Nati is an 8200 veteran, cyber security R&D director with diverse experience in vulnerability research and exploitation, web security, embedded hardware, communications, and mobile.
Shaked Chen
Security Researcher, Guardio
Shaked is a web security researcher at Guardio focused on investigating web threats and emerging attacker techniques, with experience in anti-bot defenses, AI red teaming, and browser internals.
Amir Gombo
Security Researcher, Microsoft
Amir is a security researcher on Microsoft’s STORM team, focusing on uncovering vulnerabilities in hybrid environments. His work centers on Azure hybrid architectures, cloudtoedge communication paths, and understanding trust boundaries to identify weaknesses and improve the security of Azure Arc and related hybrid solutions.
Michal Kamensky
Security Researcher, Microsoft
Michal is a security researcher on the Microsoft STORM team, where she focuses on vulnerability research across the hybrid cloud domain. Previously she has worked as a security researcher at Bounce Security, and for the last few years manages volunteers at BSides TLV. She enjoys diving into large code bases, understanding complex architectures, and eliminating vulnerabilities at scale.
Yuval Sadowsky
Senior Malware Researcher, Check Point
Yuval is a Senior Malware Researcher in the Threat Intelligence group at Check Point Research. For more than seven years, he has focused on uncovering and analyzing nation-state APT campaigns around the world.
David Driker
Security Researcher, Check Point
David is a Senior Security Researcher focusing on Malware Research at Check Point Research. David joined Check Point in 2019 and before that he was Full Stack Developer for 5 years. David research focuses on Advanced Persistent Threat campaigns. When not researching malware, he enjoys casual gaming and reading.
Aditi Bhatnagar
Founder, Offgrid Security
Aditi is the founder of Offgrid Security, currently shaking up the industry with Kira - a next-generation platform that is redefining what AppSec can do - delivering real proof of exploitability, not just scanner noise. Aditi brings a rare dual expertise to the table: deep security engineering and advanced data science. Before founding Offgrid, she secured cloud infrastructure at Atlassian and built core endpoint protection algorithms at Microsoft. You’ve likely seen her on global stages ranging from RSAC to BSides to Northsec. She is a voice that bridges the gap between complex code architecture and human-centric security. Today, she’s here to show us why the old ways of scanning code are over, and what the future looks like.
Anders Fogh
Chief Security Researcher, Intel
Anders is a Chief Security Researcher and technical lead for security assurance at Intel and is an Intel fellow. He is a renowned expert on microarchitecture and memory security. He has more than 20 years of experience with security and low-level topics and his work on security has been published in both industry and academic conference such as Black Hat USA and IEEE S&P. He has twice been recognized by the National Security Agency for excellence in research. Before joining Intel he worked as a principal security researcher where he worked on incident response and malware analysis. He spend 15 years of his career going from junior software developer to company founder and lead engineer. Anders holds a masters degree in economics.
Ezra Caltum
Principal Engineer, CPU Architecture, Intel
Ezra is an information security practitioner, with a passion for reverse engineering, data analysis, and exploitation. He is the leader of the Tel Aviv DC9723 Defcon Group and a co-founder of BSidesTlv. He currently works for Intel as a Principal Engineer in CPU Architecture. Ezra has presented at some of the leading security conferences in the field.
Michal Shechter
Principal Product Manager, Microsoft
Michal is a Principal Product Manager lead at Microsoft R&D, where she drives AI-powered security innovations in Microsoft Sentinel and XDR, focusing on behavioral analytics and transforming complex security signals into actionable insights.
With over a decade of experience in cybersecurity and product management, Michal has led transformative initiatives in the Threat Protection space from concept to general availability including advanced UEBA capabilities, Incident Investigation & Case Management and SOC optimization.
Michal is also a dedicated mentor with Give & Tech - a volunteer initiative that has raised over $72,000 for non-profit organizations.
Her expertise spans AI, strategic planning, product vision, high impact execution and scale.
Yoni Zukerman
Applied AI Lead, Microsoft
Yoni is an Applied AI Lead at Microsoft Threat Protection with over 10 years of experience applying ML and AI solutions for attack disruption, SOC efficiency, and behavior analytics. His work focuses on AI-driven threat detection, large-scale security analytics, and agent-based systems for security automation.
