A Chat with Amarjit Labhuram, a.k.a. Labu, Threat Emulation Lead
In our ongoing series “CYBER RANGES: Knowing Our Team” we introduce Amarjit Labhuram, or ‘Labu’ for colleagues and friends, Threat Emulation Lead.
With an unwavering curiosity for cybersecurity and a decade’s worth of offensive security expertise, Labu dives into threat emulation and life at CYBER RANGES.
Can you describe your role at CYBER RANGES?
“I am the Lead of the Threat Emulation team at CYBER RANGES, specializing in offensive security and Red Teaming, with over 10 years of experience in InfoSec. My role involves the development of bespoke scenarios, providing valuable training, and guiding stakeholders on effective detection, response, and mitigation strategies. These scenarios are crafted using both our internal and our partners’ CTI feeds.”
Can you delve into CYBER RANGES’ Threat Emulation solutions?
“The Threat Emulation solution is a library of bespoke scenarios that showcase Tactics, Techniques and Procedures (TTPs) that current and emerging Threat Actors implement to achieve their objectives or missions such as espionage or financial gain through ransomware.
These scenarios are powered by our CYBER RANGES Injector Engine, a tool built to emulate the attacks across an infrastructure that mimics a corporate network with multiple hosts and servers to very high fidelity as necessary.
Participants are then challenged with either Threat Hunting or Incidence Response to understand detections of the TTPs that are being played out. I have talked of emulation rather than simulation, as with emulation we actually re-engineer and then detonate the real malware in a safe-to-fail sandbox environment.”
What sets CYBER RANGES apart from the competition?
“CYBER RANGES has the internal tooling and capacity to create and reproduce complex attack chains witnessed in the wild. The CYBER RANGES Scenario Composer allows us to create large networks that simulate how corporations would set up shop and of course, the Injector Router facilitates the emulation and automation of the attacks across the environment. We at CYBER RANGES also pride ourselves on the scaling aspect of getting multiple ranges up and running allowing for individuals or teams to have independent environments when accessing the challenges ensuring integrity without affecting other users.”
What do you enjoy most about being part of The CYBER RANGES Community?
“It’s all about the people! The CYBER RANGES Community is filled with amazing individuals who are always willing to share their knowledge. The sense of collaboration and the constant drive to improve our cybersecurity skills are truly inspiring.”
How did you get into the cybersecurity industry?
“My journey into cybersecurity began during my time as a system administrator. I vividly remember being asked if our infrastructure was being misused. This was the time when crypto mining was on the rise. The issue led me to enroll in a cybersecurity bootcamp. It was during one of the modules where I successfully gained a reverse shell on a system and I knew: from that moment on, I was hooked on cybersecurity.”
What advice would you give someone who wanted to get into cybersecurity?
“Join a supportive engaging community to network with like-minded people and identify a mentor to guide you through your developmental process. A good cybersecurity community has a strong culture of sharing, which has been a tremendous source of inspiration for me.”
What is the most exciting thing about the future of cybersecurity?
Stay tuned for more cybersecurity inspiration from our talented team as CYBER RANGES continues to drive growth and innovation in the cybersecurity profession through The CYBER RANGES Community