“I am very honored to have the opportunity to work with Mark. I got to know an exceptional leader, who at the same time understands the business world exceptionally and expert of the technical side as well. Mark is the person who gives the biggest support to his team even in the most difficult periods, so everyone gets the most out of themselves, and he also works hard to provide the background that all they need. He is typically someone who can always think outside the box and never runs out of ideas.”
About
With over two decades of cybersecurity experience, I am a seasoned CEO and product…
Services
Activity
-
Tech enthusiasts of the world, let’s meet next week in Barcelona! ✨MWC✨ is one of the most important events of the year that brings together the most…
Tech enthusiasts of the world, let’s meet next week in Barcelona! ✨MWC✨ is one of the most important events of the year that brings together the most…
Liked by Mark Felegyhazi
-
Well Mother Nature decided to have the last laugh. Symposium has been postponed due to the snow and ice. I hope North Carolina State University and…
Well Mother Nature decided to have the last laugh. Symposium has been postponed due to the snow and ice. I hope North Carolina State University and…
Liked by Mark Felegyhazi
-
🇲🇾Great discussions and collaboration during our visit to RADDISH TECHNOLOGY It was a pleasure connecting with the team and exploring ways to…
🇲🇾Great discussions and collaboration during our visit to RADDISH TECHNOLOGY It was a pleasure connecting with the team and exploring ways to…
Liked by Mark Felegyhazi
Experience
Education
-
University of California, Berkeley
-
Security researcher in the networking group
• Developed a proactive domain name filtering to mitigate spam domain registrations
• Studied measurement-based methods to disrupting spammer networks
• Analysed strategic behavior in cyber insurance and proposed methods to incetivize secure behavior -
-
• Studied distributed and strategic decision-making in computer networks, specifically in cybersecurity
• Devised methods to motivate participants in ad hoc networks to cooperate -
-
• Major in computer networking
• Minor in mobile communication -
-
• Deutschpsrachige Engineurausbilding (1996 - 1999)
-
-
Projects
-
TeamSpy – Obshie manevri. Ispolzovat’ tolko s razreshenija S-a
The CrySyS Lab, Budapest has been notified by the Hungarian National Security Authority (www.nbf.hu) about the detection of an ongoing high profile targeted attack affecting our home country, Hungary. During our investigation of the incident, we discovered a number of C&C servers, and a large number of malware samples that have been used in multiple attacks campaigns in the last couple of years. Indeed, the collected evidences suggest that part of the attack toolkit we discovered was…
The CrySyS Lab, Budapest has been notified by the Hungarian National Security Authority (www.nbf.hu) about the detection of an ongoing high profile targeted attack affecting our home country, Hungary. During our investigation of the incident, we discovered a number of C&C servers, and a large number of malware samples that have been used in multiple attacks campaigns in the last couple of years. Indeed, the collected evidences suggest that part of the attack toolkit we discovered was used back in 2010. It seems that the main objective of the attackers was information gathering from the infected computers. Many of the victims appear to be ordinary users, but some of the victims are high profile industrial, research, or diplomatic targets, including the case that triggered our investigation. As part of the attackers’ activities is based on misusing the TeamViewer remote access tool, we named the entire malicious toolkit TeamSpy.Other creatorsSee project -
Investigations on MiniDuke malware
Earlier in February 2013, FireEye announced the discovery of a new malware that exploited a 0-day vulnerability in Adobe Reader. Now, we announce another, as yet unknown malware that exploits the same Adobe Reader vulnerability (CVE-2013-0640).
This new malware was named Miniduke by Kaspersky Labs with whom we carried out its first analysis. Our participation in this research was justified by a detected Hungarian incident. A detailed report on the results of our joint efforts has…
Earlier in February 2013, FireEye announced the discovery of a new malware that exploited a 0-day vulnerability in Adobe Reader. Now, we announce another, as yet unknown malware that exploits the same Adobe Reader vulnerability (CVE-2013-0640).
This new malware was named Miniduke by Kaspersky Labs with whom we carried out its first analysis. Our participation in this research was justified by a detected Hungarian incident. A detailed report on the results of our joint efforts has been published by Kaspersky Labs on their Securelist blog site. That report describes what we currently know about the operation of Miniduke including its stages, and also information on the C&C infrastructure and communications. We have published another report from CrySyS Lab that contains information on the indicators of Miniduke infections and gives specific hints on its detection.Other creatorsSee project -
The Flame Malware ( sKyWIper (a.k.a. Flame a.k.a. Flamer): A complex malware for targeted attacks)
In an international collaboration, CrySyS team created a ~60 page detailed technical analysis on the Flame malware and disclosed this information on 28/05/2012, the same time when others also published information on this threat.. Flame was used to steal data in the Middle-East. CrySyS used the name sKyWIper, now mostly called the malware Flame and Flamer.
