Hexacon
October 13 - 14

Hexacon

Hexacon is a single track security conference taking place from the 13th of October 2023 to the 14th in the heart of Paris. Be sure to stop by our booth to learn more about our Virtual Hardware Platform.
GovWare Singapore
October 17 - 19

GovWare Singapore

GovWare, the region’s premier cybersecurity information and connectivity platform, offers multi-channel touchpoints to drive community intel sharing, training and strategic collaborations.
OWASP 2023 Global AppSec DC
October 30-31

OWASP 2023 Global AppSec DC

Designed for infosec professionals, the two-day OWASP conference equips developers, defenders, and advocates to build a more secure web. Visit our booth to experience the power of virtualization.
Black Hat Europe 2023
December 4-7

Black Hat Europe 2023

Black Hat is a cybersecurity event series providing the most technical and relevant information security research. Visit us to experience virtual iOS, Android and IoT devices for powerful vulnerability research, app pentesting, malware and threat research, and DevOps.
Intro to Custom Device Modeling with Corellium
On Demand

Intro to Custom Device Modeling with Corellium

Developers can use the Corellium CHARM Developer Kit to create their own custom virtual device models and load them into the Corellium platform for convenient testing, advanced research, and accelerated development. In this webinar, Corellium Researcher Chris Williams and Corellium Chief Evangelist Brian Robison show you how to build one.
Hunting for Vulnerabilities in iOS Apps
On Demand

Hunting for Vulnerabilities in iOS Apps

Join Chief Evangelist Brian Robison, Corellium Researcher Steven Smiley, and guest speaker Robert Ferri as they go deeper into reverse engineering tactics and techniques with iOS mobile applications. Learn some of the tools of the trade in decompiling and static code analysis to hunt for vulnerabilities. Additional live demonstrations included using common tools like Burp Suite, Frida and Objection to prove that the vulnerabilities actually exist.
Deep Dive into Reverse Engineering on Android
On Demand

Deep Dive into Reverse Engineering on Android

Join Brian Robison (Chief Evangelist) and Steven Smiley (Corellium Researcher) as they discuss reverse engineering tactics on Android mobile applications. Together, they demonstrated how to find vulnerabilities through decompiling and static code analysis. They also tested common tools of the trade — including Burp Suite, Frida, and Objection — to prove that vulnerabilities exist in data at rest and data in motion.
Mobile Malware & Threat Research Without Limits
On Demand

Mobile Malware & Threat Research Without Limits

In this webinar, we showed how Corellium’s virtualization platform removes the limitations of using physical devices to perform dynamic analysis on mobile malware, and makes it much safer and more efficient than ever before. We played with live ransomware, spyware, and other types of information-stealers. Then, we examined their effects on devices, while gathering indicators of compromise that we can use to defend our environment. We saw live command and control (C2) communication, as well as malware that destroys user data.
Mobile Vulnerabilities Exposed: Getting Our Hands Dirty Part 2
On Demand

Mobile Vulnerabilities Exposed: Getting Our Hands Dirty Part 2

In Part 1 of “Mobile Vulnerabilities Exposed: Getting Our Hands Dirty”, we explored the new Corellium Café mobile app on Android. In Part 2, Steven Smiley (Corellium Researcher) and Brian Robison (Chief Evangelist) explored the iOS version of Corellium Café, looking for vulnerabilities in this version of the app. We used the techniques and tactics that were introduced in our app pen testing series to find vulnerabilities in data at rest and data in motion, and use reverse engineering to give us some hints.
Mobile Vulnerabilities Exposed: Getting Our Hands Dirty
On Demand

Mobile Vulnerabilities Exposed: Getting Our Hands Dirty

In our final episode on mobile application penetration testing, Corellium Researcher Steven Smiley and Chief Evangelist Brian Robison put together many of the tactics from the previous 4 webinars, using mobile app pen testing techniques from earlier episodes in a new mobile app – Corellium Cafe.
Mobile Vulnerabilities Exposed: Reverse Engineering
On Demand

Mobile Vulnerabilities Exposed: Reverse Engineering

In this installment of our Change What’s Possible webinar series, our host, VP of Product Marketing, Brian Robison, and guest speaker Corellium Researcher, Steven Smiley, discuss the most effective ways to find system vulnerabilities on iOS and Android devices through mobile app reverse engineering and static binary analysis.
Mobile App Pen-Testing Training
Virtual

Mobile App Pen-Testing Training

This highly interactive and engaging course is designed to give an overview of how to use the Corellium platform to perform mobile app penetration testing on virtual iOS and Android devices.
iOS Vulnerability Research Training
Virtual

iOS Vulnerability Research Training

This course provides an overview of using the Corellium Virtual Hardware platform with Apple iOS virtual devices. Get first-hand experience with common tactics and techniques for discovering vulnerabilities and investigating exploits.
Corellium Quickstart - FREE!
Monthly | 10am - 12pm EST

Corellium Quickstart - FREE!

Corellium Quickstart is a live, monthly webinar with an open question and answer format. Learn how to use our virtual hardware platform for mobile vulnerability research and app penetration testing. Click "register" to see dates offered.
Mobile Vulnerabilities Exposed: Data in Transit
On Demand

Mobile Vulnerabilities Exposed: Data in Transit

In the third installment of our Change What’s Possible webinar series, "Mobile Vulnerabilities Exposed: Data inTransit," VP of Product Marketing, Brian Robison, discussed how to capture network traffic and analyze data in transit.
Mobile Vulnerabilities Exposed: Data at Rest
On Demand

Mobile Vulnerabilities Exposed: Data at Rest

In the second installment of our Change What’s Possible webinar series, "Mobile Vulnerabilities Exposed: Data at Rest," our host, VP of Product Marketing, Brian Robison, and Corellium Researcher, Steven Smiley, will discuss where mobile app data is stored on iOS and Android devices, how easily it can be exploited, and the tools you need to avoid these risks.
Corellium 101: Mobile AppSec Testing with Arm Virtualization
On Demand

Corellium 101: Mobile AppSec Testing with Arm Virtualization

In Corellium's webinar series Change What's Possible Episode 1, VP of Product Marketing, Brian Robison will discuss the current limitations to mobile security testing and how Corellium addresses them. The discussion includes live demos of how the Corellium Virtual Hardware platform handles malware research, app pen testing, and OS vulnerability research.