2025-09-05 –, Main track
Let me walk you through the modern techniques hackers use today to take over cloud accounts - methods that are far more stealthy and persistent than most users or security teams realize.
We'll examine how attackers steal session cookies from unsuspecting victims, silently modify email account settings to intercept or redirect messages, and leverage OAuth applications to maintain
long-term access even if the user changes their password or enables two-factor authentication. These tactics often leave no alerts or obvious signs, allowing the attacker to persist undetected for weeks or even months.
To better understand and replicate these threats, we've developed two custom red team tools: ATOLS and FASSA.
These tools simulate real-world attack paths used by adversaries, allowing organizations to test their detection capabilities and response processes in a controlled and safe environment.
Today, we’re going to show you exactly how they work and what you can do to stay ahead.
Yaniv Miron – Cloud Threat Research Manager at Proofpoint
With a lifelong passion for cybersecurity, Mr. Miron has spent years working as a security consultant and researcher.
He holds multiple certifications, including CISO, CEPT, CREA, CSSA and Exploit Development.
Mr. Miron has discovered multiple 0-day vulnerabilities in Microsoft, Oracle, and other major vendors' products, and have reported and credited for these issues.
He is a recognized global speaker at leading cybersecurity and hacking conferences such as Black Hat, HackFest, Power of Community, CONFidence, IL.Hack, and Hacker Halted.
In addition to his technical expertise, Mr. Miron is an entrepreneur and inventor.
LinkedIn profile: https://www.linkedin.com/in/yanivmiron/