Mohamed Bedewi – Building a Weaponized Honeybot

Honeybots are a sophisticated security control which can be used as a stress reliever in case of persistent targeted attacks and to understand attack patterns to […]

Read more

Mohamed Bedewi – Attacking the Unknown

Anonymization techniques are a double-edged sword invention as they can be used by journalists to communicate more safely with whistleblowers or by malicious users to commit […]

Read more

Mohamed Bedewi – Evading Infrastructure Security

The network is the entry point to your applications, it should be properly configured and secured using different and various security solutions to accomplish defence in depth mechanism so it could stand up against the latest sophisticated security threats but the problem is that there’s always away to bypass even the most advanced network security solutions.

Read more