SentinelLabs Logo RGB WhitePurp
ABOUT
CONTACT
VISIT SENTINELONE.COM

Idan Weizman

Idan Weizman has been a security researcher at SentinelOne since 2017, following four years service in the IDF. As a researcher, Idan focuses on reverse engineering, Windows internals and malware analysis. Outside of work, he enjoys gaming, watching anime and solving problems in mathematics.
Conti Unpacked Understanding Ransomware Development As A Response To Detection 2
Crimeware

Conti Unpacked | Understanding Ransomware Development As a Response to Detection

Idan Weizman / July 8, 2021

Conti’s rapid encryption speed is matched only by its rapid evolution. SentinelLabs’ deep dive explores its development in unprecedented detail.

Read More

SentinelLabs

In the era of interconnectivity, when markets, geographies, and jurisdictions merge in the melting pot of the digital domain, the perils of the threat ecosystem become unparalleled. Crimeware families achieve an unparalleled level of technical sophistication, APT groups are competing in fully-fledged cyber warfare, while once decentralized and scattered threat actors are forming adamant alliances of operating as elite corporate espionage teams.

Recent Posts

  • PCPJack | Cloud Worm Evicts TeamPCP and Steals Credentials at Scale
    PCPJack | Cloud Worm Evicts TeamPCP and Steals Credentials at Scale
    May 7, 2026
  • LABScon25 Replay | Please Connect to the Foreign Entity to Enhance Your User Experience
    LABScon25 Replay | Please Connect to the Foreign Entity to Enhance Your User Experience
    May 6, 2026
  • fast16 | Mystery Shadow Brokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet
    fast16 | Mystery Shadow Brokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet
    April 23, 2026

Sign Up

Get notified when we post new content.

Thanks! Keep an eye out for new content!

  • Twitter
  • LinkedIn
©2026 SentinelOne, All Rights Reserved.