Join XM Cyber at Black Hat Europe 2019
XM Cyber is ready to welcome the brightest professionals and researchers in the cyber industry at Black Hat Europe 2019, in London, on December 2-5.
“We will showcase our HaXM breach and attack simulation platform that helps protect an organization’s critical assets from cyber attackers. We are the only ones to address the only crucial question for enterprises: ‘are my critical assets really secure?,” said Gil Hazaz, VP Sales EMEA & APAC, XM Cyber.
On Thursday, Dec. 5, at 4:35 pm, don’t miss our briefing on Inside Out – The Cloud has Never Been So Close. In this talk, we’ll present an alternative new approach for attacking cloud infrastructure. We use graphs to build and illustrate the relationships between different resources, identities, and policies. After mapping all the relationships, we show how adversaries can easily abuse existing features to escalate privileges and get to high-value resources.
Topic: Inside Out – The Cloud has Never Been So Close
Date: Thursday, December 5 | 4:35pm-5:00pm
Speakers: Igal Gofman & Yaron Shani
Learn more: The public cloud infrastructure adds a new management layer and security challenges that need to be well understood and secured. The fact that cloud provider application programming interfaces (API) are accessible through the internet has opened a new window for adversaries to take advantage and gain highly privileged access to cloud critical assets. Traditional defense mechanism mostly focuses on network, application and operating system defense. The use of public APIs introduces a new attack surface, one that traditional defenses cannot protect. Credential theft is a well-known attack vector used by many adversaries. It is so successful because organizations are struggling to follow the principle of least privilege. The persons who are in charge of cloud resources usually are the DevOps, Development and IT teams who need to manage those resources. Access to APIs performed by using different software development kit (SDK) and dedicated command-line tools. Once those accounts are compromised, gaining access to high-value resources is one API call away.
To schedule a meeting during the event, please email us at [email protected].
About XM Cyber
XM Cyber provides the first fully automated breach and attack simulation (BAS) platform to continuously expose attack vectors, from breach point to any organizational critical asset. This continuous loop of automated red teaming is completed by ongoing and prioritized actionable remediation. In effect, XM Cyber’s platform operates as an automated purple team, combining red and blue teams’ processes to ensure that organizations are always one step ahead of the attack. XM Cyber was founded by top executives from the Israeli cyber intelligence community and has offices in the US, UK, Israel and in Australia.
HaXM by XM Cyber is the first breach and attack simulation (BAS) platform to simulate, validate and remediate attackers’ paths to your critical assets 24×7. HaXM’s automated purple teaming aligns red and blue teams to provide the full realistic advanced persistent threat (APT) experience on one hand while delivering vital prioritized remediation on the other. Addressing real-user behavior and exploits, the full spectrum of scenarios is aligned to your organization’s own network to expose blind spots and is executed using the most up-to-date attack techniques safely, without affecting network availability and user experience.