Mohamed Bedewi – Building a Weaponized Honeybot

Honeybots are a sophisticated security control which can be used as a stress reliever in case of persistent targeted attacks and to understand attack patterns to […]

Read more

Mohamed Bedewi – Attacking the Unknown

Anonymization techniques are a double-edged sword invention as they can be used by journalists to communicate more safely with whistleblowers or by malicious users to commit […]

Read more

Usman Khan Bash Shell Shock and Mitigation

Shell lock is the recent vulnerability discovered in Bash. This is the most recent major vulnerability found after the open SSL heartbleed. In order to understand […]

Read more

Mohamed Bedewi – Vulnerability from the Future

The ability to manipulate the DOM at the client-side without notifying the vulnerable web application, persist at the client-side using HTML 5.0 Application Cache and Local Storage, mutate to serve as a zombie in command and control environment and finally escalate privilege to code execution.

Read more
Usman Khan Web Application Security

Usman Khan-DTS Web Security Solutions, A 360 Approach

Web Security is the key challenge nowadays for Enterprise around the globe. The very nature of such application require to have a public interface or an […]

Read more