Research-Driven Cyber Security

A premium cybersecurity research and advisory firm specializing in offensive security operations, digital forensics and incident response, and advanced threat intelligence.

Offensive Security & Adversarial Operations

Hands-on offensive assessments built on real attacker techniques and practical research. We trace how intrusions actually unfold and expose the attack paths that matter.

Digital Forensics & Incident Response (DFIR)

Focused, methodical investigations that rebuild the full attack timeline. From memory forensics to reverse-engineering, we identify what happened and what needs to be fixed.

Threat Intelligence & Adversary Profiling

Intelligence centered on attacker behavior, infrastructure, and tooling. Clear, technical insights that show who is targeting you and how they operate.

Technical Security Advisory & Architecture Guidance

Long-term guidance backed by hands-on offensive and investigative experience. Architecture reviews, threat modeling, and practical support for engineering leadership.

Trusted By

Our Services

Premium cybersecurity research, offensive security operations, digital forensics, and threat intelligence - delivered with deep technical expertise and real-world adversarial perspective.

Offensive Security & Adversarial Operations

Hands-on offensive assessments built on real attacker techniques and practical research. We trace how intrusions actually unfold and expose the attack paths that matter.

Digital Forensics & Incident Response (DFIR)

Focused, methodical investigations that rebuild the full attack timeline. From memory forensics to reverse-engineering, we identify what happened and what needs to be fixed.

Threat Intelligence & Adversary Profiling

Intelligence centered on attacker behavior, infrastructure, and tooling. Clear, technical insights that show who is targeting you and how they operate.

Technical Security Advisory & Architecture Guidance

Long-term guidance backed by hands-on offensive and investigative experience. Architecture reviews, threat modeling, and practical support for engineering leadership.

Offensive Security & Adversarial Operations

Hands-on offensive assessments based on real attacker techniques and practical research. We map how intrusions actually occur - from initial foothold to full compromise - and uncover the attack paths that matter.

  • Multi-stage intrusion simulations
  • Vulnerability research and exploit development
  • Red-team operations and detection-evasion testing
  • Cloud, identity, and SaaS attack paths
  • EDR/XDR bypass and stealth technique validation

DFIR - Digital Forensics & Incident Response

Methodical investigations that rebuild the full attack timeline and identify what needs to be secured. Our work combines forensics, reverse-engineering, and incident-response experience.

  • Memory forensics and artifact extraction
  • Host timeline reconstruction
  • Malware reverse engineering
  • Root-cause analysis with attacker mapping
  • Containment and recovery guidance

Threat Intelligence & Adversary Profiling

Actionable intelligence focused on attacker behavior, infrastructure, and tooling. We help teams understand who is targeting them, how they operate, and how to prepare.

  • Threat-actor profiling and TTP mapping
  • IOC/IOA enrichment and correlation
  • C2 and infrastructure investigation
  • Technical intelligence reports
  • Tracking of new and emerging threats

Technical Security Advisory & Architecture Guidance

Long-term, senior-level guidance for organizations that need deep technical security expertise. Recommendations are based on real offensive and defensive work.

  • Architecture and design reviews
  • Threat modeling (STRIDE, attack-path analysis)
  • Secure development practices
  • Ongoing technical advisory for engineering leadership
  • Fractional CISO support

What We Bring

We deliver cybersecurity services grounded in practical experience - offensive research, adversarial simulations, forensics, and intelligence. The objective is direct: identify the weaknesses that matter and strengthen systems using real, technical insight.

Research & Publications

Books

Long-form research and technical books authored by Cipher Security Labs researchers.

2025

MAoS - Malware Analysis on Steroids

Real-world malware analysis & reverse engineering. A comprehensive guide to modern malware analysis techniques.

2021

Antivirus Bypass Techniques

Hands-on techniques and tactics for bypassing antivirus protection, written for security researchers and penetration testers.

Articles & Technical Papers

Selected articles, malware write-ups, and research notes published by our team.

Two Sides of the Same Coin: From Dissected Malware to EDR Evasion

Analysis of malware dissection techniques and their relationship to EDR evasion strategies.

