{
	"id": "ce7679bd-6d41-4d4a-8c60-f1745cb51497",
	"created_at": "2026-04-06T00:09:18.180451Z",
	"updated_at": "2026-04-10T03:20:06.346693Z",
	"deleted_at": null,
	"sha1_hash": "f0039e2ddf4d7e96000e1442a7d3dd8698ff516c",
	"title": "MWR CyberSec",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 33447,
	"plain_text": "MWR CyberSec\r\nArchived: 2026-04-05 18:48:52 UTC\r\nAbout Us\r\nMWR is an independent cyber security consultancy with research at the core of what we do. Solving our MEA\r\nclients’ unique cyber security challenges and ensuring they are more resilient to cyber-attacks is why we exist and\r\ncontinue to exist.\r\nMWR is renowned for its technical excellence and client-centric approach to solving cyber security challenges.\r\nFrom partnering with some of Africa’s most renowned financial institutions, to advising large telecommunications\r\nand media corporations, our reputation of trust speaks for itself.\r\nA Client Focus\r\nMWR works alongside organisations and their requirements to develop a comprehensive understanding of\r\nstrategic needs. This approach allows us to provide security solutions that empower our clients, rather than restrict\r\nthem.\r\nMEA Operating Focus\r\nHeadquartered in Johannesburg South Africa, MWR services clients across Africa and The Middle East. The focus\r\non these regions and their unique cyber security challenges allows us to ensure that our service offering and\r\nresearch initiatives are tailored to our target market.\r\nTechnical Excellence\r\nWe’ll never just fix the symptoms of a security issue, but will take the time to look for the root cause. Our\r\nintegrity is fundamental to everything we do – we hate hype, abhor buzzwords and place an enormous emphasis\r\non the outcomes our clients receive.\r\nResearch-led\r\nWe believe that being at the forefront of research drives the high level of service MWR offers. Our ability to\r\ninvest time into new endeavours keeps our consultants on the leading edge of security and gives us a unique\r\ninsight into the mind of the attacker.\r\nhttps://www.mwrinfosecurity.com/our-thinking/dynamic-hooking-techniques-user-mode/\r\nPage 1 of 2\n\nSource: https://www.mwrinfosecurity.com/our-thinking/dynamic-hooking-techniques-user-mode/\r\nhttps://www.mwrinfosecurity.com/our-thinking/dynamic-hooking-techniques-user-mode/\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://www.mwrinfosecurity.com/our-thinking/dynamic-hooking-techniques-user-mode/"
	],
	"report_names": [
		"dynamic-hooking-techniques-user-mode"
	],
	"threat_actors": [],
	"ts_created_at": 1775434158,
	"ts_updated_at": 1775791206,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/f0039e2ddf4d7e96000e1442a7d3dd8698ff516c.pdf",
		"text": "https://archive.orkl.eu/f0039e2ddf4d7e96000e1442a7d3dd8698ff516c.txt",
		"img": "https://archive.orkl.eu/f0039e2ddf4d7e96000e1442a7d3dd8698ff516c.jpg"
	}
}