{"id":4085,"date":"2022-12-08T06:14:03","date_gmt":"2022-12-08T06:14:03","guid":{"rendered":"\/cybersecurity-blog\/?p=3316"},"modified":"2022-12-21T06:41:02","modified_gmt":"2022-12-21T06:41:02","slug":"any-run-at-black-hat-middle-east-and-africa","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/any-run-at-black-hat-middle-east-and-africa\/","title":{"rendered":"ANY.RUN at Black Hat Middle East and Africa 2022"},"content":{"rendered":"\n<p>ANY.RUN attended Black Hat Middle East and Africa (MEA) on November 15-17 at Riyadh Front Exhibition Centre in Saudi Arabia.&nbsp;<\/p>\n\n\n\n<p>\u201cIn the Middle East and Africa, it is clear businesses can benefit greatly from a cloud-based sandbox,\u201d <strong>said <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=black_hat&amp;utm_content=landing\" target=\"_blank\">ANY.RUN<\/a> CEO, Alexey Lapshin<\/strong>. \u201cEnterprises in the MEA region need to hunt threats accurately and get a comprehensive picture of incidents to guarantee data security. That\u2019s where ANY.RUN comes in. We help cybersecurity specialists to analyze malware that companies face to protect them effectively from different types of attacks.\u201d<\/p>\n\n\n\n<p>ANY.RUN team was excited to visit Black Hat MEA. Trainings, CTF, incredible sessions, discussions, and networking \u2013 it was a blast to take part in this event. We got acquainted with numerous companies and agreed to cooperate. New and old friends, as well as partners, made the atmosphere open and friendly, and ANY.RUN was very welcomed there. So, thank you, BHMEA, for this experience. Hope to see you all next year!&nbsp;<\/p>\n\n\n\n<p>With 30,000 attendees and more than 250 exhibitors, <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blackhatmea.com\/\" target=\"_blank\">Black Hat MEA<\/a> is the most significant cybersecurity event in the region. It is organized by the Saudi Federation of Cybersecurity, Programming, and Drones (SAFCSP) and Informa Tech.<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>ANY.RUN attended Black Hat Middle East and Africa (MEA) on November 15-17 at Riyadh Front Exhibition Centre in Saudi Arabia.&nbsp; \u201cIn the Middle East and Africa, it is clear businesses can benefit greatly from a cloud-based sandbox,\u201d said ANY.RUN CEO, Alexey Lapshin. \u201cEnterprises in the MEA region need to hunt threats accurately and get a [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4102,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[69],"class_list":["post-4085","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-conference"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>ANY.RUN at Black Hat Middle East and Africa 2022 - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"ANY.RUN attended Black Hat Middle East and Africa on November 15-17 in Saudi Arabia. ANY.RUN was excited to participate in such an event.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/any-run-at-black-hat-middle-east-and-africa\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/any-run-at-black-hat-middle-east-and-africa\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/any-run-at-black-hat-middle-east-and-africa\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"ANY.RUN at Black Hat Middle East and Africa 2022\",\"datePublished\":\"2022-12-08T06:14:03+00:00\",\"dateModified\":\"2022-12-21T06:41:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/any-run-at-black-hat-middle-east-and-africa\/\"},\"wordCount\":208,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"conference\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/any-run-at-black-hat-middle-east-and-africa\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/any-run-at-black-hat-middle-east-and-africa\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/any-run-at-black-hat-middle-east-and-africa\/\",\"name\":\"ANY.RUN at Black Hat Middle East and Africa 2022 - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2022-12-08T06:14:03+00:00\",\"dateModified\":\"2022-12-21T06:41:02+00:00\",\"description\":\"ANY.RUN attended Black Hat Middle East and Africa on November 15-17 in Saudi Arabia. ANY.RUN was excited to participate in such an event.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/any-run-at-black-hat-middle-east-and-africa\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/any-run-at-black-hat-middle-east-and-africa\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/any-run-at-black-hat-middle-east-and-africa\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"ANY.RUN at Black Hat Middle East and Africa 2022\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ANY.RUN at Black Hat Middle East and Africa 2022 - ANY.RUN&#039;s Cybersecurity Blog","description":"ANY.RUN attended Black Hat Middle East and Africa on November 15-17 in Saudi Arabia. ANY.RUN was excited to participate in such an event.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/any-run-at-black-hat-middle-east-and-africa\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/any-run-at-black-hat-middle-east-and-africa\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/any-run-at-black-hat-middle-east-and-africa\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"ANY.RUN at Black Hat Middle East and Africa 2022","datePublished":"2022-12-08T06:14:03+00:00","dateModified":"2022-12-21T06:41:02+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/any-run-at-black-hat-middle-east-and-africa\/"},"wordCount":208,"commentCount":2,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["conference"],"articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/any-run-at-black-hat-middle-east-and-africa\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/any-run-at-black-hat-middle-east-and-africa\/","url":"https:\/\/any.run\/cybersecurity-blog\/any-run-at-black-hat-middle-east-and-africa\/","name":"ANY.RUN at Black Hat Middle East and Africa 2022 - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2022-12-08T06:14:03+00:00","dateModified":"2022-12-21T06:41:02+00:00","description":"ANY.RUN attended Black Hat Middle East and Africa on November 15-17 in Saudi Arabia. ANY.RUN was excited to participate in such an event.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/any-run-at-black-hat-middle-east-and-africa\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/any-run-at-black-hat-middle-east-and-africa\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/any-run-at-black-hat-middle-east-and-africa\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/any.run\/cybersecurity-blog\/category\/news\/"},{"@type":"ListItem","position":3,"name":"ANY.RUN at Black Hat Middle East and Africa 2022"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/4085"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=4085"}],"version-history":[{"count":1,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/4085\/revisions"}],"predecessor-version":[{"id":4103,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/4085\/revisions\/4103"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/4102"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=4085"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=4085"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=4085"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}