<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1076912843267184&amp;ev=PageView&amp;noscript=1">
Expert

Tomislav Peričin

Chief Software Architect & Co-Founder at ReversingLabs. Tomislav founded ReversingLabs in 2009 and serves as Chief Architect leading all aspects of the company's product and services strategy as well as implementation. He has been analyzing and developing software packing and protection methods for the last 17 years. As chief software architect, he has conceived and driven the development of such projects as TiCore, TitanEngine, NyxEngine and RLPack. Recently, he spoke at BlackHat, ReCon, CARO Workshop, SAS and TechnoSecurity conferences.

Tomislav Peričin

Recent posts from Tomislav Peričin

Explainable Threat Intelligence - Moving Beyond

Explainable Threat Intelligence - Moving Beyond "Black Box" Threat Convictions

How to Identify Hidden & Destructive Objects in Your Environment: Insights into Supply Chain & Phishing Attacks

How to Identify Hidden & Destructive Objects in Your Environment: Insights into Supply Chain & Phishing Attacks

WH memo calls for supply chain security, closer to mandating SBOMs

WH memo calls for supply chain security, closer to mandating SBOMs

The attack on SolarWinds: Next-level stealth was key

The attack on SolarWinds: Next-level stealth was key

Introducing Explainable Threat Intelligence

Introducing Explainable Threat Intelligence

Introducing Explainable Machine Learning

Introducing Explainable Machine Learning

Breaking the Linux Authenticode security model

Breaking the Linux Authenticode security model

Breaking the UEFI firmware Authenticode security model

Breaking the UEFI firmware Authenticode security model

Breaking the Windows Authenticode security model

Breaking the Windows Authenticode security model

Digital Certificates - Models for Trust and Targets for Misuse

Digital Certificates - Models for Trust and Targets for Misuse

The NPM package that walked away with all your passwords

The NPM package that walked away with all your passwords

Catching lateral movement in internal emails

Catching lateral movement in internal emails

Ransomware in exotic email attachments

Ransomware in exotic email attachments

Catching deceptive links before the click

Catching deceptive links before the click

Digital Certificates – Models for Trust and Targets for Misuse

Digital Certificates – Models for Trust and Targets for Misuse

Digital Certificates – Models for Trust and Targets for Misuse

Digital Certificates – Models for Trust and Targets for Misuse

Digital Certificates – Models for Trust and Targets for Misuse

Digital Certificates – Models for Trust and Targets for Misuse