BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/Los_Angeles
BEGIN:DAYLIGHT
DTSTART:20210314T030000
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:PDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20211107T010000
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:PST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20210930T163039Z
UID:2269020D-0C01-4443-82B5-A7C187023DA7
DTSTART;TZID=America/Los_Angeles:20210603T183000
DTEND;TZID=America/Los_Angeles:20210603T193000
DESCRIPTION:Hear from a former hacker on how to stay secure in an era where
  mobile apps and APIs are most vulnerable\n\nIt is very hard\, if not impo
 ssible\, to secure something you don’t know exists. While security profe
 ssionals spend countless hours on complex yet interesting issues that *may
 * be exploitable in the future\, basic attacks are occurring every day wit
 h little to reviews. For example\, a “dated trend” by effective yet la
 zy hackers is to search for API unknown by security teams\, coined “Shad
 ow APIs”\, connect to these APIs\, and extract data. While SQL Injection
  used to be the hack of choice\, as a few simple SQL commands would either
  mean “pay dirt” or “move on to the next target”\, the same can be
  said for Shadow API….Find\, Connect\, Extract. This talk will discuss o
 ne of many methods that are used in the wild to target Shadow APIs and exp
 ort large volumes of data with a few clicks of a button - or lines of code
  in python :). Attendees will learn about a very basic yet non-so-obvious 
 problem in securing data\, and how hackers are using creative methods to s
 teal large volumes of data.\n\nSpeaker(s): Himanshu Dwivedi\, Sophia Napp-
 Vega\n\nAgenda: \nHear from a former hacker on how to stay secure in an er
 a where mobile apps and APIs are most vulnerable\n\nAbout this event\n\nIt
  is very hard\, if not impossible\, to secure something you don’t know e
 xists. While security professionals spend countless hours on complex yet i
 nteresting issues that *may* be exploitable in the future\, basic attacks 
 are occurring every day with little to reviews. For example\, a “dated t
 rend” by effective yet lazy hackers is to search for API unknown by secu
 rity teams\, coined “Shadow APIs”\, connect to these APIs\, and extrac
 t data. While SQL Injection used to be the hack of choice\, as a few simpl
 e SQL commands would either mean “pay dirt” or “move on to the next 
 target”\, the same can be said for Shadow API….Find\, Connect\, Extrac
 t. This talk will discuss one of many methods that are used in the wild to
  target Shadow APIs and export large volumes of data with a few clicks of 
 a button - or lines of code in python :). Attendees will learn about a ver
 y basic yet non-so-obvious problem in securing data\, and how hackers are 
 using creative methods to steal large volumes of data.\n\nSanta Clara\, Ca
 lifornia\, United States\, Virtual: https://events.vtools.ieee.org/m/27371
 9
LOCATION:Santa Clara\, California\, United States\, Virtual: https://events
 .vtools.ieee.org/m/273719
ORGANIZER:sbehere@ieee.org
SEQUENCE:1
SUMMARY:How Low-Tech Hackers Hack Your APIs in 15 Min or Less
URL;VALUE=URI:https://events.vtools.ieee.org/m/273719
X-ALT-DESC:Description: &lt;br /&gt;&lt;div class=&quot;g-group l-lg-mar-bot-6 l-md-mar-b
 ot-4  &quot;&gt;\n&lt;div class=&quot;g-cell g-cell-10-12 g-cell-md-1-1&quot;&gt;\n&lt;div class=&quot;has
 -user-generated-content&quot;&gt;\n&lt;div class=&quot;text-body-medium&quot; data-automation=&quot;
 listing-event-description&quot;&gt;&lt;strong&gt;Hear from a former hacker on how to sta
 y secure in an era where mobile apps and APIs are most vulnerable&lt;/strong&gt;
 &lt;/div&gt;\n&lt;/div&gt;\n&lt;/div&gt;\n&lt;/div&gt;\n&lt;div class=&quot;g-group l-mar-bot-6 l-sm-mar-b
