Skip to Main Content

Kevin Haubris

Senior Research Analyst

EXPERIENCE
Kevin Haubris has 10+ years of experience in Information Security positions for the public and private sectors, focusing on both offensive and defensive security. During this time, he has concentrated mostly on software development, pen testing, adversarial emulation, and reverse engineering.

EDUCATION & CERTIFICATIONS

  • Bachelor of Science, Computer and Network Security, Dakota State University

PASSION FOR SECURITY
Kevin has had a passion for security since college, when he started learning exploit development outside of class in his spare time. That started him off on a path to learning about additional complicated topics. Now he enjoys solving difficult problems, spending time in a disassembler, and loves learning how different binaries work.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Blog May 04 2022

ELFLoader: Another In Memory Loader Post

Intro Now that BOFs are commonplace for Windows agents, some people have talked about wanting a non-Windows only version. In this blog post, we’ve got…

Read about this article
Blog February 22 2021

COFFLoader: Building your own in memory loader or how to run BOFs

Intro Have you heard of the new Beacon Object File (BOF) hotness? Have you ever thought that you should be able to run those outside of Cobalt Strike? Well, if…

Read about this article
Blog January 07 2020

SELinux and Auditd

In this blog post, I will discuss SELinux and Auditd, how to use them, how to determine what the default policies are doing, and how to add new ones. For those…

Read about this article
Blog September 18 2018

Linux: How's My Memory

Windows in-memory injection is commonplace in current toolsets, there are quite a few methods to do it, and most of them are documented pretty well. Linux…

Read about this article
Blog April 26 2018

Malware: Linux, Mac, Windows, Oh My!

While going through APT write-ups, I’ve been noticing a lot of focus on detecting Windows malware, so we will skip over that. One thing that I haven’t seen…

Read about this article
Training Resources May 02 2024

Actionable Purple Team Simulation Online Training (May 2-3)

Learn how to create specific detections to identify early Indicators of Compromise (IOCs) in our online course. Designed for those looking to improve their…

Read about this article
Events TrustedSec HQ | April 30 2024

ISC2 Cleveland Chapter Member Meeting April 2024

ISC2 Cleveland Chapter April MeetupCome join us for our April Meetup! Our Cleveland Chapter is hosting an exciting in-person event for all cybersecurity…

Read about this article
Webinars April 17 2024

Enter the Sandbox: Impede Detection Platform v1.1 Release

Join us for our webinar with Director of Product Operations Ben Mauch, where you can get a look at the new Impede Detection Platform updates and the all-new…

Read about this article
Blog April 16 2024

PCI DSS Vulnerability Management: The Most Misunderstood Requirement – Part 2

Risk RankingThis is part two (2) of a three (3) part series on PCI DSS version 4.0 requirement 6.3.1, for identification and management of vulnerabilities.…

Read about this article
Events Kennedy Space Center, Florida | April 12 2024

Hack Space Con 2024

Founder and CEO David Kennedy is the keynote speaker at this year's Hack Space Con! We are also proud to sponsor this event.

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.