Orchestrated Windows System Call Invocation without Detection
Original Research by the Pcysys Cyber Research Team
The Endpoint Detection and Response (EDR) promise of complete network visibility along with the ability to monitor and correlate events on the Operating System in real-time, leads many security professionals to believe they will decrease the number of blind spots for malware authors and penetration testers. But do we even know how EDR tools really work? Is this trust justified?
In our July 23rd session, Pcysys Cyber Researcher, Eliran Nissan and Head of Research, Alex Spivakovski, will answer the above questions by demonstrating –
- A new approach to autonomous SysCall invocations
- A framework for invoking SysCalls to challenge your networks and products
- Latest evasion techniques undetectable by many EDR/XDR products
on the market today
Hosts:
Eliran Nissan – Sr. Cyber Researcher Pcysys
Alex Spivakovsky – Head of Research, Pcysys

Please register „here and now“ to participate
Or setup your meeting with the Pcysys specialists for DACH region
