SlideShare a Scribd company logo
4
Most read
11
Most read
20
Most read
AI & Future of Offensive Security
FireCompass Technologies Inc.
www.firecompass.com
Arnab Chattopadhyay, Chief Research Officer
Nirmal Kumar, VP – Sales
Only 10% of assets covered in a single pentest
Pentest done yearly/quarterly
VS
2200 #Attacks / Day / IP
Organizations Pentest some of
the assets some of the time
Hackers attack all of the
assets all of the time
*
AI Use Cases for Security Testing
● Malware Generation and Analysis
● Adversarial Attack Simulation
● Phishing Email Generation
● Attack Payload Generation
● Synthetic User Behavior Creation
● Password Cracking
● Autonomous Attack Path Generation
● Deepfake Image Creation
● Firewall Rule Testing
● Incident Response Training
● Content Filter Testing
● NLP for Threat Intelligence
● Security Policy Validation
● Security Documentation Review
New class of Threat - AI Powered Malware
AI Powered
Malware
Evasion
Techniques
Dodge Sandbox
Adapt to
Environment
Using previous
Data
New Malware
Variants
Anti Reversing
Autonomous
Smart Decisions
Eliminating C2
Execute
machine-speed
Targeted attack
Cross platform
AI against AI
Adversarial
attack
Poisoning data
Steal valuable
data
Model stealing
Bio-inspired and
Swarm intelligence
Bio Inspired
Evolvable
malware
Swarm based
intelligence
Mutating
malware
BlackMamba
BlackMamba - an AI powered malware
AI-synthesized, polymorphic keylogger
with on-the-fly program modification
BlackMamba comprises
two main components.
First: Python-compiled,
executable consisting of two
functions and a few imports
(benign component)
Second: Polymorphic
payload that is generated
and executed at runtime,
consisting of the malicious
keylogging functionality
BlackMamba - Prompt Engineering
BlackMamba - Polymorphic Code Generation and Execution
BlackMamba - Data Exfiltration using MS Teams
Use AI as Hackers would….
augment your
classical Security Testing with AI
*
Don’t bring a knife to a gun-fight
Continuous Pentesting
Continuous Red Teaming
External Attack Surface Management (EASM)
Know Your Attack Surface
Before Your Adversary Does
Why Traditional Pen Testing/Vulnerability
Management Fails?
Organizations Pen Test
Only Partial Asset
Inventory
Most organizations only pentest
10-20% of their crown jewel assets.
Whereas attackers are gaining
initial access through the 80%
peripheral assets.
Organizations Pen-Test
Yearly/Quarterly; Hackers
Attack Continuously
40% of new CVEs have exploits
available within 24 hours
Hacker’s don’t wait for the yearly
pen test cycle
Pen-Testing Is Largely
Manual, Costly & Time
Consuming
And we have severe talent
shortage
Mission
Stay ahead of hackers..
AI based Platform for Automated Pen
Testing, Red Teaming & NextGen Attack
Surface Management
NextGen Attack Surface Management
● Discover shadow
assets in near real
time
● Combine Active
and Passive recon
to eliminate False
Positives
AI based Pen Test: Run complex multi-stage
attack paths at scale
● Automate Multi
Stage Attack Trees
● Safe penetration
testing
● No false positives
AI based Red Teaming: Test Your Security Control
Effectiveness Against Specific Adversarial Goals
● MITRE based
attacks for
emulating various
Red Teaming
objectives
● Test security control
effectiveness
AI + Humans: Pen Test as a Service (PTaaS) To Reduce
False Positives, Complexity and Cost
● Eliminate false
positives
● Supervised and
safe exploitation
● Prioritized risks with
proof of exploitation
Recognized as a Leader by Gartner, Forrester & IDC
in 30+ Analyst Reports
• 15 Gartner reports
• 3 Gartner Hype Cycles
• Notable Vendor in Forrester
• IDC Innovators
• Leader in 2023 GIGAOM Radar
• RSAC 365 Innovation Showcase
Trusted by Fortune 500 Customers & Backed by Top VCs
“The tool has exceeded
our expectations in
identifying numerous
domains and subdomains
that are shown as public,
but should be private.”
Top 5 Telco in USA
● Top 3 global Telecom
● Top 10 IT Companies
● Top 100 Manufacturing firms
● Mid-sized Automobile Companies
● Mid-sized Banks and Financial Services
Investors
Thank You
www.FireCompass.com

