabilities:\" >5. ThreatConnect&#8217;s Intelligence Requirement Capabilities:<\/h2>\n<p>ThreatConnect has improved its machine-learning powered TI Ops Platform for threat intelligence operations with intelligence requirement capabilities. This feature aids customers in defining, managing, and tracking their intelligence requirements, priority intelligence requirements, and requests for information, streamlining the process of producing relevant and stakeholder-informed threat intelligence. This enhancement is included in the current pricing and became available to existing and new customers from August 7.<\/p>\n<h2 id='6-ironscales-phishing-simulation-testing-and-ade'  id=\"boomdevs_19\" id=\"6. Ironscales' Phishing Simulation Testing and ADE:\" >6. Ironscales&#8217; Phishing Simulation Testing and ADE:<\/h2>\n<p>Ironscales has introduced a beta launch of GPT-powered phishing simulation testing (PST) to help organizations combat advanced phishing attacks with highly personalized simulation campaigns. Simultaneously, Ironscales&#8217; new capability, accidental data exposure (ADE), alerts employees when they send potentially sensitive information. These capabilities are in beta and available to limited users, with pricing determined based on beta feedback.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2853 aligncenter\" src=\"https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Phishing-Simuation-Testing.jpg\" alt=\"Phishing Simuation Testing\" width=\"650\" height=\"366\" srcset=\"https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Phishing-Simuation-Testing.jpg 1280w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Phishing-Simuation-Testing-300x169.jpg 300w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Phishing-Simuation-Testing-1024x576.jpg 1024w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Phishing-Simuation-Testing-768x432.jpg 768w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Phishing-Simuation-Testing-370x208.jpg 370w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Phishing-Simuation-Testing-270x152.jpg 270w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Phishing-Simuation-Testing-570x321.jpg 570w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Phishing-Simuation-Testing-740x416.jpg 740w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/p>\n<h2 id='7-bionic-s-servicenow-integration-and-bionic-events'  id=\"boomdevs_20\" id=\"7. Bionic's ServiceNow Integration and Bionic Events:\" >7. Bionic&#8217;s ServiceNow Integration and Bionic Events:<\/h2>\n<p>Bionic&#8217;s application security posture management (ASPM) platform now integrates with ServiceNow&#8217;s Service Graph, offering engineering teams real-time configuration management databases of their applications and dependencies. Additionally, Bionic Events correlates application changes to security risk, supplying users with specific events to investigate security changes. These features come at no extra cost and were showcased at Black Hat USA.<\/p>\n<h2 id='8-protectai-s-huntr-platform'  id=\"boomdevs_21\" id=\"8. ProtectAI's Huntr Platform:\" >8. ProtectAI&#8217;s Huntr Platform:<\/h2>\n<p>ProtectAI has unveiled Huntr, an open-source bug bounty platform powered by machine learning and focused on safeguarding AI open-source software and foundational models. With artificial intelligence and machine learning based bug hunting, monthly contests, and collaboration tools, the platform offers security researchers an environment for finding vulnerabilities.<\/p>\n<h2 id='9-cybersixgill-s-enhancements-to-cybersixgill-iq'  id=\"boomdevs_22\" id=\"9. Cybersixgill's Enhancements to Cybersixgill IQ:\" >9. Cybersixgill&#8217;s Enhancements to Cybersixgill IQ:<\/h2>\n<p>Cybersixgill IQ, a generative-AI based threat intelligence platform, now includes an attack surface management (ASM) module for contextual business insights. Enhancements such as a custom report builder, improved threat entity navigator with cross-referencing, and a credential module have been introduced to consolidate stolen credentials. These enhancements were demonstrated at Black Hat USA.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2854 aligncenter\" src=\"https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Cubersixgrill-IQ.jpg\" alt=\"Cubersixgrill IQ\" width=\"640\" height=\"360\" srcset=\"https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Cubersixgrill-IQ.jpg 640w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Cubersixgrill-IQ-300x169.jpg 300w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Cubersixgrill-IQ-370x208.jpg 370w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Cubersixgrill-IQ-270x152.jpg 270w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/08\/Cubersixgrill-IQ-570x321.jpg 570w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/p>\n<h2 id='10-cado-s-new-timeline-view-and-varc-tool-enhancements'  id=\"boomdevs_23\" id=\"10. Cado's New Timeline View and VARC Tool Enhancements:\" >10. Cado&#8217;s New Timeline View and VARC Tool Enhancements:<\/h2>\n<p>Cado&#8217;s Timeline, a unified view for cross-cloud evidence items during incident response, has been revamped for better navigation. The shift from card view to tabular view enhances usability, while faceted and saved search options are now available. Cado also updated its open-source volatile artifact collection (VARC) tool to streamline incident investigation. These features were showcased at Black Hat USA.<\/p>\n<p>Which is the most exciting cybersecurity product from Black Hat 2023? Share your choices with us in the comments section below.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>In 2023, the cybersecurity landscape has showcased its dynamic nature with shifting trends in cyber threats. While traditional ransomware attacks have waned in popularity, identity-based cyberattacks and data extortion have seen a significant increase, reflecting the evolving tactics of malicious actors. Businesses are investing in DDoS protection to prevent business disruption.\u00a0Like previous Black Hat conferences, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2860,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[53,45,47,51],"tags":[],"class_list":["post-2846","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","category-product-news","category-security","category-threat-intelligence"],"_links":{"self":[{"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/posts\/2846","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/comments?post=2846"}],"version-history":[{"count":6,"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/posts\/2846\/revisions"}],"predecessor-version":[{"id":2931,"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/posts\/2846\/revisions\/2931"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/media\/2860"}],"wp:attachment":[{"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/media?parent=2846"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/categories?post=2846"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/tags?post=2846"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}