Cybereason Labs to Host Booth Meetups During Black Hat on 'Dissecting the Hacking Team's Operation Methods: What Security Teams Need to Know'

Yonatan Striem-Amit, Cofounder and CTO and Amit Serper, Senior Security Researcher of Cybereason to Present the Hacking Team's Attack Methodologies and Host Discussions on Key Take-aways for Corporate Security Teams

Jul 31, 2015, 08:00 ET from Cybereason

CAMBRIDGE, Mass., July 31, 2015 /PRNewswire/ -- Cybereason Inc., announced today it will be holding a series of booth meetups during Black Hat to expand on its recently published research and analysis of the 400 GB of emails leaked in the Hacking Team Data Breach. The meetups will occur on Wednesday, August 5 from 3:15 p.m. to 3:45 p.m., and Thursday August 6 from 1:15 p.m. to 1:45 p.m., at Booth 358 on the Black Hat expo floor.   

"We've spent weeks digging through the data leaked in the Hacking Team breach in order to assess the capabilities now at the disposal of hacker communities across the globe," said Yonatan Striem-Amit, Cofounder and CTO, Cybereason. "We focused our research on the Hacking Team's infection server and exploit delivery methodologies. We found a complete turnkey solution and a 'cookbook' for running an operation, including methodologies for masking their attribution and evading detection. With so much data to sift through, the goal of these meetups is to bottom line members of the information security community on what is most relevant to their particular organizations and why."

For more information please visit the Cybereason booth, #358. For those who can't or won't be attending either conference, Amit's findings are summarized in his report, which is free for download at https://waa.ai/v913.  

"These meetups will not going to be veiled sales pitches. Our objective is to keep the conversation about the exploits and methodologies leaked in the Hacking Team Breach going, as it is all too easy for its significance to get lost given the size, scope, and frequency with which data breaches now occur," said Amit Serper, Senior Security Researcher, Cybereason.

About Yonatan Striem-Amit, CTO and Co-Founder:
Yonatan is an expert in machine learning, big data analytics and visualization technology with over a decade of experience in applying analytics to security in the Israeli Defense Forces Unit 8200 and Israeli government agencies. Prior to Cybereason, Yonatan was head of development for Watchdox, a leading DRM and SaaS security startup.

About Amit Serper, Senior Security Researcher
Amit is an Information Security researcher specializing in embedded Linux devices. For nearly a decade, Amit led security projects for a government agency in Israel, specializing in the security of embedded systems. Amit is known as the go-to person when "out-of-the-box" thinking is needed to test the vulnerabilities of complex infrastructure. Amit uniquely spots inherent vulnerabilities in embedded systems and is renowned for his shell popping capabilities on various embedded devices such as routers, IP cameras, and even home irrigation systems. Amit has won several Blackhat pen-testing challenges.

At Cybereason, Amit leads research on novel methodologies for identification of complex hacking operations that tend to evade common detection tools. Specifically, he focuses his research on large corporate networks, building methods to identify the attackers' lateral movement from penetrating a single endpoint to a broad spread and a total control over the attacked organization network.  

About Cybereason:
Cybereason was founded in 2012 by a team of Israeli cybersecurity experts that applied their experience cracking some of the world's most sophisticated hacking operations to develop software that enables real time detection and response to complex cyber attacks. Using big data, behavioral analytics, and machine learning the Cybereason platform identifies signature and unknown, non-signature based attacks and presents a birds-eye view of the complete attack story to security teams. This eliminates the need for manual investigation and radically reduces response time for security teams. The platform is available as an on premise solution or a cloud-based service. Cybereason is privately held and headquartered in Boston, MA with offices in Tel Aviv, Israel.

For more information, please visit:

SOURCE Cybereason



RELATED LINKS

http://www.cybereason.com