More Related Content

PDF
Mastering the Algorithm - The Strategic Edge of Prompt Engineering in Securin...
PPTX
Threat hunting in cyber world
PPTX
From ChatGPT to ThreatGPT The Impact of Generative AI on Cybersecurity and_20...
PDF
Threat hunting 101 by Sandeep Singh
PPTX
Cognitive automation with machine learning in cyber security
PDF
Cognitive Security: How Artificial Intelligence is Your New Best Friend
PPTX
Group 8 Advanced Cybersecurity Applications using AI.pptx
PDF
Cyber Defense Automation
Mastering the Algorithm - The Strategic Edge of Prompt Engineering in Securin...
Threat hunting in cyber world
From ChatGPT to ThreatGPT The Impact of Generative AI on Cybersecurity and_20...
Threat hunting 101 by Sandeep Singh
Cognitive automation with machine learning in cyber security
Cognitive Security: How Artificial Intelligence is Your New Best Friend
Group 8 Advanced Cybersecurity Applications using AI.pptx
Cyber Defense Automation

Similar to Keynote : AI & Future Of Offensive Security (20)

PDF
How AI can help with cybersecurity
PDF
PatrOwl - Security Operations Orchestration
PPT
Ethical hacking a licence to hack
PPTX
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
PDF
ScotSecure West Summit 2024 - Glasgow 11th Sept
PPTX
Security O365 Using AI-based Advanced Threat Protection
PDF
Future of Penetration Testing Trends to Watch.
PPTX
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
PPTX
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
PPTX
4 Ways to Build your Immunity to Cyberthreats
PPTX
Tony Hodgson (Brainwaive LLC): Enterprise AR Cyber Security – Breaking Down B...
PDF
Advanced Threat Detection & Response Solutions
PDF
Top 10 Essential Ethical Hacker Tools Everyone Should Know.pdf
PPT
Ethicalhackingalicencetohack 120223062548-phpapp01
PDF
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
PDF
Role of Generative AI in Cybersecurity.pdf
PPTX
Cyber Threat Hunting with Phirelight
PDF
Failed Ransom: How IBM XGS Defeated Ransomware
PDF
Role of Generative AI in Cybersecurity.pdf
PDF
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
How AI can help with cybersecurity
PatrOwl - Security Operations Orchestration
Ethical hacking a licence to hack
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
ScotSecure West Summit 2024 - Glasgow 11th Sept
Security O365 Using AI-based Advanced Threat Protection
Future of Penetration Testing Trends to Watch.
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
4 Ways to Build your Immunity to Cyberthreats
Tony Hodgson (Brainwaive LLC): Enterprise AR Cyber Security – Breaking Down B...
Advanced Threat Detection & Response Solutions
Top 10 Essential Ethical Hacker Tools Everyone Should Know.pdf
Ethicalhackingalicencetohack 120223062548-phpapp01
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
Role of Generative AI in Cybersecurity.pdf
Cyber Threat Hunting with Phirelight
Failed Ransom: How IBM XGS Defeated Ransomware
Role of Generative AI in Cybersecurity.pdf
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
Ad

More from Priyanka Aash (20)

PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
PDF
Cyber Defense Matrix Workshop - RSA Conference
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
PDF
Securing AI - There Is No Try, Only Do!.pdf
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
PDF
Keynote : Presentation on SASE Technology
PDF
Redefining Cybersecurity with AI Capabilities
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
PDF
Finetuning GenAI For Hacking and Defending
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
PDF
(CISOPlatform Summit & SACON 2024) Workshop _ Most Dangerous Attack Technique...
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Cyber Defense Matrix Workshop - RSA Conference
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Securing AI - There Is No Try, Only Do!.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Keynote : Presentation on SASE Technology
Redefining Cybersecurity with AI Capabilities
Demystifying Neural Networks And Building Cybersecurity Applications
Finetuning GenAI For Hacking and Defending
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
(CISOPlatform Summit & SACON 2024) Workshop _ Most Dangerous Attack Technique...
Ad

Recently uploaded (20)

PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Cloud computing and distributed systems.
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Approach and Philosophy of On baking technology
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Advanced IT Governance
PDF
Unlocking AI with Model Context Protocol (MCP)
Network Security Unit 5.pdf for BCA BBA.
MYSQL Presentation for SQL database connectivity
Mobile App Security Testing_ A Comprehensive Guide.pdf
Electronic commerce courselecture one. Pdf
NewMind AI Monthly Chronicles - July 2025
Per capita expenditure prediction using model stacking based on satellite ima...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Cloud computing and distributed systems.
Dropbox Q2 2025 Financial Results & Investor Presentation
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
20250228 LYD VKU AI Blended-Learning.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
GamePlan Trading System Review: Professional Trader's Honest Take
Review of recent advances in non-invasive hemoglobin estimation
Approach and Philosophy of On baking technology
Diabetes mellitus diagnosis method based random forest with bat algorithm
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Advanced IT Governance
Unlocking AI with Model Context Protocol (MCP)