 ot-4&quot;&gt;\n&lt;div class=&quot;structured-content g-cell g-cell-10-12 g-cell-md-1-1&quot;&gt;
 \n&lt;div class=&quot;has-user-generated-content&quot; data-automation=&quot;about-this-even
 t-sc&quot;&gt;\n&lt;div class=&quot;structured-content-rich-text structured-content__modul
 e l-align-left l-mar-vert-6 l-sm-mar-vert-4 text-body-medium&quot;&gt;\n&lt;p&gt;It is v
 ery hard\, if not impossible\, to secure something you don&amp;rsquo\;t know e
 xists. While security professionals spend countless hours on complex yet i
 nteresting issues that *may* be exploitable in the future\, basic attacks 
 are occurring every day with little to reviews. For example\, a &amp;ldquo\;da
 ted trend&amp;rdquo\; by effective yet lazy hackers is to search for API unkno
 wn by security teams\, coined &amp;ldquo\;Shadow APIs&amp;rdquo\;\, connect to the
 se APIs\, and extract data. While SQL Injection used to be the hack of cho
 ice\, as a few simple SQL commands would either mean &amp;ldquo\;pay dirt&amp;rdqu
 o\; or &amp;ldquo\;move on to the next target&amp;rdquo\;\, the same can be said f
 or Shadow API&amp;hellip\;.Find\, Connect\, Extract. This talk will discuss on
 e of many methods that are used in the wild to target Shadow APIs and expo
 rt large volumes of data with a few clicks of a button - or lines of code 
 in python :). Attendees will learn about a very basic yet non-so-obvious p
 roblem in securing data\, and how hackers are using creative methods to st
 eal large volumes of data.&lt;/p&gt;\n&lt;/div&gt;\n&lt;/div&gt;\n&lt;/div&gt;\n&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;
 Agenda: &lt;br /&gt;&lt;div class=&quot;g-group l-lg-mar-bot-6 l-md-mar-bot-4  &quot;&gt;\n&lt;div 
 class=&quot;g-cell g-cell-10-12 g-cell-md-1-1&quot;&gt;\n&lt;div class=&quot;has-user-generated
 -content&quot;&gt;\n&lt;div class=&quot;text-body-medium&quot; data-automation=&quot;listing-event-d
 escription&quot;&gt;&lt;strong&gt;Hear from a former hacker on how to stay secure in an 
 era where mobile apps and APIs are most vulnerable&lt;/strong&gt;&lt;/div&gt;\n&lt;/div&gt;\
 n&lt;/div&gt;\n&lt;/div&gt;\n&lt;div class=&quot;g-group l-mar-bot-6 l-sm-mar-bot-4&quot;&gt;\n&lt;div cl
 ass=&quot;structured-content g-cell g-cell-10-12 g-cell-md-1-1&quot;&gt;\n&lt;h2 class=&quot;te
 xt-body-large hide-small&quot;&gt;About this event&lt;/h2&gt;\n&lt;div class=&quot;has-user-gene
 rated-content&quot; data-automation=&quot;about-this-event-sc&quot;&gt;\n&lt;div class=&quot;structu
 red-content-rich-text structured-content__module l-align-left l-mar-vert-6
  l-sm-mar-vert-4 text-body-medium&quot;&gt;\n&lt;p&gt;It is very hard\, if not impossibl
 e\, to secure something you don&amp;rsquo\;t know exists. While security profe
 ssionals spend countless hours on complex yet interesting issues that *may
 * be exploitable in the future\, basic attacks are occurring every day wit
 h little to reviews. For example\, a &amp;ldquo\;dated trend&amp;rdquo\; by effect
 ive yet lazy hackers is to search for API unknown by security teams\, coin
 ed &amp;ldquo\;Shadow APIs&amp;rdquo\;\, connect to these APIs\, and extract data.
  While SQL Injection used to be the hack of choice\, as a few simple SQL c
 ommands would either mean &amp;ldquo\;pay dirt&amp;rdquo\; or &amp;ldquo\;move on to t
 he next target&amp;rdquo\;\, the same can be said for Shadow API&amp;hellip\;.Find
 \, Connect\, Extract. This talk will discuss one of many methods that are 
 used in the wild to target Shadow APIs and export large volumes of data wi
 th a few clicks of a button - or lines of code in python :). Attendees wil
 l learn about a very basic yet non-so-obvious problem in securing data\, a
 nd how hackers are using creative methods to steal large volumes of data.&lt;
 /p&gt;\n&lt;/div&gt;\n&lt;/div&gt;\n&lt;/div&gt;\n&lt;/div&gt;
END:VEVENT
END:VCALENDAR

