Orchestrated Windows System Call Invocation without Detection

Original Research by the Pcysys Cyber Research Team

The Endpoint Detection and Response (EDR) promise of complete network visibility along with the ability to monitor and correlate events on the Operating System in real-time, leads many security professionals to believe they will decrease the number of blind spots for malware authors and penetration testers. But do we even know how EDR tools really work? Is this trust justified?

In our July 23rd session, Pcysys Cyber Researcher, Eliran Nissan and Head of Research, Alex Spivakovski, will answer the above questions by demonstrating –

  • A new approach to autonomous SysCall invocations
  • A framework for invoking SysCalls to challenge your networks and products
  • Latest evasion techniques undetectable by many EDR/XDR products 
    on the market today

Hosts:
Eliran Nissan – Sr. Cyber Researcher Pcysys
Alex Spivakovsky –  Head of Research, Pcysys 

Please register „here and now“ to participate

Or setup your meeting with the Pcysys specialists for DACH region

www.pcysys.com