Yaniv Melamed
Data Scientist, Microsoft
Yaniv is a Data Scientist at Microsoft Threat Protection.
Gal Zaban
Research Team Lead, Zafran
Gal is a Research Team Lead at Zafran with over a decade of experience in security research and reverse engineering. She specializes in low-level research and vulnerability research and has developed and taught a C++ reverse engineering course for Open Security Training2. Gal has also presented her work at a range of security and development conferences.
Ido Shani
Security Researcher, Zafran
Ido is a Security Researcher at Zafran, specializing in vulnerability research of open-source Python packages. With a background in security product research, he is currently focused on detecting logical vulnerabilities within AI infrastructure projects.
Netanel Ben Simon
Senior Security Researcher, Microsoft
Netanel has been a security researcher for over eight years and is currently working with the Microsoft Specialized Clouds organization as part of the Security Testing & Offensive Research team at Microsoft (MSC STORM). He specializes in low-level vulnerability research, fuzzing and exploitation on various platform types such as Windows, Linux, and Embedded Devices. Over the past year, he has conducted in-depth vulnerability research on different UEFI components with a focus on Windows security posture around the boot environment, bug hunting and mitigations.
Alon Leviev
Security Researcher, Microsoft
Alon (@alon_leviev) is a self-taught security researcher working with the Microsoft Specialized Clouds organization as part of the Security Testing & Offensive Research team at Microsoft (MSC STORM). Alon specializes in low-level vulnerability research targeting hardware, firmware, and Windows boot components. He has presented his findings at internationally recognized security conferences such as DEF CON 33 (2025), DEF CON 32 (2024), Black Hat USA 2025, Black Hat USA 2024, Black Hat EU 2023, CCC 2025, CanSecWest 2024, and more. Prior to his career in cybersecurity, Alon was a professional Brazilian jiu-jitsu athlete, winning several world and European titles.
Erez Schwartz
Research Engineer, Oasis Security
Erez specializes in advanced security research, creating solutions to secure hybrid cloud environments from vulnerabilities in unmanaged non-human identities and AI platforms. With over five years of experience in cybersecurity, he has led teams to address complex challenges, leveraging his expertise in vulnerability research and threat intelligence to drive innovation and deliver robust security solutions. Erez is dedicated to advancing the field through meticulous analysis and innovative problem-solving.
Avi Lumelsky
AI Security Researcher, Oligo Security
Avi is a security researcher at Oligo Security, where he focuses on securing AI infrastructure and uncovering vulnerabilities in major open-source AI projects. His research has led to disclosures for Google, Meta, Apple, and Microsoft, and has been featured at BlackHat, DEFCON, and in publications like Wired and Forbes. Before joining Oligo, Avi was a Deep Learning Software Architect at Deci AI (now NVIDIA), specializing in model inference runtime optimization. Passionate about low-level systems, he maintains open source eBPF projects and explores vulnerabilities in AI frameworks and inference servers.
Alon Livne
CTO and co-founder, Botanica Software Labs
Alon is the CTO and co-founder of Botanica Software Labs. A seasoned researcher and engineer, with over 15 years of experience in the fields of software vulnerabilities and exploitation, cryptography and OS internals, on Windows, Linux, and various embedded systems.
Matan Mansheroff
Software Expert, Botanica Software Labs
Matan is a software expert at Botanica Software Labs. He has extensive experience as a reverse engineer and security researcher, with a focus on Windows internals, embedded systems, and niche software platforms. His work spans low-level development and debugging, advanced program analysis, and solving mission-critical reliability and security problems.
Shahar Tal
CEO, Cyata
Shahar is a tech leader with over a decade in offensive security and product defense. After graduating from Israel’s IDF Unit 8200, he joined Check Point and then spent eight years at Cellebrite, where he led security research labs focused on vulnerability discovery, exploit development, and turning messy real-world systems into clear technical truths. Today he’s the founder and CEO of Cyata, building an agentic security control plane to discover, assess, and govern AI agents - and the identity risks they introduce across modern enterprise stacks.