Read on TrainSec Academy

Can Document Files Be Trusted?

Security analysis of document file formats and potential attack vectors.

Read on TrainSec Academy

Reverse Engineering ARM-Based Mirai Botnet

Technical deep-dive into the ARM architecture implementation of the Mirai botnet.

Read on TrainSec Academy

Remote Thread Injection and Detection - Live Workshop

Live workshop covering remote thread injection techniques and defensive detection methods.

Read on TrainSec Academy

Dissecting BlackByte Ransomware

Comprehensive analysis of BlackByte ransomware operations and technical implementation.

Read on TrainSec Academy

Debugging DLL Files with IDA Disassembler

Practical guide to debugging and analyzing DLL files using IDA Pro disassembler.

Read on TrainSec Academy

Back to the Future of the Cyber Landscape

Analysis of evolving cyber threats and future trends in the security landscape.

Read on TrainSec Academy

MuddyWater Initial Access Trojan

Technical investigation of the MuddyWater APT group's initial access trojan and attack methodology.

Read on TrainSec Academy

One Electron to Rule Them All

Security analysis of Electron-based applications and potential exploitation vectors.

Read on TrainSec Academy

Intel Audio Driver - Unquoted Service Path Vulnerability

Discovery and analysis of an unquoted service path vulnerability in Intel audio drivers.

Read on TrainSec Academy

MSI TrueColor - Unquoted Service Path

Security research on unquoted service path vulnerability in MSI TrueColor software.

Read on TrainSec Academy

The Malware Shlayer

Deep technical analysis of the Shlayer malware family and its distribution mechanisms.

Read on TrainSec Academy

Microsoft WSLService - Unquoted Service Path Vulnerability

Research on unquoted service path vulnerability in Microsoft Windows Subsystem for Linux service.

Read on TrainSec Academy

Dissecting Ardamax Keylogger

Comprehensive reverse engineering and analysis of the Ardamax keylogger malware.

Read on TrainSec Academy

Five Steps to Addressing Supply Chain Vulnerabilities

Strategic approach to identifying and mitigating supply chain security risks in automotive and critical infrastructure systems.

Read on Hakin9

You Are Never Safe: How Hackers Bypass Antivirus

Interview and analysis of antivirus bypass techniques, exploring the dynamics behind security solutions and evasion methods.

Read on Cyber Ducks

Hunting Process Injection by Windows API Calls

Comprehensive guide to detecting and analyzing process injection techniques through Windows API call monitoring and behavioral analysis.

Read on Exploit-DB

Honors & Awards

Industry recognition and Hall of Fame acknowledgments for our security research.

eScan Antivirus - Hall of Fame
Bosch - Hall of Fame
McAfee - Hall of Fame
Intel - Hall of Fame
Bitdefender - Hall of Fame
FACEIT - Hall of Fame

About Us

Nir Yehoshua

Nir Yehoshua

Uriel Kosayev

Uriel Kosayev

Cipher Security Labs is a premium cybersecurity research and advisory firm specializing in advanced security analysis, adversarial testing, and high-end consulting. Built on deep technical expertise, rigorous methodology, and an uncompromising focus on precision, the firm delivers research-driven security work at a level typically reserved for elite internal teams.

Led by seasoned researchers Nir Yehoshua and Uriel Kosayev, Cipher Security Labs brings together more than twenty years of combined experience across vulnerability research, reverse engineering, malware analysis, penetration testing, and strategic cybersecurity advisory. Their background spans complex security challenges across a wide range of industries and technical environments.

All of our clients - regardless of size or sector - benefit from the same core approach: deep research, technical accuracy, and meticulous attention to detail.

Cipher Security Labs operates with a research-first mindset and a commitment to clarity, precision, and meaningful technical impact. Our work is grounded in expertise, designed to help organizations strengthen their security foundations through high-quality analysis and disciplined execution.

Contact Us

11715 Fox Rd Ste 400 PMB 4004

Indianapolis, IN 46236

United States

Tel Aviv, Israel