Menu
Forums
New posts
What's new
New posts
New media
New media comments
New resources
Latest activity
Media
New media
New comments
Resources
Latest reviews
Members
Rules & Instructions
Log in
Register
What's new
New media
New comments
Menu
Log in
Register
Media
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
Media
Navigation
Navigation
Browse albums
Most media items
251
Ahmed.Attia
150
Mohammed.Hassan
M
42
Muhammad.Alharmeel
7
Ahmed
6
Yusuf.Hegazy
Prev
1
…
Go to page
Go
10
11
12
13
14
15
16
Next
First
Prev
12 of 16
Go to page
Go
Next
Last
Filters
Show only:
Loading…
Evolution of Windows Attack and Defense
Ahmed.Attia
May 1, 2020
0
0
Breaking into Hardware
Ahmed.Attia
May 1, 2020
0
0
Bugs so nice they patched them twice! A (continuing)? story about failed patches |CSCAMP2019
Ahmed.Attia
May 1, 2020
0
0
Industrial Cybersecurity Opportunities and Challenges
Ahmed.Attia
May 1, 2020
0
0
Paving The Way Towards A Zero Trust Network
Ahmed.Attia
May 1, 2020
0
0
KRIs – Your Ultimate Keys for Cyber Security Visibility
Ahmed.Attia
May 1, 2020
0
0
Blockchain Security
Ahmed.Attia
May 1, 2020
0
0
CISO Summit: The Art of Threat Research
Ahmed.Attia
May 1, 2020
0
0
CISO Summit: Threat Intelligence
Ahmed.Attia
May 1, 2020
0
0
APPSEC Africa: Software Security Assurance in Practice
Ahmed.Attia
May 1, 2020
0
0
APPSEC AFRICA: 100 Million LoC later, Code is a Storyteller, Archaeologist & a Snitch
Ahmed.Attia
May 1, 2020
0
0
APPSEC Africa: Egypt Cyber and Privacy Security Requirements for Software Developers |CSCAMP2019 - YouTube
Ahmed.Attia
May 1, 2020
0
0
APPSEC AFRICA: LLVM Demystified: Building a Taint Analysis Pass
Ahmed.Attia
May 1, 2020
0
0
APPSEC AFRICA: Righteous Reports: How to Make Pen Test Reports Right
Ahmed.Attia
May 1, 2020
0
0
APPSEC AFRICA: Malware Analysis with GHIDRA CIA Tools
Ahmed.Attia
May 1, 2020
0
0
The Regional APT Threats … Propaganda VS Untold Story
Ahmed.Attia
May 1, 2020
0
0
Bug Hunting for the Masses
Ahmed.Attia
May 1, 2020
0
0
Reviewing Teleco Security Consideration & Risks Evaluation–A Starter Kit
Ahmed.Attia
May 1, 2020
0
0
The challenge of Building effective SOC with limited resources
Ahmed.Attia
May 1, 2020
0
0
Demystifying people’s role in cyber security
Ahmed.Attia
May 1, 2020
0
0
Revealing Clickjacking Secrets | Workshop By
Ahmed.Attia
May 1, 2020
0
0
Crashing The Continent: Introduction to exploitation | Workshop
Ahmed.Attia
May 1, 2020
0
0
Hardening Corporate Printer | Workshop
Ahmed.Attia
May 1, 2020
0
0
Closing Note: Amateur Persistence Attack (APT) in the Middle Eas
Ahmed.Attia
May 1, 2020
0
0
Panel Discussion: Egypt’s New Cybercrime Law Challenges
Ahmed.Attia
May 1, 2020
0
0
Automated Pentesting in a Doman Controlled Environment
Ahmed.Attia
May 1, 2020
0
0
Calling the True Callers
Ahmed.Attia
May 1, 2020
0
0
Security Assurance As business Enabler
Ahmed.Attia
May 1, 2020
0
0
Panel Discussion: How to win your CyberSecurity dream job?
Ahmed.Attia
May 1, 2020
0
0
Building a Feedback Fuzzer (For Educational Purposes)
Ahmed.Attia
May 1, 2020
0
0
How to defend against OT cyberattacks
Ahmed.Attia
May 1, 2020
0
0
Prev
1
…
Go to page
Go
10
11
12
13
14
15
16
Next
First
Prev
12 of 16
Go to page
Go
Next
Last
Media
Top