Yarden Porat
Security Researcher, Cyata
Yarden is a vulnerability researcher at Cyata with a background in cryptography, reverse engineering, and low-level exploitation. His current focus is AI agent security and trust boundaries. He led Cyata's research to find vulnerabilities in critical infrastructure, including HashiCorp Vault, CyberArk Conjur, Anthropic's MCP servers, Cursor IDE and presented at Black Hat USA 2025.
Maor Abutbul
Senior Vulnerability Researcher, CyberArk Labs
Maor is a Senior Security Researcher at CyberArk Labs with about 20 years of experience in network and security. Prior to joining CyberArk, Maor performed various security roles from Engineering through R&D and Research. Loves constantly evolving and implementing learned methods in his research. In addition, Maor possesses an engineering degree and a master's degree in communication systems engineering from BGU.
Ari Novick
Malware Researcher, CyberArk Labs
Ari is a Malware Researcher in the Malware & Threat Research team at CyberArk Labs. CyberArk Labs primarily examines cyberattack techniques that occur in post-exploit environments. Novick is responsible for tracking the ever-evolving threat landscape in cyber security and investigating new and emerging threats. In his years of experience, he developed and maintained multiple types of security solutions, giving him an in-depth understanding of many kinds and components of cyberattacks.
Lior Ziv
Data Scientist, Microsoft
Lior is a Data Scientist with over seven years of experience across diverse domains, including ad-tech and machine-learning models for encrypted traffic analysis. She is part of Defender for AI, a research group working in collaboration with Defender for Cloud at Microsoft. Her work focuses on GenAI security, specializing in jailbreak and XPIA. She holds an M.Sc. in Computer Science and Computational Biology from The Hebrew University of Jerusalem. Her thesis focused on modeling gene expression dynamics.
Michael Myngerbayev
Security Researcher
Michael is an independent security researcher specializing in Windows kernel internals, with a focus on driver security and low‑level vulnerability research. He has discovered and reported multiple vulnerabilities -- primarily in Windows drivers -- and previously worked in database security, malware and root‑cause analysis, EDR engineering, and device driver development across several security‑focused companies.
Gefen Altshuler
Security Researcher, Microsoft
Gefen is a security researcher at Microsoft, focused on identity and cloud security. His work centers on Active Directory, Entra, and related cloud identity platforms - exploring how threat actors interact with them. He is interested in understanding the technical foundations of these systems and how design decisions impact their security.
Michelle Katkov
Security Researcher, Botanica Software Labs
Michelle is a Security Researcher at Botanica Software Labs, working on advanced security and systems-level challenges. Her focus areas include API security, Android internals, and low-level development in browser environments. In her work on API security, Michelle spends a lot of time analyzing anti-bot and human-detection systems - how they’re designed, where they fail, and how they can be hardened or subverted. This involves understanding real-world deployment constraints as well as the techniques used to evade or break these protections. Outside of her professional work, Michelle is a competitive chess player with a long-standing commitment to the game. She has represented Israel on the national team and won multiple titles in Israel and across Europe. Chess remains a central part of her life and how she thinks about strategy and problem-solving.
Yehuda Smirnov
Security Researcher, Microsoft
Yehuda is a Security Researcher at Microsoft with a passion for offensive security, red teaming, and vulnerability research. Yehuda has presented at Black Hat USA and enjoys blogging & sharing about security topics.
Travis Goodspeed
Reverse Engineer
Travis is a reverse engineer of embedded systems from East Tennessee in the States, where he drives a 1946 Studebaker and knows every good dog in town by name. For his recent book on Microcontroller Exploits, he built a dark room and chemistry lab, developing x-rays on film and live decapsulating chips as needed for the diagrams.
Ido Frizler
Partner Director of Engineering, Microsoft
Ido is a Partner Engineering Director in Azure Core, leading a global organization of engineers and researchers in the network security space, and serving as the Israeli site leader for Azure Networking. His organization is responsible for the end-to-end security of Azure’s production networks, proactive vulnerability research into Azure Core infrastructure against threat actors, and the development of customer-facing security products, including Web Application Firewall, DDoS protection, and Zero-Trust segmentation. A seasoned leader with a "zero-to-one" mindset, Ido joined Microsoft in 2014 through the acquisition of the cloud security startup Adallom, where he served as an Engineering Manager. Six years ago, he founded the Azure Networking Security team from scratch, strategically scaling it into the multi-disciplinary, international organization it is today.
