Events

Join us at industry events to meet our experts and learn about mobile security, latest on threat hunting and AI

APRIL 27 - MAY 1

RSA 2025

Recharge, network, and unwind at the iVerify Reboot Lounge, a RSA Conference 2025. Join us for engaging conversations, 1:1 meetings, demos and a space to connect with top cybersecurity professionals in a relaxed setting.

  • Scan your phone for spyware and malware

  • Meet with our founders and mobile experts

  • Watch a demo of our Mobile EDR solution

  • Recharge with "safe" OEM chargers

  • Refresh with tasty snacks and cool swag

Monday - Wednesday, April 28rd - 30th  
Space is limited—Schedule time now to secure your spot!

Recharge, network, and unwind with iVerify a RSA Conference 2025. Join us for engaging conversations, 1:1 meetings, demos and a space to connect with top cybersecurity professionals in a relaxed setting.

  • Scan your phone for spyware and malware

  • Meet with our founders and mobile experts

  • Watch a demo of our Mobile EDR solution

  • Recharge with "safe" OEM chargers

  • Refresh with tasty snacks and cool swag

Monday - Wednesday, 4/28 - 4/30 
Space is limited—Schedule time now to secure your spot!

Past Event

SXSW 2025| Break the Bot: Red-Teaming Large Language Models

Numa Dhamani and Maggie Engler, co-authors of Introduction to Generative AI, talk about how red-teaming has long been a crucial component of a robust security toolkit for software systems. Now, companies developing large language models (LLMs) and other GenAI products are increasingly applying the technique to model outputs, as a means of uncovering harmful content that generative models may produce. Thus, developers can identify and mitigate issues before they occur in production.In this session,

Past Event

SXSW 2025| Break the Bot: Red-Teaming Large Language Models

Numa Dhamani and Maggie Engler, co-authors of Introduction to Generative AI, talk about how red-teaming has long been a crucial component of a robust security toolkit for software systems. Now, companies developing large language models (LLMs) and other GenAI products are increasingly applying the technique to model outputs, as a means of uncovering harmful content that generative models may produce. Thus, developers can identify and mitigate issues before they occur in production.In this session,

APRIL 27 - MAY 1

RSA 2025

Recharge, network, and unwind at the iVerify Reboot Lounge, a RSA Conference 2025. Join us for engaging conversations, 1:1 meetings, demos and a space to connect with top cybersecurity professionals in a relaxed setting.

  • Scan your phone for spyware and malware

  • Meet with our founders and mobile experts

  • Watch a demo of our Mobile EDR solution

  • Recharge with "safe" OEM chargers

  • Refresh with tasty snacks and cool swag

Monday - Wednesday, April 28rd - 30th  
Space is limited—Schedule time now to secure your spot!

Past Event

NULLCON | Predator Malware: Trust Broken at the Core

In this talk, Matthias Frielingsdorf, VP of Research & Development at iVerify, will break down Predator's architecture, including the distinct features introduced in its second iteration. We'll explore its complex infection chain, evasive techniques and the the differences between the first and second iteration. 

By examining this threat in detail, we aim to not only expose the methods behind Predator but also to equip cybersecurity professionals with knowledge to better anticipate and counter such malware in the future.

Let’s Meet

Let’s Meet

Let us know if you will be at one of these events, we will connect you with one of our mobile security experts to share how iVerify protects mobile fleets against the serious risks of advanced zero-day vulnerabilities, advanced malware, zero-click spyware and mobile phishing threats. 

Let us know if you will be at one of these events, we will connect you with one of our mobile security experts to share how iVerify protects mobile fleets against the serious risks of advanced zero-day vulnerabilities, advanced malware, zero-click spyware and mobile phishing threats.