Keynote : AI & Future Of Offensive Security

  • 1. AI & Future of Offensive Security FireCompass Technologies Inc. www.firecompass.com Arnab Chattopadhyay, Chief Research Officer Nirmal Kumar, VP – Sales
  • 2. Only 10% of assets covered in a single pentest Pentest done yearly/quarterly VS 2200 #Attacks / Day / IP Organizations Pentest some of the assets some of the time Hackers attack all of the assets all of the time *
  • 3. AI Use Cases for Security Testing ● Malware Generation and Analysis ● Adversarial Attack Simulation ● Phishing Email Generation ● Attack Payload Generation ● Synthetic User Behavior Creation ● Password Cracking ● Autonomous Attack Path Generation ● Deepfake Image Creation ● Firewall Rule Testing ● Incident Response Training ● Content Filter Testing ● NLP for Threat Intelligence ● Security Policy Validation ● Security Documentation Review
  • 4. New class of Threat - AI Powered Malware AI Powered Malware Evasion Techniques Dodge Sandbox Adapt to Environment Using previous Data New Malware Variants Anti Reversing Autonomous Smart Decisions Eliminating C2 Execute machine-speed Targeted attack Cross platform AI against AI Adversarial attack Poisoning data Steal valuable data Model stealing Bio-inspired and Swarm intelligence Bio Inspired Evolvable malware Swarm based intelligence Mutating malware
  • 6. BlackMamba - an AI powered malware AI-synthesized, polymorphic keylogger with on-the-fly program modification BlackMamba comprises two main components. First: Python-compiled, executable consisting of two functions and a few imports (benign component) Second: Polymorphic payload that is generated and executed at runtime, consisting of the malicious keylogging functionality
  • 7. BlackMamba - Prompt Engineering
  • 8. BlackMamba - Polymorphic Code Generation and Execution
  • 9. BlackMamba - Data Exfiltration using MS Teams
  • 10. Use AI as Hackers would…. augment your classical Security Testing with AI * Don’t bring a knife to a gun-fight
  • 11. Continuous Pentesting Continuous Red Teaming External Attack Surface Management (EASM) Know Your Attack Surface Before Your Adversary Does
  • 12. Why Traditional Pen Testing/Vulnerability Management Fails? Organizations Pen Test Only Partial Asset Inventory Most organizations only pentest 10-20% of their crown jewel assets. Whereas attackers are gaining initial access through the 80% peripheral assets. Organizations Pen-Test Yearly/Quarterly; Hackers Attack Continuously 40% of new CVEs have exploits available within 24 hours Hacker’s don’t wait for the yearly pen test cycle Pen-Testing Is Largely Manual, Costly & Time Consuming And we have severe talent shortage
  • 13. Mission Stay ahead of hackers.. AI based Platform for Automated Pen Testing, Red Teaming & NextGen Attack Surface Management
  • 14. NextGen Attack Surface Management ● Discover shadow assets in near real time ● Combine Active and Passive recon to eliminate False Positives
  • 15. AI based Pen Test: Run complex multi-stage attack paths at scale ● Automate Multi Stage Attack Trees ● Safe penetration testing ● No false positives
  • 16. AI based Red Teaming: Test Your Security Control Effectiveness Against Specific Adversarial Goals ● MITRE based attacks for emulating various Red Teaming objectives ● Test security control effectiveness
  • 17. AI + Humans: Pen Test as a Service (PTaaS) To Reduce False Positives, Complexity and Cost ● Eliminate false positives ● Supervised and safe exploitation ● Prioritized risks with proof of exploitation
  • 18. Recognized as a Leader by Gartner, Forrester & IDC in 30+ Analyst Reports • 15 Gartner reports • 3 Gartner Hype Cycles • Notable Vendor in Forrester • IDC Innovators • Leader in 2023 GIGAOM Radar • RSAC 365 Innovation Showcase
  • 19. Trusted by Fortune 500 Customers & Backed by Top VCs “The tool has exceeded our expectations in identifying numerous domains and subdomains that are shown as public, but should be private.” Top 5 Telco in USA ● Top 3 global Telecom ● Top 10 IT Companies ● Top 100 Manufacturing firms ● Mid-sized Automobile Companies ● Mid-sized Banks and Financial Services Investors