Prior to his decade at Microsoft, Ido served for six years in high-stakes cybersecurity R&D roles within the Israeli Ministry of Defense. He is a graduate of the elite Talpiot program and holds both a B.Sc. and an M.Sc. in Computer Science from the Hebrew University of Jerusalem. In his spare time, Ido is an avid "maker" who enjoys exploring emerging technologies, bringing personal projects to life, and publicly writing about tech. He lives in Israel with his wife and three children.
Adi Malyanker
Security Researcher, Semperis
Adi is a security researcher at Semperis with seven years of specialized experience in code reviews, identity security, and penetration testing. He has authored over 15 published blogs and research articles documenting his security findings and methodologies. Adi has discovered and disclosed multiple CVEs, primarily focused on insecure deserialization vulnerabilities and remote code execution flaws. As part of Semperis's research team, Adi develops innovative security indicators designed to identify identity-based vulnerabilities within organizational environments. His expertise spans PKI implementations and code security assessments across diverse industry sectors, including manufacturing, telecommunications, transportation, and defense organizations. Through his research and practical security work, Adi contributes to advancing the field's understanding of identity security threats and mitigation strategies.
Mor Rubin
Principal Security Research Manager, Microsoft
Mor is a Principal Security Research Manager at Microsoft, leading identity threat research and detection across Active Directory, Entra ID, and hybrid environments. Specializes in identity attack techniques and detection quality, focusing on translating real-world attacker behavior into high confidence,
actionable security signals.
Daniel Goldberg
Security Lead, Tenzai
Daniel is a security researcher at Tenzai, over the past two decades he has worked in different fields including Malware Analysis, Vulnerability Research, and Security Tooling. These days he is focused on application security and static code analysis. His work was presented at security conferences such as Black Hat USA and BotConf and he's responsible for the Infection Monkey, an open-source breach and attack simulation tool.
Noah Sarfati
Senior Data Scientist, Microsoft
Noah is a Senior Data Scientist at Microsoft. He holds degrees from École Polytechnique (Math/CS) and the University of Oxford (Statistics). Before joining Microsoft, he worked as a scientist at Amazon and later founded a startup funded by an Emirati prince. His current work focuses on multimodal AI systems for security operations.
Roi Nisimi
Principal Security Researcher, Orca Security
Roi is a Principal Security Researcher at Orca Security with over a decade of experience in vulnerability research and offensive cybersecurity. He honed his skills during six years of service in the Intelligence Corps of the IDF, where he achieved the rank of Lieutenant before moving on to roles at the Israeli Ministry of Defense. At Orca, Roi drives research that directly strengthens the company’s cloud security platform, contributing to design, development, and customer success. His expertise lies in uncovering and mitigating critical vulnerabilities across cloud environments, CI/CD pipelines, AI applications and Kubernetes ecosystems.
Charles-Edouard Bettan
Principal Security Researcher, Microsoft
Charles-Edouard is a Principal Security Researcher at Microsoft and one of the driving forces behind Automatic Attack Disruption in Microsoft Defender — the capability designed to automatically stop real attackers in real time. After nearly a decade in cybersecurity and six years inside Microsoft’s threat research teams, he has dissected hundreds of live intrusions across ransomware crews, access brokers, and nation-state operators. His focus: exposing the true mechanics of hybrid, identity-driven attacks and the cross-domain blind spots adversaries love to exploit.
Originally from France and now based in Tel Aviv, he holds a master’s degree in mathematics, which he happily turns into graph-theory explanations for why modern attack paths behave like physics problems. Inside Microsoft, he has led multiple research projects shaping how Defender detects, reasons, and disrupts complex attacks across on-prem, cloud, and everything in between.
When he’s not reverse-engineering attacker playbooks, he’s busy raising his family with his wife Roxane - an environment he claims offers daily, hands-on training in handling unpredictable escalations, privilege abuse attempts, and unplanned lateral movement.