Other creatorsSee project -
Duqu: A Stuxnet-like malware found in the wild
In autumn 2011 CrySyS Lab identified and named the Duqu malware which is related to the famous Stuxnet malware. The team produced the first detailed technical analysis on it.
Other creatorsSee project -
Click Trajectories
-
The ability to monetize customers’ visits from the click of a single link entices companies to take part in spam-based advertising, filling people’s inboxes with billions of messages every day and engendering widespread antipathy. But fear not, this business has also given rise to a multi-billion dollar anti-spam industry. To combat the growth of spam-based advertising, UC Berkeley and UC San Diego computer scientists have presented a holistic analysis of the spam value chain in “Click…
The ability to monetize customers’ visits from the click of a single link entices companies to take part in spam-based advertising, filling people’s inboxes with billions of messages every day and engendering widespread antipathy. But fear not, this business has also given rise to a multi-billion dollar anti-spam industry. To combat the growth of spam-based advertising, UC Berkeley and UC San Diego computer scientists have presented a holistic analysis of the spam value chain in “Click Trajectories: End-to-End Analysis of the Spam Value Chain”. Their findings offer evidence that there may be a truly effective intervention through public policy action in Western countries.
Other creators
Organizations
-
ISACA
Academic Advocate
-- organizing ISACA-BME relations - responsible for courses in IT security management
Recommendations received
4 people have recommended Mark
Join now to viewMore activity by Mark
-
🚀🚀🚀 Good example of what can happen when you build a beautiful product that people love! Huge congrats Eoin Hinchy and the Tines team!
🚀🚀🚀 Good example of what can happen when you build a beautiful product that people love! Huge congrats Eoin Hinchy and the Tines team!
Liked by Mark Felegyhazi
-
During the icebreaker segment of our HR orientation for new joiners, we ask: ‘If you had the time, which hobby would you pursue?’ I’m grateful that,…
During the icebreaker segment of our HR orientation for new joiners, we ask: ‘If you had the time, which hobby would you pursue?’ I’m grateful that,…
Liked by Mark Felegyhazi
-
🚀 Great visit to our MSSP partner Nexagate’s Global SOC in Kuala Lumpur! It was fantastic to see their cutting-edge security operations in action 🔍…
🚀 Great visit to our MSSP partner Nexagate’s Global SOC in Kuala Lumpur! It was fantastic to see their cutting-edge security operations in action 🔍…
Liked by Mark Felegyhazi
-
𝐁𝐮𝐢𝐥𝐝𝐢𝐧𝐠 𝐢𝐧 𝐩𝐮𝐛𝐥𝐢𝐜. 𝐎𝐩𝐞𝐧𝐢𝐧𝐠 𝐝𝐨𝐨𝐫𝐬 𝐭𝐨 𝐨𝐮𝐫 𝐀𝐆𝐌 AGMs aren’t only for LPs. Confidential bits stay closed, the rest…
𝐁𝐮𝐢𝐥𝐝𝐢𝐧𝐠 𝐢𝐧 𝐩𝐮𝐛𝐥𝐢𝐜. 𝐎𝐩𝐞𝐧𝐢𝐧𝐠 𝐝𝐨𝐨𝐫𝐬 𝐭𝐨 𝐨𝐮𝐫 𝐀𝐆𝐌 AGMs aren’t only for LPs. Confidential bits stay closed, the rest…
Liked by Mark Felegyhazi
-
San Diego, here we come! SOCRadar is excited to be at the 2025 National K-12 Cybersecurity Leadership Conference, Feb 24-26 at The Westin San Diego…
San Diego, here we come! SOCRadar is excited to be at the 2025 National K-12 Cybersecurity Leadership Conference, Feb 24-26 at The Westin San Diego…
Liked by Mark Felegyhazi
-
Nagy örömmel dolgozom az ÖNKÉP Műhely vezetőjeként a PARIPA program fiataljainak soft skill-fejlesztésén! Egy nagyszerű év áll előttünk rengeteg…
Nagy örömmel dolgozom az ÖNKÉP Műhely vezetőjeként a PARIPA program fiataljainak soft skill-fejlesztésén! Egy nagyszerű év áll előttünk rengeteg…
Liked by Mark Felegyhazi
-
New Job Title Alert: Forward Deployed Software Engineer (FDSWE) I believe we'll see similar open roles in the near future. AI will eliminate many…
New Job Title Alert: Forward Deployed Software Engineer (FDSWE) I believe we'll see similar open roles in the near future. AI will eliminate many…
Liked by Mark Felegyhazi
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More