
Live Workshop: Attack and Defense: Remote Thread Injection and Detection (Recorded)
We’re excited to share the recorded workshop on Remote Thread Injection and EDR-based detection that
Cybersecurity researcher and red teamer who lives both on the offensive and defensive fronts. The author of the “Antivirus Bypass Techniques” book, expert in malware research, reverse engineering, penetration testing, digital forensics, and incident response
We’re excited to share the recorded workshop on Remote Thread Injection and EDR-based detection that
Explore BlackByte ransomware: ProxyShell exploits, anti-debugging, and reverse engineering insights. Dive deep into this malware’s
In this video, I’ll show you how to debug a DLL file with an IDA
We’re excited to share a special occasion with you – Uriel Kosayev, one of our
In the video, I draw from my 15 years of experience to explain that recognizing
In this malware analysis video, we explore how MuddyWater, an Iranian APT group, utilizes legitimate
Authors Uriel Kosayev — @MalFuzzer, Hai Vaknin — @VakninHai, Tamir Yehuda — @Tamirye94, Matan Bahar — @Bl4ckShad3 Prologue As red teamers, we are
By Uriel Kosayev (@MalFuzzer) Introduction Intel is a very well-known and large company that serves many
(CVE-2020-8842) Introduction MSI TrueColor utility comes as a pre-installed utility program on MSI gaming laptops
As Mac malware becomes more widespread, and as detection mechanisms get more sophisticated, malware actors
Microsoft WslService Unquoted Service Path By Uriel Kosayev Introduction WslService is a deployed service on
Last month, we decided to enrich our knowledge by delving into research on a popular
@2025 TrainSec. All rights reserved. Terms of Use | Privacy Policy