Mohamed Bedewi – Building a Weaponized Honeybot

Honeybots are a sophisticated security control which can be used as a stress reliever in case of persistent targeted attacks and to understand attack patterns to […]

Read more

Mohamed Bedewi – Attacking the Unknown

Anonymization techniques are a double-edged sword invention as they can be used by journalists to communicate more safely with whistleblowers or by malicious users to commit […]

Read more
Malware Security UAE Saudi Qatar

Yehia Mamdouh Deep Inside Malicious PDF (Malware Security)

Attack come from where? Most of the attacks in this days are focused on client side attacks, when attacker target company or organization network they face […]

Read more

Mohamed Bedewi – Evading Infrastructure Security

The network is the entry point to your applications, it should be properly configured and secured using different and various security solutions to accomplish defence in depth mechanism so it could stand up against the latest sophisticated security threats but the problem is that there’s always away to bypass even the most advanced network security solutions.

Read more