Inside the Mind of the Attacker: EDR Blind Spots and Exploits

Attackers aren’t standing still and neither are their evasion tactics. This session dives into how adversaries bypass EDR detection, from classic obfuscation to advanced in-memory techniques. You’ll get a breakdown of how anti-malware systems (AV, EDR, XDR, etc) work, and how they’re being defeated. Expect real-world examples, cutting-edge evasion methods like PE and reflective DLL injection, and actionable strategies to fortify your defenses against these evolving threats. Key Highlights: How Detection Works: AV, EDR, XDR basics — signatures, heuristics, behavior analytics Common Evasion Techniques: E.g. Obfuscation, packers, crypters, fileless malware, etc Advanced Evasion Methods: PE injection, reflective DLL injection, including other real-world examples Defensive Strategies: Behavioral analytics, advanced threat detection, and threat intelligence integration

    Speaker

    FURTHER SESSIONS

  • AI security lessons from the frontline

  • Behind Enemy Lines: Engaging and Disrupting Ransomware Web Panels

  • Breaking Entra: Real-World Cloud Identity Attacks You Can Recreate

  • Closing remarks

  • Join us in Amsterdam!

    November 20, 2025

    Hang out, learn something awesome and make new friends.