- Level Effect
- Posts
- LE No. 26: Reverse Engineering! New Streams?
LE No. 26: Reverse Engineering! New Streams?
Weekly Update June 3rd 2025
Welcome to our weekly Level Effect newsletter, designed to keep you informed and updated on our latest activities! Thank you for tuning in. 📺
Hello Defender !
New streams, pentesting tips, human-centric security insights, reverse engineering…
Let’s dive in!
Table of Contents
Brand
New Streams Next 2 Weeks
Check out the Content section below where we are exploring some more streams interviewing the ContinuumCon workshop authors!
CDA DFIR Content Reminder
Have you checked out the DFIR module yet for CDA!?
ContinuumCon - Late Submissions
Reminder - we are also still accepting late submissions.
Yes - this is the con that never ends. We may still be able to get a few in that can persist as on-demand workshops well after the conference for all the lifetime ticket holders.
Link below! 👇
Pentesting Web Apps Recording
The stream recording is up on YT! Definitely check this out for those looking to get started in the pentesting space.
ContinuumCon Workshop Preview with John Tuckner - June 6th @ 12PM EST
Join us for an exclusive ContinuumCon Workshop Preview as we sit down with John Tuckner from Secure Annex to dive into his upcoming session: “Demystifying Browser Extensions.”
Ever wonder what that browser extension you installed is really doing under the hood? Or where to even begin when trying to analyze one? In this workshop, John will guide you through how browser extensions work, the tools and methods you can use to inspect their behaviors, and the red flags that signal malicious patterns.
In this live interview, we’ll explore John’s insights on the current state of browser security, why he built this workshop, and what he hopes learners will take away. Stick around for live Q&A — your chance to ask the author directly!
Reverse Engineering - June 7th @ 12PM EST
Get ready to dive into the basics of Reverse Engineering with Jordan Linden! This module is designed for post-T1 SOC Analysts who want to expand their skills into the world of reverse engineering. We’ll cover what reverse engineering is, why it matters in security, and how to work with tools like Ghidra and IDA Free to disassemble and decompile binaries. You’ll learn how to navigate decompiled code, understand decompiled logic, extract key indicators like API calls and C2 infrastructure, and apply these skills to real-world malware samples. By the end, you’ll have a solid foundation in reverse engineering and clear next steps to continue growing your RE expertise.
ContinuumCon Workshop Preview with Fletus Poston - June 10th @ 1PM EST
Join us for a ContinuumCon Workshop Preview featuring Fletus Poston as we explore his upcoming session: “Human-Centric Security — Creating a Strong Security Culture.”
In cybersecurity, the spotlight often falls on tech — but what about the human element? Fletus’s workshop tackles the “missed link” between technology and human behavior, showing how cognitive biases, social engineering, and security decision psychology shape the threat landscape.
Through real-world examples and practical insights, Fletus will share how organizations can bridge this gap and build a stronger, more holistic security culture. Tune in to hear his take on why human-centric practices matter, why he built this workshop, and join us for an engaging live Q&A!
Keep learning, keep defending.
The Level Effect Team
Reply