Sabina Llewellyn

I am a penetration tester specializing in mobile security, with an interest in reverse engineering, vulnerability research, and bug bounty programs. Currently, I am conducting research on the vulnerabilities of Flutter mobile applications.

Surasak Sanguanpong

Interested  in: Computer networking Parallel processing High-speed network design

Pirawat Watanapongse

Assistant professor: Artificial Neural Networks Bioinformatics Computer Ethics Information System Security

Wararit Hongkamnerd

Wararit Hongkamnerd is currently a developer at Jitech Co.,Ltd, who has skills at computer network, computer security and linux system. Wararit is also a master’s student majoring in Computer engineering at Kasetsart University. His thesis mainly focuses on cybersecurity, designs an architecture for multi-tenant SIEM, which he uses his skills to develop proof-of-concept of the […]

Dawin Schmidt

I keep it short: I’m just another “security researcher” who is interested in Android, protocols and Applied Cryptography.

Kritsada Dechawattana

Kritsada Dechawattana, a cybersecurity consultant with over 3 years of experience in the field of Blockchain Security , Smart Contract Audit and Full Stack Security Consultant, He also have strong experience in SRE and DevSecOps engineering in Mobile Wallet development company for more than 6 years.

Anton Belousov

Anton has been involved in malware analysis since 2015. He likes thoroughly analyzing malware samples, identifying their features and similarities between each other. He has studied APT-group attacks, analyzed the tools used, analyzed network infrastructure, and searched for connections with known groups and attacks. At Positive Technologies, he developed expertise in PT Sandbox and PT […]

Stanislav Rakovsky

Stanislav Rakovsky is a seasoned malware researcher at Positive Technologies with a specialized focus on tracking APTs and investigating open-source malicious activities.

Alexander Kozlov

Principal Security Researcher at Kaspersky ICS CERT. Has extensive professional experience in Cryptography and Computer Security, with a special interest in reverse engineering and hardware.